it landscape

Results 326 - 350 of 662Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
    
Symantec
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent
    
ESET
Published By: Riverbed     Published Date: Nov 02, 2016
"In the cloud era, businesses need levels of agility that traditional networks can’t provide. The software-defined WAN (SD-WAN) is emerging at branch offices and other remote locations to drive increased efficiencies and to optimize user experiences across cloud applications and services. What you’ll learn from this powerful resource: Why the SD-WAN market is expected to hit $6B by 2020. The products and services that form the SD-WAN landscape. Some essential guidance for SD-WAN planning and implementation."
Tags : 
    
Riverbed
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Worried about cybercriminals taking down your business? Outsmart them with Windows 10. The threat landscape has evolved dramatically in recent years. It seems every day we hear another headline about an organization getting breached. We've responded by changing the architecture of Windows 10 so that we’re not just building bigger walls against these attacks; we’re locking the criminals out. Windows 10 provides a comprehensive set of protections against modern security threats. Download this Infographic to learn more!
Tags : 
    
Microsoft Windows
Published By: RICOH     Published Date: Jun 09, 2017
Through this report we aim to assist employers as they prepare for change and give them confidence that they have the invaluable support of their staff.
Tags : 
digital transformation, work place, work landscape, change
    
RICOH
Published By: RICOH     Published Date: Jun 09, 2017
Download this infographic to discover some interesting statistics in these times of change.
Tags : 
digital transformation, work place, work landscape, change
    
RICOH
Published By: Epicor     Published Date: Aug 03, 2012
Distribution executives can no longer afford to view their IT department as merely a cost center. In today's competitive landscape, information technology represents a strategic, cost-saving, revenue-generating differentiator.
Tags : 
saas, software as a service, service-oriented architecture, soa, web 2.0, virtualization, report cards, balanced scorecards
    
Epicor
Published By: Pivotal CRM     Published Date: Dec 21, 2007
Most businesses today are under increasing pressure to respond to change expeditiously—to adapt to the ongoing needs and demands of their customers, the changing competitive landscape, and the evolution of the marketplace. An organization’s CRM system can either effectively support or hinder their business agility and capacity to respond to change, affecting overall corporate performance and customer satisfaction.
Tags : 
pivotal, crm, customer relationship management, sfa, sales force automation, salesforce, flexibility, architecture
    
Pivotal CRM
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Tags : 
entrust, malware, history, threat, concern, virus, sql, stuxnet
    
Entrust Datacard
Published By: Symantec.cloud     Published Date: Sep 12, 2012
Download this whitepaper to discover the four key things you should know about securing small to medium enterprises in the current business landscape.
Tags : 
smb, data security, database security, backup and recovery, data loss, malware
    
Symantec.cloud
Published By: Unica     Published Date: Jun 07, 2010
Email excellence is a moving target. Improve your aim and stay on top of the trends. Download Top Email Trends of 2010 to find out what you should watch for and why, and to review the top trends every email marketer must understand in order to remain effective and relevant in the years to come. Learn how to optimize email delivery rates, ensure message integrity and readability, and to protect your online reputation in a rapidly evolving and complex email marketing landscape.
Tags : 
unica, email, emarketing, esp, email trends, social media, spam
    
Unica
Published By: PC Mall     Published Date: Jun 22, 2011
This white paper from Microsoft discusses the underlying economics driving the transition from mainframe to client/servers. The economics of the cloud, by using in-depth modeling, is also reviewed to better understand the long-term IT landscape.
Tags : 
cloud computing, virtualized datacenter, network security, private cloud, public cloud
    
PC Mall
Published By: BMC     Published Date: Dec 03, 2012
Read EMA's Impact Brief to get a detailed evaluation of the new capabilities of BMC Control-M V8, and learn how the latest version of BMC Software's workload automation software fits within the current industry landscape.
Tags : 
workload automation, bmc control-m, control-m, job scheduling
    
BMC
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
    
ForeScout
Published By: McAfee     Published Date: Jan 23, 2013
Information security based on regulatory compliance stipulations cannot keep up with today’s sophisticated and rapidly changing threat landscape. CISOs need to implement a new discipline that ESG calls, “Real-time Risk Management."
Tags : 
enterprise strategy group, esg, jon oltsik, real-time risk management, threats and vulnerabilities
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
McAfee
Published By: Symantec Corporation     Published Date: Mar 21, 2014
This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Oracle     Published Date: Apr 03, 2018
Effective collaboration between marketing and IT continues to be crucially important. As we enter an era where our business agility will be defined by the flexibility of operation of our marketing tools, technology in marketing is a key focus. Read ‘The guide to building your marketing technology stack’ to learn more about how technology can enhance every area of marketing: • Rediscover the technology in marketing landscape • Explore the latest in marketing automation • See how content and social fit into your overall strategy
Tags : 
    
Oracle
Published By: Cisco     Published Date: Jun 03, 2015
This is a free offer about the changes consumer behaviors have on the retail landscape.
Tags : 
retail, competitors, technology, consumer behavior, landscape, internet, digital
    
Cisco
Published By: Adobe     Published Date: Jun 26, 2019
The world of advertising has become a complex tangle of organizational silos, disconnected platforms, and scattered customer data, turning even the simplest media buy into a chaotic event. But it doesn’t have to be this way. When you unify your audience data, media inventory, and performance results you get a clear view of ad activity and investment. So you can better allocate budgets. And dramatically boost your return on ad spend. Read Behind every great ad, there are a million digital connections for valuable insights on: - How the fragmented ad landscape keeps you from connecting with customers - Strategies for integrating technology and data to reach customers everywhere - Tips for recovering from data loss — and avoiding it altogether.
Tags : 
    
Adobe
Published By: Polycom     Published Date: May 12, 2015
The infographic Top Challenges of 2015 for Financial Institutions outlines the industry’s trends and landscape.
Tags : 
polycom, finance, best practices, fsi, business model, technology
    
Polycom
Published By: SAP     Published Date: Mar 22, 2016
In the new digital economy, competition, consumer engagement, and operational effectiveness are fundamentally changing, and accelerating. New competitors are redefining the landscape at unprecedented rates. Building and keeping trust mean delivering exceptional brand experiences, every time, via agile processes that balance consumer needs with cost to serve. One size does not fit all. Engaging consumers and capitalizing on new opportunities depend on the capacity to identify, act on, and deliver high-value experiences and outcomes like joy, confidence, security, and control, all in the span of a moment, exactly where and when a consumer or business need arises. Miss the moment, miss the opportunity.
Tags : 
digital economy, value creation, sap, consumer engagement
    
SAP
Published By: Turn     Published Date: Mar 09, 2016
No marketer wants to risk the integrity of their brand by displaying ads in unsafe locations. In the great cross-channel chase for customers, advertisers want to engage target audiences in as many contexts as possible – across devices, media, and ad formats. Find out how the right brand safety tools can help your navigate this complex landscape, and deliver the right creative in the right context, every time.
Tags : 
programmatic, ebook, brand protection, brand safety, omnichannel advertising, multichannel advertising, dsp, demand side platform
    
Turn
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library