web

Results 1 - 25 of 3892Sort Results By: Published Date | Title | Company Name
By: Gigaom     Published Date: Oct 31, 2018
In the worlds of machine learning (ML) and deep learning (DL), operations and deployment is a subject that often falls by the wayside. In this 1-hour webinar, attendees discover what “AI Ops” looks like today, and where it’s going. Plus the sweet spot of ML/DL training workloads between data center and cloud.
Tags : dell emc, machine learning, deep learning, ai ops, artificial intelligence, data center, cloud computing, intelligence, dl workloads, business intelligence, productivity, data center design and management
     Gigaom
By: Gigaom     Published Date: Oct 23, 2018
In this 1-hour GigaOm webinar, you will discover why Phishing Control is the most efficient method to protect systems and free up resources in your security programs arsenal.
Tags : area 1, cyber attacks, data protection, network protection, phishing, security, network security, hacker detection, intrusion prevention
     Gigaom
By: Workday     Published Date: Oct 18, 2018
As the competitive landscape of the professional services industry changes, do you have a plan to streamline your internal processes and build a competitive advantage? Watch this webinar replay to learn about the pitfalls firms face when trying to achieve operational efficiencies, and gain strategies for streamlining your internal processes.
Tags : 
     Workday
By: Lenovo UK     Published Date: Oct 15, 2018
Denk je dat je apparaat beveiligd is? Dan heb je het mis. Als het gaat om netwerkbeveiliging, zin apparaten het kwetsbaarst voor dreigingen. BEHEER VAN GEBRUIKERSTOEGANG Geef alleen bevoegd personeel toegang tot pc's met de volgende functies: Meervoudige verificatie De biometrische vingerafdrukherkenning van Lenovo maakt eenvoudig toegangsbeheer en robuuste beveiliging mogelijk. Technologisch hoogstandje. Het cameraklepje van de ThinkPad is een fysiek klepje over de webcam dat gebruikers kunnen openschuiven tijdens een gesprek en kunnen sluiten wanneer ze de webcam niet gebruiken.
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Oct 15, 2018
Jede Minute wird ein Notebook gestohlen. Deshalb sollten Sie jedoch nicht die Mobilität Ihrer Mitarbeiter einschränken. Sie können potenzielle Risiken mit einer robusten Gerätesicherheit minimieren. Technologievorstellung Die Abdeckung der Kameralinse des Lenovo ThinkPad ist eine mechanische Webcam-Abdeckung, die Benutzer bei Anrufen öffnen und ansonsten geschlossen lassen können. Lenovo ThinkPad Ultra Dock Das Lenovo ThinkPad Ultra Dock verfügt über ein Sicherheitsschloss, mit dem Sie das Gerät und Ihre Andockstation bequem am Tisch befestigen und absperren können. Dafür ist nur ein Schlüssel erforderlich.
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Oct 15, 2018
Un portátil es robado cada minuto. De todos modos, esa no tendría que ser razón su?ciente para impedir la movilidad de los trabajadores. Reduce los posibles riesgos con una seguridad sólida de los dispositivos. Muestra tecnológica El obturador de cámara ThinkPad es una cubierta de cámara web física que los usuarios pueden abrir mientras atienden llamadas y cerrar si no se está utilizando. Estación de acoplamiento ThinkPad Ultra Dock Esta estación de acoplamiento ThinkPad Ultra Dock viene con un candado de seguridad que protege cómodamente el dispositivo y tu estación de acoplamiento al escritorio con una sola clave.
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Oct 15, 2018
Un portable est volé chaque minute. Mais cela ne doit pas vous décourager de rendre possible la mobilité des travailleurs ! Réduisez les risques potentiels grâce à de solides fonctions de sécurité intégrées à l’appareil. Technologies de pointe L’obturateur de la caméra des ThinkPad est un cache physique que l’utilisateur peut faire glisser en position fermée quand il n’utilise pas la webcam. Station d’accueil ThinkPad Ultra Dock La station d’accueil ThinkPad Ultra Dock est dotée d’un emplacement pour câble de sécurité qui permet de protéger simultanément et de manière très pratique l’appareil lui-même et la station d’accueil en l’attachant au bureau, le tout avec une seule clé.
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Oct 15, 2018
Ogni minuto viene rubato un notebook: non lasciare che questa media ti impedisca di conseguire la mobilità della forza lavoro. Riduci i rischi potenziali con un livello efficace di protezione dei dispositivi. Vetrina tecnologica La chiusura della fotocamera dei dispositivi ThinkPad è una cover di una webcam ?sica che gli utenti possono aprire quando accettano chiamate e chiudere quando non è in uso. Dock ThinkPad Ultra Questo dock ThinkPad Ultra include un lucchetto per ?ssare in modo pratico il dispositivo e il dock alla scrivania con un'unica chiave.
Tags : 
     Lenovo UK
By: Mimecast     Published Date: Oct 12, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : email security, ransomware, spear-phishing, cyber resilience, symantec
     Mimecast
By: Mimecast     Published Date: Oct 12, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : healthcare, ransomware, ransomware attack, seg, secure email gateway
     Mimecast
By: Amazon Web Services     Published Date: Oct 12, 2018
Safeguarding your data is more important than ever. In today’s data-driven business landscape, companies are using their data to innovate, inform product improvements, and personalize services for their customers. The sheer volume of data collected for these purposes keeps growing, but the solutions available to organizations for processing and analyzing it become more efficient and intuitive every day. Reaching the right customers at the right time with the right offers has never been easier. With this newfound agility, however, comes new opportunities for vulnerability. With so much riding on the integrity of your data and the services that make it secure and available, it’s crucial to have a plan in place for unexpected events that can wipe out your physical IT environment or otherwise compromise data access. The potential for natural disasters, malicious software attacks, and other unforeseen events necessitates that companies implement a robust disaster recovery (DR) strategy to
Tags : 
     Amazon Web Services
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains. Unlike appliances, our cloud security platform protects devices both on and off the corporate network. Unlike agents, the DNS layer protection extends to every device connected to the network — even IoT. Umbrella truly is the easiest and fastest layer of security to deploy everywhere. Download today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Workday     Published Date: Oct 11, 2018
The HR strategy at Zappos may be highly unorthodox, but it’s working. This webinar, sponsored by Workday, explores how Zappos transformed its HR experience by entrusting employees, recruiting talent that understands the company’s culture, and more.
Tags : 
     Workday
By: Workday     Published Date: Oct 11, 2018
In this Argyle Executive Forum webinar, leading HR executives across industries provide expert insight and recommendations for building an analytics strategy and putting a data foundation in place.
Tags : 
     Workday
By: Adobe     Published Date: Oct 11, 2018
In our 26-criteria evaluation of digital intelligence (DI) platform providers, we identified the 10 most significant ones — Adobe, Cxense, evergage, google, IBM, localytics, Mixpanel, optimizely, sAs, and Webtrekk — and researched, analyzed, and scored them. this report shows how each provider measures up and helps customer insights (CI) professionals make the right choice.
Tags : 
     Adobe
By: Tenable     Published Date: Oct 10, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
     Tenable
By: Domino     Published Date: Oct 09, 2018
Industry 4.0 is a trending topic across the manufacturing world. It’s also a complex concept that encompasses multiple technologies and disciplines — and the ROI isn’t always readily apparent. One way food and beverage companies are seeing some real-time benefits is through the automation of processes to reduce the potential for human error. In this exclusive on-demand webcast, Adem Kulauzovic, Director of Coding Automation at Domino Printing, sits down with four industry experts to talk about the impact Industry 4.0 and automation can have on reducing human errors in food packaging. • Bill Dye, Corporate Operations Engineering Manager, Jack Link’s Beef Jerky • Bob Trask, Senior System Architect, BECKHOFF • Yanik Ballou, Technology Leader, Optel Group • Tom Egan, Vice President of Industry Services, PMMI Join us for insights and firsthand observations from a variety of perspectives on the goals and challenges of integrating technology on the packaging line — an operations engineer
Tags : 
     Domino
By: Cisco     Published Date: Oct 08, 2018
Today more than ever, business wins depend on teamwork. And the teams that make things happen are bigger, more diverse, and more distributed than ever. People are working at home, in coffee shops, and on the road. They span multiple time zones. They use every imaginable device, relying heavily on their mobile phones. They grapple with deadlines because their tools don’t connect. With so much to manage, people are challenged to be truly present and focused in the moment. To make the most of each opportunity and maintain business momentum, they need tools that allow them to work intuitively. Effortlessly. That fade into the background, leaving them free to keep focused, stay engaged, get inspired, innovate. That allow them to connect as if they were in person, when they’re not. To learn from industry experts on how collaboration works, Download Report!
Tags : collaboration, workspace transformation, workforce transformation, virtual meetings, digital transformation, webex, webex meeting, webex teams
     Cisco
By: TIBCO Software EMEA     Published Date: Oct 08, 2018
The insurance industry stands on the precipice of change, with waves of innovation and disruption driving new possibilities across all departments, including pricing, underwriting, claims, and fraud. This webinar recording of a live panel debate is ideal for insurance professionals wanting to understand how best to unlock the possibilities created by advanced analytical techniques such as Artificial Intelligence (AI), Machine Learning (ML), and others. This TIBCO and Marketforce webinar on “The Fourth Industrial Revolution in Insurance” includes speakers Ian Thompson, chief claims officer at Zurich; David Williams, chief underwriting officer at AXA; and Clare Lunn, GI fraud director at LV=. The panel discusses: Moving towards the algorithmic insurer: the opportunities created by AI and ML How insurers can become more agile in the face of new innovations and disruptive technologies How the industry can turn structured and unstructured data into insights
Tags : agile insurance, customer experience, digital initiatives, analytical techniques
     TIBCO Software EMEA
By: Zerto     Published Date: Oct 08, 2018
IT professionals are under tremendous pressure to ensure IT Resilience and that business technology services are protected and available 24/7. In this webinar, Forrester’s Senior Analyst, Naveen Chhabra, explores the practices and technologies that have evolved to become the tech infrastructure needed to help organizations achieve true IT resilience and giving IT the tools they need. You will hear about: The state of the IT Resilience market.New and evolving approaches and technologies that are leading organizations to solve for IT resilience.The tools IT needs in order to focus on modernization and building a solid cloud strategy.
Tags : it resilience, business technology, forrester, tech infrastructure
     Zerto
By: Uberall     Published Date: Oct 08, 2018
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes and offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : store, locator, experience, optimize, local marketing, customer journey
     Uberall
By: Gigaom     Published Date: Oct 03, 2018
Mixing the cloud model with data warehousing can generate unexpected synergies. In this 1-hour recorded webinar, you will learn data warehousing fits into multi-cloud architectures.
Tags : attunity, cloud data warehousing, data warehousing, cloud, cloud computing, data lakes, cloud architecture, infrastructure, network architecture, best practices, data integration
     Gigaom
By: TIBCO Software EMEA     Published Date: Oct 03, 2018
Euler Hermes is the world's leading provider of trade credit insurance. Its credit and accounts-receivable insurance enables companies of all sizes to trade with confidence at home or abroad. Its credit intelligence network enables analysis of the financial stability of more than 40 million businesses across the globe.
Tags : reliability, scalability, web services, data analytics
     TIBCO Software EMEA
By: Akamai Technologies     Published Date: Oct 02, 2018
xxx
Tags : 
     Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.