work practices

Results 251 - 275 of 380Sort Results By: Published Date | Title | Company Name
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: WANdisco     Published Date: Oct 15, 2014
In this Gigaom Research webinar, the panel will discuss how the multi-cluster approach can be implemented in real systems, and whether and how it can be made to work. The panel will also talk about best practices for implementing the approach in organizations.
Tags : 
wandisco, wan, wide area network, hadoop, clusters, clustering, load balancing, data
    
WANdisco
Published By: IBM     Published Date: Oct 14, 2014
Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.
Tags : 
flexible workplace, user mobility, user support, productivity management
    
IBM
Published By: IBM     Published Date: Oct 06, 2014
IBM has worked for years with retailers to help them develop a complete Omni-channel Commerce solution that integrates various channels and provides a foundation that helps enable the seamless experience that consumers are looking for. Due to this joint effort, IBM provides the only Commerce Solution that can truly support a unique and personalized buying experience for consumers that incorporates marketing, selling, fulfillment, and returns across all physical and digital channels. This paper describes the best practices needed to enable a store to meet the cross-channel expectations of the customer and the ever-increasing order volumes of Omni-channel fulfillment.
Tags : 
omni-channel commerce, store enablement, channel integration
    
IBM
Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft
Published By: EMA     Published Date: Oct 01, 2014
A new mantra is emerging for IT professionals – Quality of Experience (QoE). In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones of watching network and system health metrics to begin measuring and understanding the experience IT end users are having. Join EMA Vice President of Research, Jim Frey, and Fluke Networks Director of Products, Doug Roberts, for this on-demand webinar and discussion that will reveal:
Tags : 
quality of experience, qoe, monitoring, network, systems, applications, services, proactive practices
    
EMA
Published By: Vindicia     Published Date: Sep 23, 2014
Vindicia has witnessed numerous best practices working with innovative digital businesses and noticed that companies that communicate the most effectively tend to follow three key practices consistently. This ebook give you three essential communication practices.
Tags : 
communication lifecycle, social network, communication practices, recurring billing, customer communication, consumers, digital goods, promotional offers
    
Vindicia
Published By: Workfront     Published Date: Sep 18, 2014
As marketers, we know our best work is fueled by time to think, brainstorm and explore different directions. But in a world of endless email, status meetings and countless other distractions, finding time to do great work seems to be a lofty dream rather than reality. Check out this white paper by MarketingProfs to learn 4 best practices to find time to do your best, most satisfying work. You’ll learn how to: • Reduce interruptions • Spend less time tracking work • Reduce random work requests • Stop chasing information and requirements
Tags : 
strategies, creative work, brainstorm, status meetings, work requests, information and requirements
    
Workfront
Published By: New Relic     Published Date: Sep 17, 2014
So you’re ready to plunge headlong into DevOps. Right on! You’ve done your homework, and you realize that in order to keep up with the rapid pace of business today, you need to implement DevOps practices at your organization. Yet despite the obvious benefits, such as faster deployments and fewer failures, the rest of your organization may not be so enthusiastic. This eBook will help you familiarize yourself with the common barriers to DevOps adoption so that you can come up with ways to win over the skeptics—and get your organization’s DevOps movement rolling.
Tags : 
devops, benefits, deployments and fewer failures, successful transition, common barriers, devops implementation
    
New Relic
Published By: IBM     Published Date: Sep 16, 2014
In a world that demands scalability, modularity, quality, fast performance and a best practices approach is key to ensuring predictable results for the business. IBM’s PowerLinux Open Source Infrastructure Services solution is a workload-optimized system that meets or exceeds best practices for a virtualized infrastructure at a reasonable price point. The PowerLinux solution can help turn today’s IT infrastructure into a well-tuned utility, providing a more flexible, scalable and valuable asset to the business.
Tags : 
virtualized infrastructure, it infrastructure, deployment options
    
IBM
Published By: McAfee     Published Date: Sep 15, 2014
High availability is a must in our current cyberculture, and several advanced features that should be part of your next-generation firewall can help ensure that your network and your enterprise are continually up and running.
Tags : 
network high availability, firewall, best practices, it security management
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network survival, network security management, best practices, firewalls, hacker detection
    
McAfee
Published By: Juniper Networks     Published Date: Sep 10, 2014
To learn how to improve business agility and your network architecture, download the Whitepaper on building a business case for virtualization. Find out how your network can deliver new levels of performance and resiliency.
Tags : 
network architecture, virtualization, secure network, juniper, best practices
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
To find out how a simple, open and smart network accelerates the deployment and delivery of applications, read the Whitepaper on network virtualization best practices. Find out how to transform and bridge the virtual and physical network.
Tags : 
network virtualization, best practices, overcoming challenges, network acceleration, deployment, delivery of applications
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Download this Ponemon Institute Report on the value of emerging network security technologies. Get the views of 4,500 IT security practitioners and find out which of the rapidly emerging technologies really are effective.
Tags : 
network security, security technology, emerging technology, juniper, best practices
    
Juniper Networks
Published By: CradlePoint     Published Date: Sep 04, 2014
The automotive environment can be particularly harsh for electrical equipment such as routers and mobile devices. Power in automotive systems is not stable and is often subject to fluctuations and noise. This paper will provide background on the problems and solutions as well as guidance for the installation of CradlePoint devices. We’ll recommend some commercially available products to help minimize the effects of the harsh automotive power environment.
Tags : 
cradlepoint, unstable power in automotive systems, harsh automotive power environment
    
CradlePoint
Published By: CradlePoint     Published Date: Sep 04, 2014
Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
Tags : 
security risks, crisis communications, security breaches, compromising customer data
    
CradlePoint
Published By: Dropbox for Business     Published Date: Aug 27, 2014
In this webinar, Mobify Solutions Engineer Kyle Young and Dropbox Solutions Architect Rajan Kapoor will discuss how organizations large and small are embracing mobile work, to their advantage. They will also outline five strategies you can use today to make sure employees have the flexibility they need.
Tags : 
productivity, dropbox, mobile work, mobile trends, best practices
    
Dropbox for Business
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library