domain

Results 1 - 25 of 264Sort Results By: Published Date | Title | Company Name
By: Fidelis Cybersecurity     Published Date: May 15, 2019
Cybercriminals have been upping their game this year; the use of file-less attacks with macros and PowerShell scripts to evade preventive defenses and sandboxes mean that they are getting better than ever at using phishing, social engineering and drive-by techniques to gain initial footholds in private domains – and once they arrive, they are often avoiding detection for extended periods of time. Between April and July 2018, Fidelis interviewed over 580 security professionals from around the globe to understand how they are shifting their detection strategies and how confident organizations are in their ability to not only prevent targeted attacks – but root out threats that have by-passed traditional preventive defenses.
Tags : 
     Fidelis Cybersecurity
By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: McAfee APAC     Published Date: Jun 25, 2019
i. How automation and integration can work together to unify people, process, and technology. The security community has begun to embrace automation as a solution to handling tedious, repetitive tasks, allowing skilled staff to focus on more strategic and advanced endeavors. As destructive threats continue to increase, automation balances machine-based analysis with human-based domain knowledge to help organizations achieve optimal workflows in the face of staff shortages and alert fatigue. This SANS survey explores some of the misconceptions and facts around automation and how it can become a natural extension of individuals and teams trying to do their day jobs more effectively.
Tags : 
     McAfee APAC
By: Sigstr     Published Date: Oct 18, 2017
The average American worker sends more than 10,000 emails each year - for a company of 500, that's more than 5 million emails sent from your domain. That's 5 million brand impressions and clickable calls-to-action you could be missing out on. Employee email signatures are a massive marketing channel you've been missing out on. Here are 28 creative email signature examples used by some of the world's leading brands.
Tags : 
     Sigstr
By: Amazon Web Services     Published Date: Jun 02, 2017
451 Research est une société de recherche et de conseil de premier rang spécialisée dans le domaine informatique. L'innovation technologique et les perturbations du marché sont au cœur de notre activité, ce qui nous permet d'offrir des lectures de données primordiales aux leaders de l'économie numérique. Plus de 100 analystes et consultants proposent cette lecture à plus de 1 000 organisations clientes situées en Amérique du Nord, en Europe et dans le monde entier, par le biais de services de recherche et de conseil syndiqués et d'événements en direct. Fondée en 2000 et établie à New York, 451 Research est une division de The 451 Group.
Tags : cloud, cloud platform, amazon, aws, microsoft
     Amazon Web Services
By: PTC     Published Date: Nov 27, 2007
The right domain name can mean the difference between success and failure. Find out how to get it right the first time by following five simple steps.
Tags : domain name, dns, web development, web site, online presence, website, site development, buy domains, buydomains, domains, domain, url, web address
     PTC
By: BuyDomains     Published Date: Nov 27, 2007
The right domain name can mean the difference between success and failure. Find out how to get it right the first time by following five simple steps.
Tags : domain name, dns, web development, web site, online presence, website, site development, buy domains, buydomains, domains, domain, url, web address
     BuyDomains
By: SAS     Published Date: Mar 06, 2018
For data scientists and business analysts who prepare data for analytics, data management technology from SAS acts like a data filter – providing a single platform that lets them access, cleanse, transform and structure data for any analytical purpose. As it removes the drudgery of routine data preparation, it reveals sparkling clean data and adds value along the way. And that can lead to higher productivity, better decisions and greater agility. SAS adheres to five data management best practices that support advanced analytics and deeper insights: • Simplify access to traditional and emerging data. • Strengthen the data scientist’s arsenal with advanced analytics techniques. • Scrub data to build quality into existing processes. • Shape data using flexible manipulation techniques. • Share metadata across data management and analytics domains.
Tags : 
     SAS
By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : dns, phishing, malware, ransomware, security
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
     Akamai Technologies
By: VMware     Published Date: Sep 12, 2011
This white paper highlights an architectural design for a 50,000-seat VMware View architecture created by NetApp, VMware, Cisco, Fujitsu, and Wyse. Explore how the project demonstrates the most reliable methods for deploying a scalable and easily expandable environment, anywhere from 5,000 to 50,000 seats.
Tags : vmware, desktop virutalization, shared storage, connection servers, netapp, vsphere, end-user, desktop management, infrastructure, domain structure, network attached storage, storage area networks, storage management, storage virtualization, system management software, windows
     VMware
By: Workday France     Published Date: Apr 30, 2018
Tous les grands partenariats connaissent des hauts et des bas. Lennon et McCartney, ou Laurel et Hardy ont eux aussi connu des divergences de vues. Travailler ensemble implique de partager les mêmes objectifs, mais cela ne signifie pas toujours une harmonie totale et une reconnaissance des qualités et de la contribution de l'autre. Cette observation peut également s'appliquer aux fonctions financières et RH de toute entreprise : ce sont deux composantes clés de l'organisation mais historiquement deux domaines opérationnels très différents.
Tags : 
     Workday France
By: Workday France     Published Date: Aug 03, 2018
Tous les grands partenariats connaissent des hauts et des bas. Lennon et McCartney, ou Laurel et Hardy ont eux aussi connu des divergences de vues. Travailler ensemble implique de partager les mêmes objectifs, mais cela ne signifie pas toujours une harmonie totale et une reconnaissance des qualités et de la contribution de l'autre. Cette observation peut également s'appliquer aux fonctions financières et RH de toute entreprise : ce sont deux composantes clés de l'organisation mais historiquement deux domaines opérationnels très différents.
Tags : 
     Workday France
By: VMware AirWatch     Published Date: Jul 20, 2017
Take a deeper look into how AirWatch enables Windows management to evolve from a rigid PC-centric approach to one offering a flexible and over-the-air configuration model. This session will delve into the specific configuration, security and OS patch management technologies that AirWatch introduces, as well as leveraging AirWatch alongside conventional Windows management tools that are in use today. • Leverage product provisioning and native configuration management features for policy management from the cloud • Integrate with the new Windows Update as a Service to flexibly manage OS updates and patches on or off the domain • Ensure endpoint security and data protection via advanced security features in the management platform and Windows 10
Tags : 
     VMware AirWatch
By: Zynapse     Published Date: Nov 08, 2010
A worldwide leader inSpend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leadersin Spend Management Domain by leading analysts and Industry observers
Tags : zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material, business intelligence, configuration management, database development, web service management
     Zynapse
By: SAP     Published Date: Mar 29, 2009
While globalization was once the exclusive domain of the large multi-billion dollar companies, today even small to medium size enterprises cannot escape the issues associated with global trade and offshore manufacturing. Whether you view the world as flat or round, it is definitely shrinking. Download this whitepaper to learn more.
Tags : sap, globalization, erp, manufacturing, supply chain management, enterprise, enterprise resource planning
     SAP
By: Mentor Graphics     Published Date: Apr 25, 2016
Over the years, two major approaches to SERDES simulation have emerged and gained popularity: time-domain (or bit-by-bit) and statistical. Both are used to build the eye diagram and bit-error ratio (BER), and each has its benefits and limitations.
Tags : mentor graphics, analysis flow, bit by bit, serdes, ber, gigabit networking, internetworking hardware, electronic test and measurement, embedded systems and networking
     Mentor Graphics
By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip, enterprise applications, enterprise software
     Quocirca
By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : dns, cybersecurity, malware, phishing, ransomware, data exfiltration
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: EmailDirect     Published Date: Nov 12, 2009
Insider information pertaining to deliverability changes affecting email sent to Yahoo, Hotmail, AOL and Gmail. Find out how authentication, domain reputation and user engagement metrics will affect your email delivery in 2010. It's not all about your IP's anymore!
Tags : emaildirect, email marketing, emarketing, gmail, yahoo, aol, deliverability, email, inbox, spam, dkm, engagement
     EmailDirect
By: Mindtree     Published Date: Feb 06, 2015
Web, social and mobile experiences that delight customers are real—they just take real work. Learn how deep domain expertise, nimble processes and the right partnerships will help you slay complexity and conquer tight deadlines. Download the e-book to help you: • Identify and navigate digital complexity • Explore your development options to get to market faster • Learn how to choose and work with the right digital partners
Tags : digital transformation, digital marketing platform, digital ecommerce solutions, customer engagement solutions, enterprise portal solutions, mobile technology, digital enterprise, improve customer experience, customer engagement, enterprise mobility
     Mindtree
By: Thawte     Published Date: Oct 06, 2015
SSL-Zertifikate mit Domänenvalidierung (DV), Unternehmensvalidierung (OV) und Extended Validation (EV) bieten völlig unterschiedliche Validierungsniveaus – aber was heißt das genau? Welches Zertifikat für Sie das Richtige ist, hängt von Ihrem Unternehmen ab und wofür Sie es verwenden wollen. Laden Sie jetzt unsere Kurzübersicht herutner, um zu erfahren, welches Validierungsniveau für Sie das beste ist.
Tags : domain validation, organisation validation, extended validation, ssl certificates, levels of authentication, validation, security
     Thawte
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.