reach

Results 201 - 225 of 1512Sort Results By: Published Date | Title | Company Name
Published By: Netsuite     Published Date: Dec 08, 2016
'Read how switching from MYOB has helped Aussie businesses like Atlassian rapidly grow by 200%
Tags : 
erp, cloud computing, it infrastructure management
    
Netsuite
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Kindred Hospital Rehabilitation Services     Published Date: Apr 10, 2019
Many healthcare providers are seeking support from dedicated rehabilitation partners. Receiving support from a third-party team of rehab experts enables healthcare providers to reach the highest levels of performance in this niche and highly-regulated space. While the landscape has never been as challenging, there is also great opportunity. When identifying a rehabilitation partner, there are five key qualities that indicate long-term success. This article outlines how rehab partners can support healthcare providers, the key qualities to look for in a partner and the top questions to ask a potential partner.
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM APAC
Published By: DellEMC and Intel®     Published Date: Jul 05, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Powerful Productivity Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Powerful Productivity Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Para una productividad extraordinaria. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside são marcas comerciais da Intel Corporation ou de suas subsidiárias nos EUA e / ou em outros países
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Bättre produktivitet pa utsidan. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel     Published Date: Sep 26, 2017
With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance —discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Learn more about Dell EMC enterprise solutions in collaboration with Intel®.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel
Published By: Pure Storage     Published Date: Apr 10, 2019
Pure Storage, a pioneer in block-based flash arrays, has developed a technology called FlashBlade, designed specifically for file and object storage environments. With FlashBlade, IT teams now have a simple-to-manage shared storage solution that delivers the performance and capacity needed to bring Spark deployments on premise. To help gain a deeper understanding of the storage challenges related to Spark and how FlashBlade addresses them, Brian Gold of Pure Storage sat down with veteran technology journalist Al Perlman of TechTarget for a far-reaching discussion on Spark trends and opportunities.
Tags : 
    
Pure Storage
Published By: Schneider Electric     Published Date: Jun 05, 2019
Data centers are evolving. They are much more than the data storage facilities of the past—they are gateways to emerging markets and platforms from which businesses can expand their reach through greater connectivity. These evolutions require the deployment of secured IT platforms capable of supporting and treating a huge amount of data generated in real time. Learn how Interxion partnered with Schneider Electric to meet the needs of its customers and stay relevant in the rapidly evolving colocation market.
Tags : 
customer insight, colocation business, schneider electric
    
Schneider Electric
Published By: MedeAnalytics     Published Date: Mar 09, 2012
Through the implementation of integrated, comprehensive workflow technlogy,Simi Valley Hospital has been able to reach 135% of point-of-service cash collections goal. Read to learn more about Simi Valley Hospital's success in achieving front-end process improvements.
Tags : 
healthcare, point of service, cash collections, pai, patient access, patient access intelligence
    
MedeAnalytics
Published By: Juniper Networks     Published Date: Oct 28, 2014
To understand why an open, scalable network architecture is essential for enhanced IT security in the cloud era, get our eBook. Read how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
cloud, data protection, security, security breaches, safe virtual environment, risk, network security
    
Juniper Networks
Published By: New Relic     Published Date: Oct 16, 2015
Manage performance and improve the client experience for more than 90 legacy and new applications.
Tags : 
    
New Relic
Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates
    
Venafi
Published By: Dynatrace     Published Date: Apr 26, 2017
This eBook tells the story of a real company, just like yours, with reach operations challenges, and shows you how Prep Sportswear overcame them by moving toward DevOps and using performance Management.
Tags : 
devops, productivity, performance, performance management
    
Dynatrace
Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
The purpose of this article is to provide the reader with several key insights that can better prepare your organization for mitigating security breaches
Tags : 
    
Concerto Cloud Services
Published By: Sitrion     Published Date: Feb 11, 2016
Internal communications is a critical component to your company’s success. You need to think about the role of internal communications more strategically than ever before. Not just in the face of change events like acquisitions or a major market shift, but also to align your employees behind your vision, your strategy, and to drive daily productivity. This only works if you can communicate effectively with them and excite them about their work. Reaching employees and engaging them will help you successfully meet your goals.
Tags : 
empowerment, workforce engagement, internal communication, human resources, employee performance, productivity
    
Sitrion
Published By: Sitrion     Published Date: Oct 04, 2016
Communications is all about making sure all employees are engaged, aligned, and informed. It is your opportunity to leverage mobile technology and employee apps to improve your communications—connecting remote workers with the enterprise, saving money and time, and empowering employees to be more productive. Download this white paper to learn more about how mobile can help you reach and engage with your remote workforce
Tags : 
    
Sitrion
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.