sme

Results 276 - 300 of 635Sort Results By: Published Date | Title | Company Name
Published By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : 
ecommerce, payments, online payments, small business, fraud, security, card payments, card data, pci dss, e-retail, data breach, hacking, sql injection, malicious web shells, cyber security, sme
    
Worldpay
Published By: HP     Published Date: Jul 29, 2008
This white paper describes an energy audit tool which can lead to significant decreases in the costs of running a data center.  Thermal Zone Mapping (TZM) is a visualization tool developed to present in graphical format high level thermal metrics developed by HP and targeted for use as part of the HP Data Center Thermal Assessment service. This tool uses data generated from computer models of the data center and generates metrics, which are then post-processed and visualized in the three-dimensional data center space.
Tags : 
heat, data center, heat monitoring, hardware, datacenter, mission critical
    
HP
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: Dell     Published Date: Oct 20, 2008
Windows Vista incorporates a number of new and enhanced security features that address spyware, security vulnerabilities and end user naiveté.
Tags : 
dell, cyber security shield, windows vista security, vista uac, dell assessment
    
Dell
Published By: Dell     Published Date: Oct 20, 2008
Efficient desktop application management is essential in normal day-to-day operations of any company. Whether you are introducing a new application or implementing an OS migration, the goal is the same: minimize disruptions and ensure user productivity throughout the process.
Tags : 
dell, application management assistance, application assessment, application rationalization, testing application compatibility
    
Dell
Published By: Dell     Published Date: Oct 21, 2008
The Microsoft Assessment and Planning Solution Accelerator (MAP) tool makes it easy for you to assess your current IT infrastructure and determine the right Microsoft technologies for your needs. The data and analysis provided by this tool can help simplify planning a Windows Vista migration.
Tags : 
dell, vista, windows, hardware inventory, compatibility analysis, map
    
Dell
Published By: Dell     Published Date: Oct 23, 2008
The Dell Deployment Optimization Calculator is a TCO tool designed to analyze current PC deployment practices, make recommendations and quantify the value of improving practices.
Tags : 
dell, deployment optimization calculator, deployment assessment, deployment optimization practices
    
Dell
Published By: Dell     Published Date: Oct 23, 2008
To perform a successful and cost-effective Windows Vista migration, organizations must have a readiness plan in place. Assessing readiness can help your organization understand the current level of capability and maturity, and provide a guide for addressing trouble spots.
Tags : 
dell, vista readiness assessment, cost-effective vista migration
    
Dell
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
On March 10, 2008, F5, a leader in application delivery, and WhiteHat Security, an innovator in application security assessment, announced they would be partnering to create an integrated Web application assessment and firewall technology. This product integration will incorporate WhiteHat’s Sentinel assessment technology and F5’s ASM attack blocking technology into a single solution.
Tags : 
web application assessment, defense technologies, whitehat security, web application vulnerabilities
    
F5 Networks Inc
Published By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: HP Data Center     Published Date: Feb 18, 2009
Today's IT executives are not only expected to create and maintain high-availability IT environments, but they are also expected to implement green initiatives to satisfy customers, analysts, and government agencies that are worried about the impact of modern, energy-thirsty data centers on the environment. Is such a dual mandate reasonable? Can companies be expected to maintain service levels and reduce their carbon footprints at the same time? The White Paper offers a description of the different types of services available to improved energy efficiency data center design and a prescription for successful implementation.
Tags : 
hp data center, energy efficiency, data center, high-availability it environments, green initiatives, it infrastructure, epeat, global commerce, hvac, crah, cdpr, power usage effectiveness, pue, go green, dcie
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that when properly designed, built and operated, are an integral part of the business strategy driving the success of any enterprise, yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems, with little thought given to the structure and space in which it is to be housed, serviced and maintained. This invariably leads to facility infrastructure problems, such as thermal hot spots, lack of UPS, rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained.
Tags : 
hp data center, data center, optimization, business strategy, hot spots, mission critical loadsā€¯, the it infrastructure, the availability, it architecture, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments
    
HP Data Center
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Oct 23, 2007
Today's use of virtualization technology allows IT professionals to automatically manage the resources of the physical server to efficiently support multiple operating systems, each supporting different applications. This IDC Technology Assessment presents IDC's view of how virtualization technologies are impacting and will continue to impact operating environments and the operating environment market near- and long-term.
Tags : 
vmware, operating environments, virtualization, x86, server virtualization, data center, fc san, fibre, networkattached storage, nas, nic, high availability, vmware consolidated backup, vcb, vdc os, tco, total cost of ownership, vstorage, distributed power management, dpm
    
VMware/Intel Server Refresh and Cost Savings
Published By: Revinetix, Inc.     Published Date: Nov 03, 2010
The new disk-based backup products geared to small to medium enterprise (SME) businesses are being enhanced with enterprise-class product features at prices that are getting less and less expensive, making it feasible to back up from disk to removable disks and do away with tape backups altogether. Read this white paper for more information.
Tags : 
revinetix, migration, disk backups, small to medium enterprise, sme, backup management, data protection, tape backup, disk backup
    
Revinetix, Inc.
Published By: Citrix Systems     Published Date: Feb 10, 2016
The study focuses on the value organizations can enable when migrating to NetScaler SDX. It accounts for the cost of deploying NetScaler against the savings from these benefits to provide a comprehensive assessment of the ROI and net value of the investment in NetScaler.
Tags : 
    
Citrix Systems
Published By: SuccessFactors, Inc.     Published Date: Aug 30, 2011
Learn how small companies can achieve growth and productivity goals and ultimately transform themselves.
Tags : 
successfactors, small businesses, integrated talent management, smart goals, maturity curve, performance assessment, goal alignment
    
SuccessFactors, Inc.
Published By: SHL     Published Date: Dec 13, 2011
47 business outcome studies were conducted for clients across multiple industries for the 2011 Business Outcomes Studies Report. It demonstrates the value of online talent measurement solutions against metrics specific to the goals of each organization.
Tags : 
bos, business outcomes study, business outcomes, outcomes study, business study, business objectives, people intelligence, outcomes report, employment testing, assessment simulations, ats, applicant tracking systems, talent development, business challenges, talent management, assessment program, assessment solutions, assessments, talent measurement, turnover
    
SHL
Published By: SHL     Published Date: Dec 13, 2011
SHL's Global Assessment Trends Report provides human resources professionals and those interested in learning about global assessment practices a comprehensive look at how organizations around the world measure talent.
Tags : 
gatr, trends, trends report, global assessment trends, global assessment trends report, global assessments, talent measurement practices, talent measurement trends, people intelligence programs, people intelligence, global assessment practices, remote testing, social media, interview, selection, recruiting, hiring practices, talent management, workforce programs, human resources professionals
    
SHL
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
Answer a few questions about your database management practices, and get a better understanding of your organization's ability to ensure highly available database services.
Tags : 
database, database assesment tool, database services, customer confidence, database availability, database management, database management practices, orcale database appliance, intel xeon processors, database deployment, databse maintenance
    
Oracle Global Marketing
Published By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : 
risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention, skillsoft, human resources, corporate counsel
    
Skillsoft
Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft
Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control, maps, leading, compliance, mandates, and helps, automate, grc, operations, federal, rules, nerc, ffiec
    
ForeScout
Published By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : 
gartner magic quadrant, network access control, forescout, leader in network access control, nac, overall viability, it management
    
ForeScout
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library