ats

Results 176 - 200 of 1844Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: May 18, 2017
According to industry analyst IDC, the mean cost of an hour of downtime can range from USD 224,952 to USD 1,659,428, depending on the size of your organization.1 And each instance of downtime increases your total cost of ownership (TCO) and eats away at your IT budget.
Tags : 
tco, idc, ibm, cloud, mobile, hardware
    
IBM APAC
Published By: CA Technologies     Published Date: Jun 27, 2014
Comment réduire les contraintes liées aux processus sans coûts supplémentaires? La solution: un logiciel qui rassemble développement et opérations. Découvrez dans notre livre blanc gratuit « Que savent les grandes entreprises du DevOps ? » comment concrétiser l’approche DevOps au sein de votre entreprise. La démarche DevOps n’est plus une simple tendance. Lors d’une récente enquête menée auprès de 1 300 professionnels IT dans le monde, la société d’études de marché Vanson Bourne a constaté que le DevOps est devenu une stratégie informatique incontournable. Partout dans le monde, les entreprises comptent désormais sur cette méthode pour améliorer leurs processus métier, avec des résultats quantifiables.
Tags : 
devops, application development
    
CA Technologies
Published By: Webroot     Published Date: Nov 02, 2012
This paper looks at this problem and how Webroot, by going back to the drawing board on counering malware threats, is revolutionizing endpoint protection and solving the issues that hinder existing endpoint security solutions.
Tags : 
antivirus protection, endpoint protection, endpoint security, malware
    
Webroot
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application, technology, solution
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
security, data, users, infrastructure, bluecoat
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile, workforce, bluecoat, security
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
gateway, web, security
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure
    
Blue Coat Systems
Published By: FireEye     Published Date: Feb 12, 2013
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate.
Tags : 
fireeye, critical it, effective defense, ema, fireeye technology, security technology
    
FireEye
Published By: Red Hat     Published Date: Jan 01, 2013
A study of 21 companies commissioned by Red Hat, found that infrastructure platforms based on Red Hat Enterprise Linux experienced 34% lower total cost of ownership per user compared to platforms running Windows Server. Included were server infrastructure costs, staffing efficiencies, and lost productivity.
Tags : 
red hat enterprise, reduce tco, total cost of ownership, infrastructure, operational costs, server infrastructure, server costs, hardware maintenance
    
Red Hat
Published By: Oracle     Published Date: Aug 08, 2013
Oracle Sales Cloud is Smarter SFA that helps Managers know more. Hit your target with no surprises. Act on opportunities and threats faster. Manage more effectively anywhere, using any device.
Tags : 
oracle sales cloud, oracle, cloud, sales, sfa, crm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Oracle Sales Cloud is Smarter SFA that helps Managers know more. Hit your target with no surprises. Act on opportunities and threats faster. Manage more effectively anywhere, using any device.
Tags : 
oracle sales cloud, oracle, cloud, sales, sfa, crm
    
Oracle
Published By: Venafi     Published Date: Mar 26, 2015
Gartner expects that by 2017, more than 50% of network attacks will use SSL/TLS. Yet most organizations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative. Download this Solution Brief: Eliminate Blind Spots in SSL Encrypted Traffic to learn how.
Tags : 
blind spots, ssl encrypted traffic, network attacks, tls, decryption, security threats
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
    
Venafi
Published By: Comcast Business     Published Date: Feb 16, 2017
When you’re running your own business, you have to wear many hats. But it’s tough to be an expert in everything from strategy to day-to-day execution across multiple functions: finance, operations, sales and marketing, HR, and more. This comprehensive guide offers tips and advice from a wide range of experts across to help you build, run, and grow your business effectively.
Tags : 
    
Comcast Business
Published By: HP Inc.     Published Date: Feb 03, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
    
HP Inc.
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: IBM APAC     Published Date: May 18, 2017
Technological advances are transforming the way we connect, disrupting the status quo and creating huge turbulence. Industries are converging, and new opportunities and threats are emerging, as never before. So how are CIOs managing their way through the mayhem? In the first installment of our latest C-suite Study, we interviewed 5,247 top executives to find out what they think the future holds and how they’re positioning their organizations to prosper in the “age of disruption.” This report delves more deeply into the views of the 1,805 CIOs who contributed to our research – and what the IT gurus of the most successful enterprises do differently.
Tags : 
insights, technology, cios
    
IBM APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library