ats

Results 201 - 225 of 1844Sort Results By: Published Date | Title | Company Name
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Construction BUSINESS CHALLENGE Proactively prevent business disruption as a result of cyberattacks IT ENVIRONMENT Kaspersky antivirus, layered enterprise security SOLUTION Malwarebytes Endpoint Protection RESULTS Detected and eliminated thousands of threats that other solutions missed Delivered visibility into entire installed base of endpoints, regardless of location Saved time and accelerated response via the cloud console Prevented PUPs and exploits from gaining entry
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
    
MalwareBytes EMEA
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications
    
Absolute Software
Published By: Symantec     Published Date: Jul 09, 2017
This paper provides a brief recap of the functionality provided by web proxies, why proxy architecture is still a vital building block for a comprehensive web defense, and how web proxies can work with other solutions such as next-gen firewall (NGFW) to deepen the organization’s defenses against advanced web-based threats.
Tags : 
cybercrime, swg, secure web gateway, firewall, security., threat and vulnerability management
    
Symantec
Published By: Adobe     Published Date: Apr 25, 2016
Der Schlüssel hierzu sind Daten. Es reicht jedoch nicht aus, Daten einfach nur zu erfassen. Sie müssen anhand der Daten ganzheitliche Kundenprofile erstellen und diese anschließend verwenden, um interessante, personalisierte und nachhaltige Erlebnisse zu entwickeln. Diese dreiteilige E-Book-Reihe erläutert Schritt für Schritt, wie Sie Daten tatsächlich verwenden können, um jedem Kunden das bestmögliche Erlebnis zu bieten.
Tags : 
customer experience, marketing, data management
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
Vor einigen Jahren beschloss die viertgrößte Genossenschaftsbank des US-Bundesstaats Illinois, ihren Marketing-Auftritt komplett umzugestalten. Innerhalb von nur einem Jahr aktualisierte die Baxter Credit Union (BCU) ihr veraltetes Kampagnenverwaltungssystem und zentralisierte die bislang verteilten Mitgliederdaten. Das Ergebnis: ein besseres Kundenerlebnis und eine höhere Rendite.
Tags : 
    
Adobe
Published By: Schneider Electric     Published Date: Oct 17, 2016
Diese Tatsache wirft neuartige Probleme auf, welche die Verfügbarkeit und das Management betreffen.
Tags : 
    
Schneider Electric
Published By: Brightidea     Published Date: Feb 05, 2016
What’s in the eBook? Get this ebook The Secrets To A Successful Innovation Program to find insights from over 100 Brightidea customers and exceptional innovators, including heavyweights BT Group, Cisco, GE, Motorola and more, sharing responses to key questions most enterprises ask – and stats that back up the narrative, like: -Humana experiencing $6.2 million in cost savings from a single innovation challenge campaign. - More than 75% of Nielsen’s innovation challenges resulting in an idea that was implemented. - 95% of Global 500 companies saw improvement in their innovation program. Take a look by filling out the form to download the eBook – and then reach out and let us know if you’d like to be the next success story!
Tags : 
    
Brightidea
Published By: Salesforce Commerce Cloud     Published Date: Oct 04, 2016
Finding growth in an era of unprecedented disruption in retail is, to say the least, challenging. A new survey of more than 300 C-level retail executives reveals where leading retailers are finding opportunities, what distinguishes high-performing retailers from the rest of the pack, the biggest threats, and their long-term views for addressing common challenges. Their experience provides a roadmap for others in finding retail growth.
Tags : 
retail, consumers, security, performance, opportunities
    
Salesforce Commerce Cloud
Published By: LogMeIn     Published Date: Aug 09, 2016
QualiTest Put Rescue and TeamViewer to the Test. Rescue beats Teamviewer in a number of categories. Read on to find out why.
Tags : 
logmein, logmein rescue, teamviewer, qualitest, remote support, customer service, technical support, remote assistance
    
LogMeIn
Published By: CA Technologies     Published Date: Sep 25, 2017
Today’s markets move with incredible speed. You’re bombarded with new competitive threats every day— new companies, new products, and new technologies. At the same time, opportunities are opening up like never before, all demanding sophisticated evaluations and quick decisions. To varying degrees, your competitors may already be adopting agile, and their resulting ability to sense, create and adapt to change may soon leave you at a competitive disadvantage. Your organization can’t afford to be in reactionary mode any longer. You need the ability to anticipate change—and to embrace and capitalize on it quickly and with confidence.
Tags : 
organization, customer focused approach, technology, enterprise, integrations, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Several years into the app economy, business has changed. Accelerating product cycles and competitive threats now demand continuous planning. Change is constant and managing it is more important than ever. As a result, companies that for years have taken a traditional approach to managing initiatives are moving rapidly to implement agile business practices. And they’re seeing results, in the form of improved quality, faster delivery of value, reduced development costs and increased customer satisfaction. But this transition also creates new challenges and responsibilities for the project management office (PMO). In fact, the success of the transformation often hinges on the PMO’s ability to expand the underlying concepts of the agile development methodology into a companywide ethos¬—a concept known as business agility.
Tags : 
decision making, strategically, tools, pmo, entrepreneurial spirit, business, ca technologies
    
CA Technologies
Published By: Tenable     Published Date: Feb 27, 2019
"With the number of vulnerabilities on the rise, and their severity increasing, how can you identify the biggest cyber threats to your business – and know what to fix first? Download the “3 Things You Need to Know About Prioritizing Vulnerabilities” ebook now to: -Discover the 3 critical steps to building an effective vulnerability remediation plan -Explore the pitfalls of popular prioritization approaches -Learn next steps you can take today to dramatically reduce the list of vulnerabilities you need to remediate If you’re looking for answers to questions like “Where should we prioritize based on risk?” and “Which vulnerabilities are likeliest to be exploited?” this quick read is an excellent way to get started. Download the free ebook now."
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
IT-Transformation ist ein Konzept, das heute noch stärker als vor 12 Monaten bei Unternehmen angekommen ist. Es klingt wie ein anderes aktuelles Schlagwort: „digitale Transformation“. Tatsächlich kann eine effektive digitale Transformation nicht ohne IT-Transformation erfolgen. Ein Unternehmen, das seine IT-Infrastruktur transformiert, ist nicht mehr von starren, manuellen, isolierten LegacyTechnologien abhängig. Es verzeichnet eine Steigerung der IT-Betriebsgeschwindigkeit, Effizienz, Skalierbarkeit und Wirtschaftlichkeit: Aufgaben werden automatisiert, Prozesse rationalisiert und Ressourcen freigesetzt. Diese ITVerbesserungen unterstützen eine umfangreichere digitale Transformation, mit der das Unternehmen in der heutigen digitalen Wirtschaft bestehen kann. Es übertrifft seine Mitbewerber in Sachen Innovation, Vordenken und Geschwindigkeit und wird letztendlich selbst Disruptor statt Leidtragender.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
Les responsables métiers et IT sont d’accord. La transformation de l’IT joue un rôle critique pour maintenir sa compétitivité dans l’économie numérique. Favorisez l’innovation et l’agilité, réduisez les coûts et accélérez le déploiement pour obtenir des résultats concrets. Modernisez votre infrastructure grâce à des systèmes hyperconvergés, Cloud, de stockage des données, de serveurs, de mise en réseau ouvert et de protection des données leaders sur le marché, créés par Dell EMC et optimisés par Intel ®
Tags : 
    
Dell EMC & Intel
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library