work practices

Results 301 - 325 of 377Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 10, 2013
Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.
Tags : 
workplace environment, enterprise, flexible workplace, ibm, enhance productivity, workplace environment, forward thinkers, achieve success, productivity, spur innovation, user mobility, user support, collaboration, security
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless, business benefits, mobile traffic, gaining traffic, employing practices, mobile infrastructure, infrastructure maturity, mobile devices, data breach, enterprises
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.
Tags : 
cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan, cmx
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Interest in cloud computing over the last several years has been phenomenal. For cloud providers, public or private, it will transform business and operational processes, streamlining customer on-ramping and time to market, facilitating innovation, providing cost efficiencies, and enabling the ability to scale resources on demand. Cisco's Virtualized Multi-tenant Data Center (VMDC) system defines an end-to-end architecture, which an organization may reference for the migration or build out of virtualized, multi-tenant data centers for new cloud-based service models such as Infrastructure as a Service (IaaS).
Tags : 
cisco, design, network architecture, mobile devices, best practices, vmdc, data center, cloud computing, iaas
    
Cisco
Published By: Cisco     Published Date: Jun 03, 2015
Networking dashboard video and demo with a raffle prize of an apple or android watch.
Tags : 
networking, api, applications, management, visualizing, best practices, design, cvd, cisco
    
Cisco
Published By: WANdisco     Published Date: Oct 15, 2014
In this Gigaom Research webinar, the panel will discuss how the multi-cluster approach can be implemented in real systems, and whether and how it can be made to work. The panel will also talk about best practices for implementing the approach in organizations.
Tags : 
wandisco, wan, wide area network, hadoop, clusters, clustering, load balancing, data, big data, data storage, storage
    
WANdisco
Published By: Polycom     Published Date: Aug 16, 2017
"Collaboration technology has the potential to transform many aspects of the IT department’s working practices. Discover how collaboration technology enables IT departments to be more productive, efficient, and agile."
Tags : 
polycom, collaboration technology, it agility, efficiency
    
Polycom
Published By: SurveyMonkey     Published Date: Aug 25, 2015
SurveyMonkey Audience fielded a Direct Mail Offer Test study on four direct mail pieces to demonstrate how to successfully test marketing offers.
Tags : 
direct mail, surveymonkey, testing framework, test marketing, best practices, key performance metrics, testing surveys, crm, data insights, market research
    
SurveyMonkey
Published By: DocuSign     Published Date: Jul 12, 2019
Industry experts predict that successful businesses will soon become 100% digital for all transactions. Sales organizations that leverage digital technology close more deals faster, improve the customer experience, and gain clear competitive advantages. Sales professionals are most effective when they’re equipped with the best tools. A mobile-enabled electronic workflow is becoming essential to optimize efficiency and provide teams with true flexibility. This best practices paper outlines eight important ways that sales teams can make meaningful progress in their digital transformations.
Tags : 
    
DocuSign
Published By: Symantec     Published Date: Jan 04, 2012
Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: IBM     Published Date: Oct 14, 2014
Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.
Tags : 
flexible workplace, user mobility, user support, productivity management
    
IBM
Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn how a simple, open and smart network can help with accelerating the deployment and delivery of applications. This Whitepaper on Network Virtualization best practices explains how to transform and bridge the virtual and physical networks.
Tags : 
network virtualization, best practices, networking, juniper, juniper networks
    
Juniper Networks
Published By: SAS     Published Date: Mar 31, 2016
The Internet of Things is much talked about and fast becoming a fixture in some industries. And the technologies for transformative business applications are at hand. Yet many companies are slow to recognize and act on the opportunities. To explore those business opportunities, the associated implementation challenges, and how companies can accelerate their progress, IIA spoke with Jason Mann, Director of Industry Product Management at SAS.
Tags : 
business optimization, business strategy, network management, business applications, best practices
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
Organizations in pursuit of data-driven goals are seeking to extend and expand business intelligence (BI) and analytics to more users and functions. Users want to tap new data sources, including Hadoop files. However, organizations are feeling pain because as the data becomes more challenging, data preparation processes are getting longer, more complex, and more inefficient. They also demand too much IT involvement. New technology solutions and practices are providing alternatives that increase self-service data preparation, address inefficiencies, and make it easier to work with Hadoop data lakes. This report will examine organizations’ challenges with data preparation and discuss technologies and best practices for making improvements.
Tags : 
    
SAS
Published By: Spredfast, Inc.     Published Date: Aug 30, 2011
Learn how to plan and execute successful social media initiatives with this 28-page framework including best practices on developing your social media strategy, writing day-to-day content and managing your social media team.
Tags : 
spredfast, social media management, social media strategy, social media planning, twitter, facebook, linkedin, youtube, flickr, social business, engagement, awareness, monitoring
    
Spredfast, Inc.
Published By: Workfront     Published Date: Sep 18, 2014
As marketers, we know our best work is fueled by time to think, brainstorm and explore different directions. But in a world of endless email, status meetings and countless other distractions, finding time to do great work seems to be a lofty dream rather than reality. Check out this white paper by MarketingProfs to learn 4 best practices to find time to do your best, most satisfying work. You’ll learn how to: • Reduce interruptions • Spend less time tracking work • Reduce random work requests • Stop chasing information and requirements
Tags : 
strategies, creative work, brainstorm, status meetings, work requests, information and requirements
    
Workfront
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library