dam

Results 901 - 922 of 922Sort Results By: Published Date | Title | Company Name
Published By: Turbonomic     Published Date: Nov 12, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how t
Tags : 
    
Turbonomic
Published By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: Oracle     Published Date: Aug 09, 2018
Respaldar es una cosa, recuperarlo es todo. Sin duda usted aprecia la importancia crítica de su base de datos Oracle para el éxito de su empresa. Pero, ¿qué pasa si experimenta un corte de luz o un ataque cibernético? ¿Puede estar seguro de recuperar rápidamente todos sus datos? Las soluciones de respaldo tradicionales dejan los datos expuestos a pérdidas y su negocio está en riesgo. El Zero Data Loss Recovery Appliance de Oracle elimina la exposición y ahorra tiempo, esfuerzo y el estrés de recuperar datos. Descubra cómo nuestros clientes están recuperando sus datos sin drama.
Tags : 
    
Oracle
Published By: Workday Spain     Published Date: Sep 20, 2018
Quali caratteristiche deve avere un buon leader? Questo articolo di Ashley Goldsmith, Chief People Officer di Workday, rivela le lezioni che hanno influenzato di più la sua leadership. Leggilo per sapere perché leadership significa essere al servizio dei clienti e uscire dalla comfort zone è fondamentale per avere successo.
Tags : 
    
Workday Spain
Published By: Uberall     Published Date: Oct 08, 2018
Retail is struggling. Stuck in the past, it relies on old methods to draw customers to stores, and oftentimes is afraid of new technologies — even though it’s clear how to get the fundamental, proven levers right first.
Tags : 
digital, customer, fundamental, technologies
    
Uberall
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Intapp     Published Date: May 10, 2019
How many hours did your professionals spend on this client, on that project, on those tasks? Those are the cornerstone metrics of Old Time. They answered the question, “how much should we bill?” This is still a valuable query, but in this new world in which data is pored over and mined for every bit of its value, it is only one of many questions that firms must ask of its time data. Are our professionals working efficiently? Are we pricing future contracts competitively? Are our projects on budget? Did we miss billable hours? Are our professionals spending too many hours tracking their time? Intapp Time provides the superior business intelligence with which to answer these questions and change your firm’s fundamental relationship with Time.
Tags : 
    
Intapp
Published By: UPS Capital     Published Date: Feb 13, 2019
Commerce today involves an increasingly complicated supply chain ecosystem. Companies rely on suppliers and buyers across the globe, most of whom they’ve never met. They use multiple carriers and modes of transportation, across international borders, with different languages, currencies and laws. This ever-changing landscape means that companies of all sizes must be more diligent than ever when it comes to managing their supply chain — and their risk. In addition, e-commerce has revolutionized purchase behaviors, creating loftier customer expectations, and putting increased pressure on sellers to find new ways to meet those needs. Global networks and tight time constraints can amplify the impact from unpredictable events, like theft, damage, weather and natural disasters. This puts even more pressure on a company’s supply chain, and its bottom line.
Tags : 
    
UPS Capital
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
In recent years, the oil and gas industry has seen accelerated digitization of its operations. As the sector reaps tremendous benefits such as greater efficiency and increased agility, this move has also fundamentally shifted the security paradigm. Oil and gas companies must now protect connected field devices, sensors and control systems, as well as legacy systems, often in low-bandwidth, remote, and challenging environments.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
This white paper discusses Darktrace's Industrial Immune System, a fundamental innovation that views data from an Industrial Control System network in real time, and establishes an evolving baseline for what is normal for operators, workstations and automated systems within that environment.
Tags : 
    
Darktrace
Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust
Published By: Commscope     Published Date: Jun 24, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up. >
Tags : 
    
Commscope
Published By: Virgin Media Business     Published Date: Jul 30, 2019
The world is now digital. From the explosive expansion in data-driven service delivery to digitally disruptive business models such as Uber and Netflix that have fundamentally changed the way we consume products, the digital evolution is unavoidable. As digital continues to advance, it’s crucial that UK businesses can be confident in their ability to keep up to date with the latest trends and technologies. But enhancing existing tools and models is just the beginning. Digital transformation is about taking advantage of new innovations that completely change the way businesses work, the experiences they offer their customers and the value they deliver within their market. To find out more download this whitepaper today.
Tags : 
    
Virgin Media Business
Published By: Virgin Media Business     Published Date: Aug 02, 2019
The world is now digital. From the explosive expansion in data-driven service delivery to digitally disruptive business models such as Uber and Netflix that have fundamentally changed the way we consume products, the digital evolution is unavoidable. As digital continues to advance, it’s crucial that UK businesses can be confident in their ability to keep up to date with the latest trends and technologies. But enhancing existing tools and models is just the beginning. Digital transformation is about taking advantage of new innovations that completely change the way businesses work, the experiences they offer their customers and the value they deliver within their market. To find out more download this case study today.
Tags : 
    
Virgin Media Business
Published By: Workday     Published Date: Sep 30, 2019
Workday started with a clean sheet of paper and created an enterprise software experience in the cloud that is fundamentally different by design.   Watch this video to hear from IT executives about the advantages of the Workday architecture.
Tags : 
    
Workday
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37     Next   End
Search Resource Library