event

Results 251 - 275 of 1647Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
The demand for access to email anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn why a service-oriented security perimeter improves security for Exchange.
Tags : 
microsoft exchange, exchange security, email security, email availability, exchange availability, secure exchange access, remote access to exchange, application security, preventing application attacks, application-layer attacks, application firewall, web application firewall
    
F5 Networks Inc
Published By: UL EduNeering     Published Date: Jul 05, 2012
Good Manufacturing Practices (GMP) violations have become the new healthcare fraud as the Department of Justice (DOJ) tests out new legal theories under the False Claims Act (FCA). The Food and Drug Administration (FDA) has dusted off its regulatory authority to prosecute GMP violations.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11, regulatory compliance, pharmaceuticals, medical device, good manufacturing practices, quality system regulation, online compliance training, part 11 compliance, fda part 11 compliance, iso 13485, quality management system, life science, health care
    
UL EduNeering
Published By: Akamai     Published Date: Jul 22, 2010
This slide version of a recorded event delivers key findings of an in-depth consumer survey studying travel Web site functionality and conversion rate satisfaction. Host Margaret Rivera of Akamai and presenter Caroll Rheem, Director of Research at PhoCus Wright, define best practices for fast, reliable travel Web sites.
Tags : 
akamai, travel, site performance, phocuswright, customer experience, usability, travel ecommerce, web load, abandonment
    
Akamai
Published By: TriNet     Published Date: Jul 28, 2015
Identifies the foundational risks that can distract executives from focusing on and achieving their business' goals, and offers recommendations for eliminating those risks altogether.
Tags : 
foundational risks, risk elimination, selection process, compensation practices, performance management system, harassment prevention, best practices, entrepreneurship management
    
TriNet
Published By: LogLogic     Published Date: Mar 15, 2012
"Big Data" is the latest buzzword, yet over 70% of companies don't know what Big Data means and how to solve the data management challenges, finds LogLogic survey.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: LogLogic     Published Date: Mar 15, 2012
IANS CUSTOM RESEARCH AND INFORMATION SECURITY INVESTMENT ANALYSIS (ISIA) REPORT on Log data management and compliance products
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: Lieberman Software     Published Date: Mar 27, 2012
Lieberman Software offers a solution today that helps secure unmanaged privileged accounts in your datacenter and prevent data breaches. Watch how we do it in this brief two minute video.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: Infomatica     Published Date: Mar 05, 2014
It’s no secret—healthcare is transforming. The transition to value-based care is well underway; healthcare players are feeling the impact and each has a role to play, including you! Moving to a value-driven model demands agility from every person, process and technology. These changes are generating more data than ever, there is a lot of data, in fact IDC Global Health Insights predicted that over the next 10 years, the amount of digital healthcare data created annually will grow 44 fold. Organizations that lead the pack and succeed will be those where clinicians, business leaders and patients are empowered with access to clean, safe and connected data. Learn more about your role in putting information to work…
Tags : 
healthcare, technology, business, manage data, hospitals, performance management, value based care, consumerism, convergence, personalized medicine, preventative care
    
Infomatica
Published By: NetApp     Published Date: Nov 13, 2017
Are misperceptions preventing your company from taking advantage of the cloud? Discover why common objections to cloud backup are based on myths rather than reality.
Tags : 
    
NetApp
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Okta     Published Date: May 09, 2016
77 Energy uses Okta to automate provisioning and deprovisioning tasks, so IT can focus on identifying and deploying business solutions, rather than worrying about whether or not users can access them. Hear Chris Dodds share how IT staff help people work efficiently and keep the company free of legacy business practices.
Tags : 
    
Okta
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
The threat landscape has evolved and the traditional approach to endpoint security cannot keep up. Detection/response is not an acceptable approach. There are a number of approaches to prevent threats on the endpoint and their ability to prevent unknown and zero-day threats varies widely. Join this webinar featuring a guest speaker from Forrester where we will discuss the findings from a recent commissioned survey they conducted that evaluates these approaches and illustrates that exploit prevention and integration with a network security platform are must-have capabilities. Forrester will also summarize their recommendations for prevention of advanced threats on the endpoint.
Tags : 
security, endpoint, zero day exploit, forrester, phishing, ddos
    
Palo Alto Networks
Published By: Dynatrace     Published Date: May 20, 2016
For all Development Managers, Operations Managers and DevOps Managers, this eBook by DevOps advocate and author Gene Kim will clearly outline: - How leaders are 2.5x more likely to exceed profitability, market share and productivity goals through DevOps - Why your IT delivery model needs to be continuous and collaborative to meet demands for more features faster - Which Milestones to have in mind when plugging performance into the four pillars - culture, automation, measurement and sharing - How identifying bad patterns earlier in development prevents them from making it into production Start accelerating your own results; read this eBook now.
Tags : 
dynatrace, software development, devops, results, productivity, development
    
Dynatrace
Published By: Dynatrace     Published Date: May 20, 2016
The Art of DevOps: Embark on a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. This eBook gives you, a veteran of application development wars, recommendations that will put you at strategic advantage to win today's war: - Supplement manual tests with automated testing - Add advanced performance monitoring technology to your arsenal to prevent problems from infiltrating your code after check-in - Leverage best-in-class communications and advanced performance monitoring to quickly identify and prevent casualties resulting from poor performance
Tags : 
dynatrace, devops, software development, application development, testing
    
Dynatrace
Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention, best practices
    
Akamai Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Published By: Micron     Published Date: Oct 13, 2016
Micron is uniquely positioned to ease adoption with extensive expertise, advice and support. Secure your data by preventing data breach due to lost or stolen devices.
Tags : 
    
Micron
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data, user authentication
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile
Published By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
    
CrowdStrike
Published By: WorkBook from Deltek     Published Date: Jul 20, 2018
Profitability is the oil in your agency’s engine. Without it your agency could get by for a little while, but eventually it would lose momentum and stall. Ensuring agency profitability isn’t as difficult as it may seem. In this eGuide, you will find 10 actions that you can take immediately to turn your agency into a well-oiled profitability machine
Tags : 
    
WorkBook from Deltek
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
By creating a connected field service ecosystem, organizations can increase their response time, reduce mean time-to-resolution and eventually, power a more predictive service model. This will enable a new level of field service productivity and cost-savings from increased efficiencies. Organizations will also be able to provide exceptional customer experiences consistently. Customer disruption and asset downtime will be minimized, and organizations will be able to empower their field service resources with insight into the issue before they arrive at the customer site. All thanks to a unified field service and IoT strategy.
Tags : 
internet of things, iot, daily activity, industry innovation, field service, organization management, device efficiency, telecommunications
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
The manufacturing industry has entered a completely new technological realm that did not even exist five years ago. Three industrial revolutions forever changed manufacturing—and the world—and the fourth is now underway. Factories have had to adapt rapidly with the advent of advanced automation and robotics as well as software to manage processes and control. The onset of digital manufacturing accelerates the need for new approaches. While consumers typically embrace disruptive technology with enthusiasm, manufacturers inevitably approach new technology with caution, carefully evaluating how it can improve their businesses. Eventually, however, caution must be replaced with innovation to ensure survival. Those organizations that find themselves on the wrong side of the technology curve today will face increasing challenges to remain competitive as time marches forward.
Tags : 
supply chain management, scm, manufacturing, digital manufacturing
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Resource Library