abs

Results 1 - 25 of 455Sort Results By: Published Date | Title | Company Name
Published By: Workday DACH     Published Date: Sep 25, 2018
Kundenspezifische Anpassungen sind grundsätzlich nicht schlecht. Schenkt man jedoch den Beschwerden von IT-Verantwortlichen Glauben, verwandeln sie sich allzu häufig in einen teuren und aufwendigen Albtraum aus Patches, Rückcodierung und Hindernissen, die einem Upgrade der Software im Wege stehen. Dies war keineswegs so beabsichtigt. Die Idee der kundenspezifischen Anpassung entstammt dem Wunsch der Anbieter, eine Vielzahl von Geschäftsmodellen zu unterstützen. Jedes Unternehmen ist einzigartig in seinen spezifischen IT-Anforderungen. Und jedes Unternehmen wünscht sich die Flexibilität, seine Systeme bedarfsgerecht zuzuschneiden.
Tags : 
    
Workday DACH
Published By: Forcepoint     Published Date: Aug 30, 2018
xxx
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Aug 31, 2018
Ihr Unternehmen kann, ohne dass Sie es wissen, Exploit-Angriffen und Malware ausgesetzt sein, auch wenn Sie eine Firewall der nächsten Generation (Next Generation Firewall, NGFW) oder ein Intrusion Prevention System (IPS) eines Markenherstellers verwenden. In Anbetracht der weiten Verbreitung von Umgehungsmethoden, mit denen Angriffe verschleiert werden, überdenken immer mehr Organisationen ihre derzeitigen Abwehrmaßnahmen und die Sicherungskonzepte für ihre Netzwerke. In einem aktuellen PulseReport von Gatepoint Research* bewertete die Hälfte der Befragten die Effizienz ihrer Netzwerksicherheit mit 99 %. Klingt zu schön, um wahr zu sein? Da muss NSS Labs leider zustimmen. Im diesjährigen NGFW-Bericht enthüllte NSS Labs, dass die überwältigende Mehrheit der Firewalls in wenigen Sekunden überwunden werden kann.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Aug 31, 2018
Hybride Netzwerke können stabil, schnell und sicher sein - auch in großen, dezentralen Umgebungen. Nachdem Netzwerke zunehmend komplex werden, müssen IT-Sicherheitsteams die Mittel kennen, um das Netzwerk trotz Unternehmenswachstums sicher und verfügbar zu machen. Hybriden Netzwerken kommt eine zentrale Rolle zu beim Anpassen des Netzwerks an diese neuen Anforderungen und die damit einhergehende Komplexität. Wir erläutern Ihnen, wie Sie hybride Netzwerke mit Firewalls der nächsten Generation absichern können.
Tags : 
    
Forcepoint
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : 
predictive, advantage, cylance, protect, cloud, connect
    
Cylance
Published By: Markforged     Published Date: Sep 14, 2018
3D printed composite parts are said to be up to 23x stronger than ABS, giving you the reliability you need to keep production lines running smoothly. Request your sample part today, and test the strength yourself.
Tags : 
markforged, 3d printing, composite parts, 3d printers, manufacturing tools
    
Markforged
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
    
APC by Schneider Electric
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Das Thema Sicherheit droht, sich für Unternehmen zum Problem zu entwickeln. Die Zahl der Sicherheitsbedrohungen nimmt zu und die Angriffe werden immer raffinierter. Neue Technologien wie das IoT, mobile Lösungen und Hybrid IT-Umgebungen bieten zwar neue Geschäftschancen, bringen aber auch neue Risiken mit sich. Heutzutage reicht es daher nicht mehr aus, die Server auf Softwareebene zu schützen. Unternehmen müssen den Schutz bis auf die physischen Systeme ausweiten, um gegen Sicherheitsbedrohungen gewappnet zu sein. Angesichts der immer größeren Zahl an regulatorischen Bestimmungen im heutigen Geschäftsumfeld gewinnt die Einhaltung dieser Bestimmungen an Bedeutung – zum einen, um das Sicherheitsniveau zu verbessern, zum anderen, um die Kosten zu senken, die durch die Nichteinhaltung dieser Bestimmungen entstehen. Da diese Aspekte von so kritischer Bedeutung sind, ist es wichtig, den Schutz der Hardware zu verbessern und das Sicherheitsniveau bis auf Lieferkettenebene zu erhöhen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Die digitale Transformation ist für mittelständische Unternehmen (100 bis 999 Mitarbeiter) ein absolutes Muss, um im digitalen Umfeld erfolgreich zu sein. Durch eine digitale Transformation können sich Unternehmen mehr Wettbewerbsvorteile verschaffen, indem sie Geschäftsprozesse automatisieren, operative Abläufe effizienter gestalten, Kundenbeziehungen vertiefen und neue Umsatzströme durch Produkte und Services generieren, die auf modernsten Technologien basieren. Die digitale Transformation kann durchaus als Reise gesehen werden, die damit beginnt, dass Unternehmen eine IT-basierte Vision entwickeln. Diese führt dann zu einer datenorientierten Strategie, bei der Analysen im Mittelpunkt stehen. Das Ergebnis solcher Initiativen hängt von der Fähigkeit des Unternehmens ab, Menschen, Prozesse, Plattformen und den Aspekt Governance effizient zu nutzen, um die Geschäftsziele des Unternehmens zu erreichen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Business users expect immediate access to data, all the time and without interruption. But reality does not always meet expectations. IT leaders must constantly perform intricate forensic work to unravel the maze of issues that impact data delivery to applications. This performance gap between the data and the application creates a bottleneck that impacts productivity and ultimately damages a business’ ability to operate effectively. We term this the “app-data gap.”
Tags : 
    
Hewlett Packard Enterprise
Published By: Red Hat     Published Date: Aug 22, 2018
What does a digital transformation look like? It varies from organization to organization, of course, since they have invested in countless systems and applications over the years. Digital transformation consists of building new applications and next-generation architectures on today’s open standards, using on-demand resources. For many organizations, digital transformation also means optimizing existing systems and application resources – integrating, replacing, or abstracting key pieces of their infrastructures into services.
Tags : 
    
Red Hat
Published By: Aria Systems     Published Date: Jun 15, 2016
"Transforming the capabilities of Norway’s largest hospital with Avaya VENA Fabric Connect Oslo University Hospital needed a scalable, smart healthcare network to bring together three hospitals and absorb future growth, new acquisitions and third-party services. Read this case study for the details on how they accomplished their goals, and much more >"
Tags : 
    
Aria Systems
Published By: Dell     Published Date: May 04, 2018
Handle more orders with faster response times, today and tomorrow. Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Download this summary from Dell EMC and Intel® to learn more. • Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. New Possibilities Outside. • Please use this trademark line at the bottom of the landing page: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Dell     Published Date: Jul 08, 2016
Dell Virtual SAN Ready Nodes with Horizon abstract and aggregate compute and memory resources into logical pools of compute capacity, while Virtual SAN pools server-attached storage to create a high-performance, shared datastore for virtual machines.
Tags : 
technology, best practices, poweredge, hyper converged, networking, mobile computing
    
Dell
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
"This research by Nimble Storage, a Hewlett Packard Enterprise Company, outlines the top five causes of application delays. The report analyzes more than 12,000 anonymized cases of downtime and slow performance. Read this report and find out: -Top 5 causes of downtime and poor performance across the infrastructure stack -How machine learning and predictive analytics can prevent issues -Steps you can take to boost performance and availability
Tags : 
    
Hewlett Packard Enterprise
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Lenovo UK     Published Date: Oct 15, 2018
Jede Minute wird ein Notebook gestohlen. Deshalb sollten Sie jedoch nicht die Mobilität Ihrer Mitarbeiter einschränken. Sie können potenzielle Risiken mit einer robusten Gerätesicherheit minimieren. Technologievorstellung Die Abdeckung der Kameralinse des Lenovo ThinkPad ist eine mechanische Webcam-Abdeckung, die Benutzer bei Anrufen öffnen und ansonsten geschlossen lassen können. Lenovo ThinkPad Ultra Dock Das Lenovo ThinkPad Ultra Dock verfügt über ein Sicherheitsschloss, mit dem Sie das Gerät und Ihre Andockstation bequem am Tisch befestigen und absperren können. Dafür ist nur ein Schlüssel erforderlich.
Tags : 
    
Lenovo UK
Published By: Dell EMC     Published Date: Nov 04, 2016
Abstract: Dell EMC VxRail, powered by Intel® Xeon® processors, is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments. Streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation. Plus, Dell EMC VxRail is more than 30% lower total cost of ownership compared to a build-your-own solution. This report looks at: • Super-fast deployment and scalability • Take on enterprise workloads and deliver a smooth yet powerful user experience • Keep peace of mind with accessibility and immediate issue alerts This report shows how you can streamline IT infrastructure, achieve new levels of speed and performance to improve end-user experiences, and allow extra time for innovation. Learn more, read this brief but interesting infographic.
Tags : 
it infrastructure, hyper-convergence, next-gen, storage, virtual machines, scale-out
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
Abstract: Dell EMC VxRail, powered by Intel® Xeon® processors, is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments. Plus, Dell EMC VxRail is more than 30% lower TCO compared to a build-your-own solution. A few of the advantages include: • Deploy Dell EMC 4.6 times faster than build-your-own • 30% Lower TCO - Total cost of ownership compared to Build Your Own • 8.5% LOWER TCA - Total cost of acquisition compared to Build Your Own This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments.
Tags : 
hyperconverged infrastructure, data organization, data management, datacenter
    
Dell EMC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library