pto

Results 1 - 25 of 431Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organizations computing power to create cryptocurrencies like Bitcoin and Monero and generate profit for themselves. If youre not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook youll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organizations expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who theyre targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Por aos, los fabricantes han estado tratando de optimizar sus procesos y cadenas de suministro asociadas creando mercados, intercambios estandarizados, y sistemas monolticos. En muchos casos, estas soluciones no logran su objetivo, lo que da origen a procesos fragmentados y frgiles, y en los que compartir datos es complicado. Blockchain, la tecnologa que est detrs de Bitcoin y otras criptomonedas, puede resolver estos problemas. Compartir informacin mediante una red distribuida confiable con una lgica de negocio integrada ofrece muchos beneficios al sector manufacturero, especialmente cuando se combina con las comunidades de IoT y de IA. Vea este webinar titulado Blockchain y Manufactura: Una Manera Inteligente de Elevar la Eficiencia en las Cadenas de Suministro de Semiconductores y Electrnica, conducido por Nelson Petracek, director de Tecnologa de TIBCO Software. Entre los temas que se abordan se incluye: Blockchains empresariales Casos de uso en el sector manufactur
Tags : 
    
TIBCO Software
Published By: Sift     Published Date: Jul 12, 2019
"What trends should you be following for the next 6 months? Weve pored over the data, sorted through the news, and interviewed experts and (former) fraudsters. Whether youre planning for the next month, quarter, or year, this ebook can be your guide. READ THIS GUIDE TO FIND OUT: How fraudsters are using technology against us Whether cryptocurrencies are driving fraud or helping to stop it What GDPR tells us about the future of regulation Why content abuse is getting harder to fight How businesses balance user experience with protecting user data "
Tags : 
    
Sift
Published By: IBM     Published Date: Aug 26, 2019
To be successful, businesses must select a secure, scalable and reliable computing platform. At the same time, they also demand openness so development teams can slect tools & technologies they are skilled in using. In this book, discover how IBM LinuxOne platform can play a critical role in developing your enterprise computing strategy and understand the full overview of the value of LinuxONE when compared to other platforms.
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM
Published By: IBM     Published Date: Aug 26, 2019
To meet challenges & opportunities in today's digitally-connected world, you need a modern IT infrastructure that gives you the flexibility to respond to opportunities quickly, work across ecosystems and scale safely as you grow. In this book, learn how LinuxONE can help your business design disruptive IT services. Download Now.
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM
Published By: IBM     Published Date: Aug 26, 2019
By choosing the right enterprise platform and pervasively encrypting data, your bank can deliver data security more effectively. For this reason, you should be aware of the best available encryption solutions for your organization. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your banks cybersecurity position. Know five encryption questions to ask your CIO today
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM
Published By: IBM     Published Date: Aug 26, 2019
Cyberspace is extremely difficult to secure. The basic approach to security is proving to be inadequate to the demands of the aggressive nature of the environment. A paradigm shift is necessary and soon. In this whitepaper, discover a possible change from a selective model to one that is pervasive. A significant modification in the basic structure of computing that is easy to implement and removes all barriers to full scale encryption.
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
Ounce Labs, an IBM Company
Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, its important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at whats behind you, but you can often spot whats coming up quick, set to overtake you. Thats the spirit of this threat report. Weve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldnt be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. Its also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: Lenovo UK     Published Date: Nov 09, 2018
Kopfschmerzen mit dem Potenzial fr erhhte Kosten und Risiken. Mit ThinkPad, das auf Intel Core i7 vPro Prozessoren basiert, erhalten Sie 360-prozentige Sicherheit, zuverlssige Haltbarkeit und uneingeschrnkte Produktivitt fr jedes einzelne Gert. Erfahren Sie mehr in unserem Whitepaper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Lndern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivitt, mobilitt, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
L'aumento della mobilit sta causando mal di testa a tutti i team IT, con potenziali aumenti di costi e rischi. Ma con ThinkPad basato su processori Intel Core i7 vPro, ottieni sicurezza a 360, durata affidabile e produttivit senza compromessi in tutti i dispositivi. Scopri di pi nel nostro white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di societ controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttivit, mobilit, lenovo x1, mobilit della forza lavoro
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
Avec un ordinateur portable vol chaque minute, comment conciliez-vous la menace pour la scurit et le besoin croissant de mobilit de la main-d'uvre et d'une productivit accrue? Avec le ThinkPad optimis par les processeurs Intel Core i7 vPro, vous bnficiez de lapproche 360 de Lenovo en matire de scurit. Plus la durabilit pour garder vos utilisateurs en mouvement et productifs chaque tape de leur journe de travail. En savoir plus dans notre infographie. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux tats-Unis et/ou dans d'autres pays.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
Mit einem Laptop, der jede Minute gestohlen wird, wie balancieren Sie die Sicherheitsbedrohung gegen den steigenden Bedarf an Mobilitt und Produktivitt der Mitarbeiter? Mit ThinkPad mit Intel Core i7 vPro Prozessoren profitieren Sie vom Lenovo 360-Sicherheitskonzept. Plus die Haltbarkeit, um Ihre Benutzer in jeder Phase ihres Arbeitstages beweglich und produktiv zu halten. Erfahren Sie mehr in unserer Infografik. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Lndern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivitt, mobilitt, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
Con un laptop rubato ogni minuto, come bilanci la minaccia alla sicurezza contro il crescente bisogno di mobilit della forza lavoro e una maggiore produttivit? Con ThinkPad basato su processori Intel Core i7 vPro, puoi beneficiare dell'approccio 360 alla sicurezza di Lenovo. Inoltre, ti aiuta a mantenere i tuoi utenti in movimento e produttivi in ogni fase della loro giornata lavorativa. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di societ controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttivit, mobilit, lenovo x1, mobilit della forza lavoro
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
Met n laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel Core i7 vPro processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users dont need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA
Published By: Dell     Published Date: Sep 24, 2018
As the shift into a digital economy continues to accelerate, companies must out-innovate, outthink, and outpace their competition. Businesses must embrace change and transform to become the disruptors in their industries rather than wait to be disrupted by their competitors. In the face of this pressure to evolve, organizations need to transform IT to reduce both the capital and operational costs of legacy IT. They must offload repeatable and time-intensive manual tasks like backup, disaster recovery, and service deployment to software and policy-driven automation.
Tags : 
economic, value, cloud, data, protection, dell emc
    
Dell
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
In this paper, Stratecast discusses the technologies that are disrupting how business is conducted and how they impact and are impacted by your data center infrastructure. We define the ideal IT environment, and present ways to achieve it with flexible, composable infrastructure.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
It seems strange to think that just a few years ago, the IT department was considered a supplier to the organization. Today, IT leaders are at the forefront of their companies march into the digital age. Technology is now recognized as a key enabler for achieving strategic business goals, including revenue growth, market expansion, and customer satisfaction; and IT leaders have risen to the challenge of simultaneously running the organization while identifying and leveraging innovative solutions that can drive growth.
Tags : 
it leaders, business goals, innovative solutions, customer satisfaction, infrastructure improvement
    
Hewlett Packard Enterprise
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. Its often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a companys most valuable data even while its potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app, networking, security, it management, knowledge management, enterprise applications, storage, data management
    
Commvault
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.