reach

Results 251 - 275 of 1513Sort Results By: Published Date | Title | Company Name
Published By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they cant rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely theyve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrusts annual Privileged Acces
Tags : 
    
BeyondTrust
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity
Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industrys aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry
Published By: Google     Published Date: Oct 26, 2018
To remain competitive, executives must embrace change and equip employees to do the same. Conrad Electric, a 95-year-old online retail company, took just 4 months to migrate to G Suite, providing 4,000 of their employees with more transparent and agile collaboration capabilities. Read this Google Cloud report and get insights to creating a culture where people combined with productivity tools can reach their full potential.
Tags : 
    
Google
Published By: Riskified     Published Date: Aug 06, 2019
Cross-border eCommerce sales are set to reach $627 billion by 2022, with the highest growth rate projected in regions outside of North America and Western Europe. Yet US merchants are not capitalizing on these global markets. Only 42% of surveyed US merchants said their eCommerce website accommodated global business. When looking for new growth potential, international eCommerce represents a huge opportunity for North American merchants. Understanding and encouraging overseas consumers is essential for retailers looking to drive online sales and expand internationally.
Tags : 
    
Riskified
Published By: Google     Published Date: Oct 26, 2018
To remain competitive, executives must embrace change and equip employees to do the same. Conrad Electric, a 95-year-old online retail company, took just 4 months to migrate to G Suite, providing 4,000 of their employees with more transparent and agile collaboration capabilities. Read this Google Cloud report and get insights to creating a culture where people combined with productivity tools can reach their full potential.
Tags : 
    
Google
Published By: Google     Published Date: Jan 24, 2019
To remain competitive, executives must embrace change and equip employees to do the same. Conrad Electric, a 95-year-old online retail company, took just 4 months to migrate to G Suite, providing 4,000 of their employees with more transparent and agile collaboration capabilities. Read this Google Cloud report and get insights to creating a culture where people combined with productivity tools can reach their full potential.
Tags : 
    
Google
Published By: WorkWave     Published Date: Apr 18, 2019
Whether you are focusing on growth, customer satisfaction, or are looking to free up your time your end goal should be finding a pest control software solution that drives smarter business decisions. In order to find the right solution youll have to review your current software and processes, define your goals, and evaluate and compare your options. Choosing the right pest control software is crucial to reach your end goal. This guide will help you determine whether your existing software solution (if you have one) offers everything you need to make smarter business decisions.
Tags : 
    
WorkWave
Published By: Dyn     Published Date: Oct 04, 2016
Distributed Denial of Service (DDoS) attacks increased by over 100% YoY. With nearly a quarter of the attacks aimed at the DNS layer and close to 80% not identified until they reach the DNS layer, it is no secret you should evaluate your Manage DNS provider critically as your first line defense in DDoS mitigation. Download this eBook to best equip your business against impending DDoS attacks including: Common types of DDoS attacks and which layers of your infrastructure are most at risk How to geographically isolate attacks and mitigate latency How to get the best before, during and after attack protection
Tags : 
ddos, dns, cdn, attacks, internet security, ipsec
    
Dyn
Published By: Dyn     Published Date: Nov 03, 2016
We all know that hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of the internet to deliver applications, sites and services to employees, partners and customers. These companies need an internet performance management (IPM) strategy to ensure those services reach users effectively, starting with DNS. Join Trip Kucera and Dyn VP, Gary Sloper, as they discuss the impact of cloud and internet infrastructure across the cloud adoption lifecycle. Key focus points include: Optimizing round trip times and latency, from time to first byte, to internet routing Understanding and comparing cloud service providers Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities. Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success!
Tags : 
dyn, dns, hybrid, hybrid cloud, ipm, networking, enterprise applications
    
Dyn
Published By: IBM     Published Date: Jun 16, 2015
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes.
Tags : 
ibm, security, ponemon institute, technology, fraud, sap, cyber breaches, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : 
ibm, security, ibm x-force, cyber security intelligence index., cyber security, intelligence, enterprise applications
    
IBM
Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus, anti spam, anti spyware
    
Qualys
Published By: New Relic     Published Date: Apr 07, 2015
At Zendesk, they see using New Relic and Rackspace solutions as a winning combination. New Relic allows them to understand the performance characteristics of their application, to monitor performance and quickly drill down to find and resolve issues. Additionally, New Relic shows Zendesk how their application interacts with the Rackspace infrastructure underpinnings so they can achieve the most effective and efficient use of their hosting environment. Together the Rackspace hosting environment and the New Relic application performance tool creates a foundation for SaaS application success. In turn, this frees up the Zendesk team to work on application features.
Tags : 
    
New Relic
Published By: Akamai     Published Date: Mar 08, 2017
This solution needs to reach audiences reliably wherever they are, scale as fast as they grow, and adjust intelligently to dynamic network environments for the highest viewing quality possible. Missteps in online video strategy can have a long-lasting effect on audience perceptions, not only of the video experience but also on the brand being represented.
Tags : 
video, online video strategy, video experience, engagement, customer engagement, online audience
    
Akamai
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, shows that certain firms are able to consistently demonstrate success in reducing breaches across all major forms of cyber-attack. Read this report to learn more.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Equinix     Published Date: Jul 06, 2016
This white paper explores a new interconnection-driven paradigm to help M&E companies improve media content creation, management and distribution workflow efficiencies, develop higher quality products faster, scale their global reach and give the viewing public what they want, when they want it all at reduced costs.
Tags : 
media cloud system, media content, content management, content media, customer relationship management, content management system
    
Equinix
Published By: JBoss Developer     Published Date: Oct 21, 2016
In April 2014, Nissan opened a new production plant in Rio de Janeiro, Brazil with an annual production capacity of 200,000 vehicles and 200,000 engines. Along with a target of reaching 5% market share in Brazil by 2016, the plants opening was aligned with Nissans efforts to achieve 8% global market share, part of the NISSAN POWER 88 five-year mid-term management plan initiated in 2011. To help align their strategic and business goals with their use of technology, Nissan chose Red Hat JBoss BRMS to replace their legacy system.
Tags : 
nissan, production, it optimization, strategic partners, data, enterprise resource planning, enterprise software, data warehousing
    
JBoss Developer
Published By: WNS     Published Date: Jun 21, 2017
Pricing needs to support a brands overall marketing platform. But is that enough to assure consistency of message throughout the organization? Given the far-reaching influence a price position has on a brand, and how various departments need to be aligned to support that position, an argument can be made for treating pricing as a core competency within the organization. What does this mean in real terms? Pricing is a day-to-day concern for numerous departments throughout the organization. While marketing might use pricing tactics to grow market share, sales teams chase volume goals, and product development teams lose sleep over the price image each product projects.
Tags : 
profitability, opportunity identification, monitoring and refinement, executive access, own price elasticity, cross price elasticities, price corridors
    
WNS
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that cant be patched: people. Thats why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employees inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPRfailure to do so will lead to significant disruption of business. Whats more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisations investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: Veracode     Published Date: Jun 26, 2019
Software plays a central role in business processes and in our daily lives, and companies of all sizes and industries are building, buying and downloading more applications than ever before. However, this increased dependence on software makes the applications powering our world a prime target for cybercriminals. Applications are the No. 1 attack vector for cybercriminals and the main source of breaches. In addition, the way software is developed is changing. Contemporary application development methodologies like DevOps are increasing the speed and precision with which software is produced and deployed. The increased speed and precision have created a modern software factory akin to the manufacturing factories of past industrial revolutions.
Tags : 
    
Veracode
Published By: AppDynamics     Published Date: Sep 20, 2017
Cloud computing has been gaining momentum for years. As the technology leaves the early adopter phase and becomes mainstream, many organizations find themselves scrambling to overcome the challenges that come with a more distributed infrastructure. One of those difficulties is getting through a major cloud migration. It is one thing to roll out a few applications and cloud pilot projects, it is an entirely different challenge to start using the cloud across multiple lines of business at massive scale. That is the point that organizations are beginning to reach, and the time has come to take a serious look at cloud migration best practices.
Tags : 
migration, business, cloud, workload, performance applications
    
AppDynamics
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Traditional project management techniques are not working as well as expected. According to research, an average organization has at least $74 million USD (yearly) in at-risk projects. And, even when projects are executed successfully, all too often they still fail to deliver business benefits. So, how do you get started? How do you prioritize which issues to address first? What are the risks and potential rewards? What can you do yourself and where can you need help? This paper helps you answer those questions. It provides important insights into the root causes of project failures and misalignment with business unit expectations, along with possible solutions. It illustrates the path to optimized project and portfolio management from four different starting points, and provides step-by-step advice to help you reach new milestones quickly. It is intended to help you make the transition from managing IT projects to managing business outcomes.
Tags : 
it project, portfolio management, infrastructure, network management, project management
    
HP - Enterprise
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.