cert

Results 126 - 150 of 930Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Jul 09, 2014
Quarterly Digital Intelligence Briefing in association with Adobe
Tags : 
trends in integrated marketing, quarterly digital intelligence
    
Adobe
Published By: Adobe     Published Date: Jul 09, 2014
Quarterly Digital Intelligence Briefing in association with Adobe
Tags : 
trends in integrated marketing, quarterly digital intelligence
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Aujourd’hui, certaines prévisions sont moins complexes qu’elles ne l’étaient auparavant. Nous disposons désormais d’une quantité d’informations sans précédent sur les consommateurs et de la technologie adéquate pour faire parler les données. Les marketeurs peuvent prévoir avec une grande précision le comportement des clients, parfois même avant que ces derniers ne sachent eux-mêmes ce qu’ils vont faire.
Tags : 
data, information available, customer, customer experience, customer relationship
    
Adobe
Published By: Schneider Electric     Published Date: Oct 17, 2016
Cet article explique certaines causes de blocage des capacités d'alimentation, de refroidissement et d'espace dans les centres de données en collocation et comment la distribution d'énergie des racks haute densité, le confinement d'air et d'autres pratiques améliorent la disponibilité et l'efficacité. Des exemples de politiques d'utilisation acceptables réglant ces problèmes sont présentés.
Tags : 
    
Schneider Electric
Published By: Zendesk     Published Date: Dec 10, 2018
Quando sua empresa começa um novo capítulo, seja mudando de mercado ou lançando novos produtos e recursos, o momento é ótimo para expandir as operações de atendimento ao cliente de maneira inteligente. Sabemos que, se disponível, os clientes preferem usar a base de conhecimento para se ajudarem. Um relatório do Gartner estima que os Diretores de informática podem reduzir os ustos com suporte em 25% ou mais quando uma rotina adequada de gestão de conhecimento é implementada. Se você estava esperando o momento certo para mergulhar de cabeça no autoatendimento, este white paper provará que você e seus agentes já fazem tudo o que precisam para oferecer autoatendimento excelente todos os dias.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jan 04, 2019
Quando sua empresa começa um novo capítulo, seja mudando de mercado ou lançando novos produtos e recursos, o momento é ótimo para expandir as operações de atendimento ao cliente de maneira inteligente. Sabemos que, se disponível, os clientes preferem usar a base de conhecimento para se ajudarem. Um relatório do Gartner estima que os Diretores de informática podem reduzir os custos com suporte em 25% ou mais quando uma rotina adequada de gestão de conhecimento é implementada. Se você estava esperando o momento certo para mergulhar de cabeça no autoatendimento, este white paper provará que você e seus agentes já fazem tudo o que precisam para oferecer autoatendimento excelente todos os dias.
Tags : 
    
Zendesk
Published By: CA Technologies     Published Date: Sep 25, 2017
CA has reevaluated the design methodology behind its PPM tool to deliver an end-user-driven solution that better reflects the goals and motivations of the entire team, helps to ensure project confidence and removes the stress associated with the possibility of project failure. At the core of this new design methodology is our proprietary research, which unquestionably points to the need for an outcome-driven approach to innovation, chiefly concerned with understanding and measuring the customer’s success criteria.
Tags : 
project management, company optimization, execution, product development, research report, web based, business impacts
    
CA Technologies
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Red Hat     Published Date: Feb 22, 2019
Partenaire de confiance de milliers d'entreprises, de fournisseurs de solutions logicielles, cloud et matérielles, ainsi que de la communauté Open Source internationale, Red Hat vous propose sa souscription Red Hat® Enterprise Linux® qui vous donne accès aux innovations et au soutien de la communauté Open Source ainsi que des partenaires certifiés d'un réseau fiable. Les technologies Open Source de Red Hat alimentent l'innovation aujourd'hui et soutiennent les projets qui définissent les technologies de demain. En savoir plus.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat is a trusted partner to enterprise customers; cloud, software, and hardware suppliers; and the global open source community. A Red Hat® Enterprise Linux® subscription provides customers with direct access to innovation and advocacy—within the open source community and within a certified and trusted network of partners. Red Hat Enterprise Linux provides you with an innovative platform that serves as the foundation for your business. It is hardened, certified, and supported by the Red Hat Product Security team, support teams, and certified engineers. Red Hat supports your timelines and advocates for your requirements so you can focus on the work of your business rather than being your own operating system vendor. We use our leadership in the open source community to do the work that brings you the best of open source. Get direct access to: Technology-driven solutions Emerging technology Experience and support Continuous security Timeline support Download the whitepaper to lea
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
Dado que Red Hat es un partner de confianza para miles de clientes empresariales, proveedores de software, nube y hardware, y para la comunidad global de open source, una suscripción a Red Hat® Enterprise Linux® le otorga acceso directo a la innovación y el respaldo dentro de la comunidad de open source y de una red de partners certificada y confiable. La tecnología de open source de Red Hat promueve las innovaciones de la actualidad e impulsa los proyectos de tecnología emergente que darán forma al mundo del futuro. Más información.
Tags : 
    
Red Hat
Published By: Butler Technologies     Published Date: Jul 03, 2018
Industry standards have been established to ensure performance, consistency, and interoperability between network equipment vendors. However, the consistent implementation and operation of these standards become even more critical as speeds and bandwidth increase. At the fiber infrastructure level, this also means more testing may be needed beyond the basic fiber end-face inspection certification and Tier 1 testing. This white paper explores Tier 2 optical time domain reflectometer (OTDR) testing and examines its relationship to Tier 1 testing and how inspection plays into both. This paper defines Tier 2 testing and explains when it is needed. It also addresses the OTDR complexity argument.
Tags : 
    
Butler Technologies
Published By: Pure Storage     Published Date: Oct 09, 2018
Digital technology is so intrinsic to our personal lives that we barely think about the fitness trackers and smartphones that are as much a part of us as the clothing we wear. For organizations, the shift to digital is more disruptive and the stakes far higher. Digital transformation has been high on the executive agenda for a few years and, for many, harnessing data has become a significant force for value and revenue creation. Agility has emerged as an organizational superpower as businesses grapple with change and uncertainty in their own customer bases and in the global political and economic landscape. IT has been thrust into the spotlight as the unwitting hero of the story – tasked with delivering on the digital vision, implementing all manner of applications and building firm infrastructure foundations to support the latest digital initiatives. In an increasingly on-demand world, it is this final point that often gets overlooked in the rush for the next shiny new technologies. E
Tags : 
    
Pure Storage
Published By: Schneider Electric     Published Date: May 31, 2019
Gartner predicts that by 2020, 90 percent of organizations will adopt hybrid infrastructure management capabilities. However, this isn’t easy. With a hybrid IT environment can come complexity, confusion, and even infrastructure fragmentation. And, if you leave this poorly managed, your users, business, and most of all customers will certainly start to notice. In this eBook, we’ll explore the evolution of the enterprise data center, impacts of cloud-powered digital solutions, and how to manage hybrid IT solutions.
Tags : 
hybrid,  digital solutions,  schneider electric
    
Schneider Electric
Published By: CA Technologies     Published Date: Sep 29, 2011
CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.
Tags : 
technology, drivers, security, reduce risk, applications, online service, business, confidentiality
    
CA Technologies
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
With the viability and importance of cloud computing now widely accepted by IT and business leaders alike, the focus of planning, discussion and implementation has shifted to the best approaches for using cloud computing to achieve the all important business goals of agility, flexibility and efficiency. From an architectural standpoint, most organizations have embraced some combination of public and private clouds — sometimes in isolation, other times in concert. But increasingly, large and small organizations alike are taking steps toward the next wave of cloud architecture: hybrid clouds.
Tags : 
private cloud, public cloud, hybrid cloud, cloud computing
    
Dell & Microsoft
Published By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : 
cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse, mobility certificate misuse, malicious codes, security management
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data, certificate security, trust protection platform
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates, security controls
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls, digital certificates, mobile application security, security management
    
Venafi
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organisations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organizations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : 
security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust, certificates
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organisations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : 
security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust, certificates
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library