att

Results 4026 - 4050 of 4101Sort Results By: Published Date | Title | Company Name
By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : malware, predictive, test, response
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and effectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
     BlackBerry Cylance
By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
     OKTA
By: Wasabi     Published Date: Oct 20, 2017
The Kim Komando Show, the largest weekend radio show in the United States, with an estimated reach of 6.5 million listeners, uses Wasabi hot storage for costeffective, fast and reliable data protection for its business-critical multimedia content. Wasabi’s cloud storage service extends the broadcaster’s on premises networkattached storage (NAS) investments and eliminates the hassles and inefficiencies of tape-based data backup and recovery solutions.
Tags : wasabi, data protection, multimedia, recovery solutions, disaster recovery
     Wasabi
By: Datavail     Published Date: Nov 03, 2017
The management of financial data in an organization is of paramount importance. Reporting, evaluating ROI, making adjustments across the business, and increasing revenue depend on good, accessible financial data that can be updated and integrated across systems and software. For these reasons, many organizations have turned to master data management (MDM) software in the effort to better store, access, search, retrieve, and analyze their financial data. These MDM solutions are able to collect data within a single unified, fully integrated, user-friendly platform. However, in order to be most effective, MDM applications must also have capabilities in data relationship management (DRM). DRM software is able to describe and enforce the relationships between data, no matter where it's located within an organization, to provide a holistic and consistent solution.
Tags : 
     Datavail
By: Cisco EMEA     Published Date: May 15, 2018
Il Gruppo Marcegaglia conferma una strategia di sicurezza IT basata su soluzioni Cisco che va dagli strumenti di firewall al sistema di Next-Generation Intrusion Prevention System passando per la gestione centralizzata. Il Gruppo Marcegaglia è la realtà industriale leader mondiale nella trasformazione dell’acciaio che opera dall’Italia a livello globale, con una presenza di 43 stabilimenti distribuiti su una superficie complessiva di 6 milioni di metri quadrati. Fanno parte del Gruppo 7.000 dipendenti, 60 unità e 210 rappresentanze commerciali per un fatturato che, nel 2013, è stato di oltre 4 miliardi di euro nel settore dell’acciaio e diversificate. Il tutto grazie alla produzione quotidiana di 5.500 chilometri di manufatti in acciaio inossidabile e al carbonio per oltre 15.000 clienti, per un totale di oltre 5 milioni di tonnellate lavorate ogni anno.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: May 15, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco è imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che più necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
     Cisco EMEA
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: ChannelAdvisor     Published Date: Jan 17, 2019
"With millions of sellers and billions of products to compete with on marketplaces, it’s easy to get buried in data every day — and still feel behind. And this is now true across almost all product verticals, as more and more niche categories become intense competitive battlegrounds. Shoppers know they have multiple options for purchasing the same item, and it’s no longer your product descriptions and images alone that capture attention. If you want to consistently rise to the top of results, a structured pricing strategy is a must. In this eBook, you’ll learn: - Complications of marketplace pricing - Benefits of strategic pricing - Pricing best practices - And more"
Tags : 
     ChannelAdvisor
By: Group M_IBM Q1'18     Published Date: Jan 08, 2018
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. This e-book presents six reasons why you should consider a database change, including opinions from industry analysts and real-world customer experiences. Read on to learn more.
Tags : database, streamlining, it infrastructure, database systems
     Group M_IBM Q1'18
By: IBM     Published Date: Jun 05, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises.
Tags : 
     IBM
By: IBM     Published Date: Jun 05, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
     IBM
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Chatter about the cloud is everywhere. You can't turn on your TV, look at your smartphone, open a magazine or browse websites without being inundated with messages about the cloud. Proponents tell you the cloud will save you time, give you a place to store data, create a way to manage hard drive space on your phone and much more. Detractors will scare you with stories of hackers gaining access to personal photos and bank account numbers.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Oct 04, 2018
IBM Cloud Migration Services provides migration and modernization of your workloads and applications from anywhere to anywhere. It accelerates your journey to cloud through proven processes, tools and intellectual property. IBM uses automated and optimized patterns in the Cloud Migration Services to deliver cloud ROI faster and increases your opportunity for success.
Tags : 
     Group M_IBM Q418
By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
     Tenable
By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDC’s Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : secure devops, idc, analyst report, container security
     Tenable
By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
     Tenable
By: Tenable     Published Date: Aug 07, 2018
"Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough. Get the CISO POV in this on-demand webcast and learn how to: • Minimize the attack surface • Expand visibility of assets beyond the perimeter • Enhance security practices to accommodate more dynamic IT environments"
Tags : cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
     Tenable
By: Dell PC Lifecycle     Published Date: Mar 05, 2018
Vanligt datorunderhåll under datorns livscykel är en ineffektiv, dyrbar och tidsödande process för din verksamhet. Dell EMC:s PC som en tjänst (PCaaS) kommer att förvandla ditt företags inställning till IT- infrastruktur. Kostnaderna för livscykelhantering av datorer kan minska med upp till 25 % när PcaaS används. Intel Inside®. Bättre produktivitet på utsidan.
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Wir hatten verschiedene ungeplante Ausfälle zu verzeichnen, darunter zwei größere Ausfälle in unseren ERP- und Finanzsystemen, die wir uns als Unternehmen nicht leisten konnten. Mit Dell EMC All-Flash-Speicher hatten wir keine größeren Ausfälle mehr, dafür aber mehr Flexibilität für die Verwaltung unserer Datenspeicherbedürfnisse.
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Das Royal Victoria Regional Health Centre (RVH), ein Krankenhaus etwa 100 km nördlich von Toronto in zentraler Lage von Ontario in Kanada, bietet eine schnelle Gesundheitsversorgung für mehr als 450.000 Bewohner in einem großen Gebiet. Das RVH-Team besteht aus mehr als 380 Ärzten, 2.500 Mitarbeitern und 850 ehrenamtlichen Helfern und bietet ein außergewöhnliches Gesundheitsangebot und spezielle Dienstleistungen. Dazu zählen Krebsbehandlung, Behandlung von Schlaganfällen, Orthopädie, Intensivmedizin, psychiatrische Versorgung und interventionelle Radiologie. Neben der Akutversorgungseinrichtung in Barrie mit 319 Betten stellt das RVH auch die MEDITECH EHR-Plattform (Electronic Health Records) für mehrere andere Krankenhäuser in Midland, Orangeville und Collingwood bereit.
Tags : 
     Dell PC Lifecycle
By: Oracle     Published Date: Feb 16, 2018
Les avancées du numérique révolutionnent la manière dont nous travaillons, en apportant des innovations de façon permanente dans notre quotidien de travail. Ces technologies très prisées ont renforcé les attentes, obligeant les organisations à développer l'agilité métier à des niveaux sans précédent. Même si les opportunités annoncées sont prometteuses, nous sommes confrontés à de nouveaux freins qui peuvent faire obstacle à la réussite, comme la nécessité d'innover rapidement, de minimiser les coûts et de répondre rapidement aux pressions exercées par la concurrence.
Tags : guide, pour, approche, integree, enjeux, oracle
     Oracle
By: Workday France     Published Date: Mar 08, 2018
Les Centres de Services Partagés Ressources Humaines (CSP RH) n’ont rien de nouveau. Selon un récent article du site HR Magazine1, les trois quarts des sociétés figurant au classement Fortune 500 font appel à des services partagés pour une ou plusieurs de leurs fonctions transverses. Un récent rapport de PWC2 indique quant à lui que 89 % des sociétés qui utilisent des services partagés RH ont atteint leurs objectifs initiaux en termes d’économies d’échelle.
Tags : 
     Workday France
By: Workday France     Published Date: Feb 04, 2019
L'étude « Tendances RH 2018 » de Deloitte met en évidence de nombreuses tendances liées au resssenti des salariés et des employeurs. Découvrez les points clés de cette étude et les 3 étapes que les entreprises émergentes doivent suivre pour attirer et fidéliser les meilleurs talents.
Tags : 
     Workday France
By: Dell Server     Published Date: Aug 08, 2018
PowerEdge servers protect your customers and business with integrated security Analysts say attacks on firmware are becoming a greater threat to systems, making a cyber-resilient server architecture essential to the modern data center. Dell EMC PowerEdge servers, powered by Intel® Xeon® Scalable processors, deliver comprehensive management tools and robust layers of security to protect hardware and firmware throughout the server lifecycle.
Tags : 
     Dell Server
Start   Previous    151 152 153 154 155 156 157 158 159 160 161 162 163 164 165    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.