browse

Results 1 - 25 of 165Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organizations expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who theyre targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Zebra Technologies (Bulldog)     Published Date: Jul 11, 2019
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
    
Zebra Technologies (Bulldog)
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) such as customers credit card details, user account passwords, corporate sales and payroll data, etc. before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: Address software vulnerabilities and misconfigurations Eliminate exposed ports & services Reduce the chance of attacks delivered via email Limit browser-based attacks Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we dont have as many messages or new products going out. So as often as people come to our site is as often as theyll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then wed be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,
Tags : 
email marketing, triggered emails, audience segmentation, email capture
    
Bluecore
Published By: Zebra Technologies     Published Date: Feb 01, 2019
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
    
Zebra Technologies
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Dell EMC CloudIQ powered by Intel Xeon processors is like a fitness tracker for your storage environment, providing a single, simple, display to monitor and predict the health of your storage environment. CloudIQ makes it easy to track storage health, plan for future growth, report on historical trends, and proactively discover and remediate issues from any browser or mobile device.
Tags : 
    
Dell EMC Storage
Published By: Oracle     Published Date: Nov 22, 2018
Modern marketers leverage insights on how consumers browse goods or make a purchase, to design smarter cross-channel programs and create relevant campaigns. Brands that leverage cross-channel marketing see a 91% customer retention rate. You can do this too. Learn how other marketers in ASEAN are leveraging cross-channel to create real business impact. Join this webinar and hear from Charlie Loo, an award-winning marketer and our Principal Consultant on: five practical ways you can use cross-channel marketing the importance of cross-channel in a mobile first environment the difference between multi-channel and cross-channel
Tags : 
    
Oracle
Published By: MobileIron     Published Date: Oct 29, 2018
Seamless and secure mobile enterprise web browser
Tags : 
    
MobileIron
Published By: Zebra Technologies     Published Date: Oct 17, 2018
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover.
Tags : 
    
Zebra Technologies
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Chatter about the cloud is everywhere. You can't turn on your TV, look at your smartphone, open a magazine or browse websites without being inundated with messages about the cloud. Proponents tell you the cloud will save you time, give you a place to store data, create a way to manage hard drive space on your phone and much more. Detractors will scare you with stories of hackers gaining access to personal photos and bank account numbers.
Tags : 
    
Group M_IBM Q418
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in todays digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in todays digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in todays digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network teams role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this years survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Menlo Security     Published Date: Jun 01, 2018
"According to Gartner, ""by 2022, 25% of enterprises will adopt browser isolation techniques for some high-risk users and use cases, up from less than 1% in 2017. ""By effectively isolating endpoints from browser-executable code, attacks that compromise end-user systems will be reduced by 70%, while eliminating the need to detect or identify malware."" -Gartner What do these organizations know that you dont? Learn more about why Gartner believes this to be true in this report."
Tags : 
    
Menlo Security
Published By: Bronto     Published Date: May 31, 2018
We subscribed to the email lists of 50 brands in the Internet Retailer Top 1000 to see what type of personalization and triggered messages they use to entice customers back to their websites. What you'll learn: How effectively brands are using customer data to nudge them back onto the purchase path. How triggered messages can better engage customers and keep them coming back. How browse and cart recovery can rescue revenue that would otherwise be lost.
Tags : 
revenue, email, internet, retailer, website
    
Bronto
Published By: Datastax     Published Date: May 15, 2018
So what is a cloud application? Any application that has many geographically distributed endpoints (e.g., browsers, mobile devices or machines) should be considered a cloud application and treated accordingly.
Tags : 
    
Datastax
Published By: Datastax     Published Date: May 14, 2018
" For any business that wants to successfully compete in todays digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Zebra Technologies     Published Date: May 14, 2018
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
mobile, shipping, manufacturing, warehouse, global, shopping, fulfillment
    
Zebra Technologies
Published By: Google Chrome Enterprise     Published Date: May 11, 2018
IT can add a critical layer of security with the web browser. Chrome Browser is setting the standard for web safety and stability in the enterprise. Watch this animation to hear about how Chrome is protecting your users' browser experience as they do more work in the cloud.
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
Browsers combined with cloud-based services have effectively replaced desktop software, with an average of 1,053 cloud services in user per enterprise. This guide identifies key security features for IT administrators to consider when selecting a browser.
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
Choosing a modern enterprise browser that offers the right security capabilities keeps businesses data protected, while enabling employees to take advantage of the open web is a big decision for IT. Many IT administrators resort to experimentation in their decision-making. Take the guesswork out of your browser strategy with this guide. Find out what key security features you should be evaluating when selecting a modern enterprise browser.
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As companies embrace cloud services and encourage employee mobility, digital interactions with company resources have become more distributed and virtualized, blurring the traditional concept of the endpoint. Forrester Research surveyed 1000+ IT professionals to better understand how endpoint security challenges are changing for enterprises. To protect company and customer data, it is increasingly necessary for enterprises to revisit how they approach endpoint security. Read the research brief to uncover key trends in enterprise security, and how IT can protect their enterprise through a more secure and managed web browser.
Tags : 
    
Google Chrome Enterprise
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.