ssa

Results 176 - 200 of 1720Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro SaaS     Published Date: Mar 17, 2009
West Coast Labs performed an anti-spam comparative test on various email solutions related to spam detection rate over a series of at least 100,000 emails per solution.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, sophos, symantec, west coast, interscan, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : 
saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service, spam filter for exchange, hosted antispam, managed antispam, enterprise anti-spam, mcafee, ironport, fortinet, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Datastax     Published Date: May 20, 2019
Data management challenges have evolved drastically over the last decade, leading most companies to rethink how they manage their data. The need for more powerful and far more flexible databases resulted in the birth of the NoSQL database Apache Cassandra™. Read this white paper to learn how Cassandra has evolved and how it works.
Tags : 
    
Datastax
Published By: IBM     Published Date: Mar 13, 2014
An innovation-centric approach that combines SOA and API management provides you with a robust integration from the Internet of Things to enterprise back-end systems. An approach to integration that can also generate new business insight and opportunities.
Tags : 
ibm, api, api management, soa, integration, back end systems, service oriented architecture, enterprise service bus, software
    
IBM
Published By: CA Technologies     Published Date: Aug 24, 2017
Assurer la croissance de votre entreprise est une priorité permanente. Par ailleurs, à mesure que l’économie des applications poursuit son expansion, il est très probable que vous optiez de plus en plus pour des initiatives d’entreprise numérique afin d’alimenter cette croissance.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Assurer la croissance de votre entreprise est une priorité permanente. Par ailleurs, à mesure que l’économie des applications poursuit son expansion, il est très probable que vous optiez de plus en plus pour des initiatives d’entreprise numérique afin d’alimenter cette croissance. Dans ce contexte, vos principaux objectifs doivent être les suivants : • Offrir une expérience numérique de qualité aux consommateurs via les outils mobiles • Développer les marchés et les sources de revenus par le biais de canaux multiples• Connecter les employés et les partenaires aux données de l’entreprise, partout et à tout moment • Lancer de nouveaux services innovants dans l’Internet des objets (IoT)
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La crescita aziendale è una priorità costante. In parallelo all’espansione dell’economia delle applicazioni, è probabile che stiate considerando iniziative di business digitale. Tra gli obiettivi più promettenti di una simile strategia:• Fornire esperienze digitali di qualità superiore ai consumatori attraverso il mobile • Ampliare mercati e flussi di ricavi attraverso canali multipli• Collegare dipendenti e partner ai dati aziendali, sempre e ovunque • Avviare nuovi servizi innovativi nel contesto dell'Internet of Things (IoT)La corretta esecuzione di una strategia digitale richiede la capacità di lanciare nuove applicazioni e coordinare la vostra presenza digitale con i partner. Le API (Application Programming Interface) generano la connettività necessaria per condividere i dati aziendali e i contenuti digitali con quelle applicazioni e con quei partner, tramite Internet. Le API sono una componente essenziale del business digitale: mettono gli sviluppatori in condizione di crear
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Découvrons comment les premiers adeptes de ces technologies ont su gérer avec succès les API pour générer de la croissance.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim, api management, full api lifecycle, restful web services, api portal, gestion des api, portail api, oauth, openid connect, rest json, soap xml, api analytics, orchestration transformation
    
CA Technologies EMEA
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
Is building custom software a necessary evil, a process that’s divorced from the really important parts of a business? Or is the ability to do this well the underpinning of every successful organization? The truth is probably somewhere in between these two extremes. One thing is clear, however: In many organizations, how well a firm executes its business strategies is inextricably tied to how good it is at creating and running new applications.
Tags : 
vsts, alm, application lifecycle management, business strategy, it alignment
    
Microsoft Visual Studio Team System
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Microsoft® Exchange® Server is the undisputed industry leader in corporate messaging. With the release of Microsoft Exchange Server 2007, not only does Exchange continue to provide rich, effi cient access to e-mail, calendars, attachments, contacts, and more, but Exchange Server 2007 adds some exciting infrastructure and performance improvements as well. F5’s comprehensive Application Ready infrastructure for Exchange Server 2007 allows organizations to easily provide additional performance, security and availability, to ensure maximum ROI with the minimum amount of work.
Tags : 
microsoft exchange 2007, application ready network guide, microsoft exchange server, corporate messaging, roi, infrastructure optimization, application security
    
F5 Networks Inc
Published By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : 
black duck, application security, security, open source, code
    
Black Duck Software
Published By: Apptio     Published Date: Jul 16, 2019
Ready to communicate IT cost and value in terms your business unit partners understand? The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Use this poster as a resource to: • Establish better alignment between IT, Finance, and other business units by using common language around IT costs • Confidently manage the business of IT with the backing of peer-derived best practices • Understand 10 essential metrics you should track to communicate the business value of IT
Tags : 
    
Apptio
Published By: Apptio     Published Date: Oct 09, 2019
"Ready to communicate IT cost and value in terms your business unit partners understand? The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Use this poster as a resource to: • Establish better alignment between IT, Finance, and other business units by using common language around IT costs • Confidently manage the business of IT with the backing of peer-derived best practices • Understand 10 essential metrics you should track to communicate the business value of IT "
Tags : 
    
Apptio
Published By: GFI Software     Published Date: Mar 21, 2011
This white paper shall cover the following topics: What archiving is and how it integrates with Microsoft Exchange or a messaging solution; What stubbing is and why Microsoft does not recommend the use of stubbing; How Journaling in Exchange can allow efficient email archiving; How does stubbing compare with Journaling?
Tags : 
gfi, email archiving, compliance, microsoft exchange, messaging solution, microsoft, journaling
    
GFI Software
Published By: Viavi Solutions     Published Date: Jan 06, 2014
Are Agents Necessary For Accurate Monitoring?
Tags : 
network instruments, network performance, infrastructure health, tracking the network
    
Viavi Solutions
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
Do attitudes to IT adoption vary depending on your seniority within a business? And could this be holding back adoption of technology? These are key questions explored in this paper, which compares the views of mid-level ‘hands on’ IT managers with those of senior directors within British companies. Across both groups, there is a sense that UK business in general is too wary of implementing new technology. But there is a significant divergence of opinion when it comes to a range of factors, such as the extent to which companies invest in new technology, stay on top of the latest tech, and understand its importance to the success of the business. A pattern emerges, whereby the senior leaders within companies are far happier than middle managers with the status quo around technology adoption. And IT managers even suggest that this might be driven by self preservation on the part of senior leaders.
Tags : 
video conferencing, instant messaging, cloud based computer system, fixed phone line, pbx, cloud based telephony system, call analytics, byod, wearable technology
    
8x8 Inc.
Published By: Gelato     Published Date: Jul 02, 2018
How far does your marketing material travel before your it gets into your customers’ hands? Or even your colleagues’? What if it could have reached the moon first? That was the case for the annual posters sent by Hydro Extruded Solutions. With Gelato total shipping distances were easily cut 72%. Gelato presented a faster, greener, and smarter way to print and distribute their message — one more step confirming Hydro’s commitment to sustainability. Download this info-graphic to learn more.
Tags : 
    
Gelato
Published By: DataStax     Published Date: Mar 10, 2017
Today’s customers expect a seamless, intelligent and personalized experience that operates at the speed of the cloud and is continuously available regardless of location or platform. To deliver an optimal customer experience that will enable you to stay ahead of competitors you need a distributed, responsive and intelligent architecture which is only possible when the right database is in place. Read this eBook to learn how your database technology decisions can affect your ability to deliver either a transformational customer experience or a lackluster, dissatisfying encounter that benefits your competitors, not your bottom line.
Tags : 
    
DataStax
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data.
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: TIBCO Software     Published Date: Feb 26, 2019
MoneyLIVE’s annual survey of over 600 banking professionals found that traditional banks face a significant challenge when it comes to building AI-powered customer journeys. 75% believe that as the use of AI intensifies, banks will struggle to recruit the necessary expertise. 84% fear regulatory and liability issues surrounding AI. Just 7% think their organization’s use of AI is highly sophisticated. But for banks to keep pace with challengers and FinTechs, it’s crucial that they harness this continually evolving technology. Download this chapter of MoneyLIVE's The Future of Retail Banking Report 2018/19 now and understand how TIBCO’s Connected Intelligence Platform, with the use of AI and machine learning algorithms, can help with banks’ digital transformation needs.
Tags : 
artificial intelligence, machine learning, financial services, retail banking
    
TIBCO Software
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi
    
GFI
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library