event

Results 101 - 125 of 1657Sort Results By: Published Date | Title | Company Name
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report
    
Arbor Networks
Published By: ArborNetworks     Published Date: Sep 16, 2015
Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.
Tags : 
    
ArborNetworks
Published By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : 
arbor, ddos, protection, enterprise, data security
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. This report covers actuals for 4Q14 and 1Q15.
Tags : 
arbor network, ddos, service provider, biannual report
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data
    
ArborNetworks
Published By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : 
idm, identity management, user monitoring, identityview, enterpriseview, logs, siem, event logs
    
ArcSight
Published By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : 
fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats
    
ArcSight
Published By: ArcSight     Published Date: Mar 04, 2009
This whitepaper will outline the drivers for log management as well as their underlying challenges and drive towards a common set of requirements for evaluation of log management tools.
Tags : 
log management, logs, siem, arcsight logger, event logs, security, compliance, regulatory audits
    
ArcSight
Published By: Arkadin     Published Date: Sep 11, 2013
In line with economic recovery, marketing professionals are hard-pressed to achieve lofty marketing and sales goals, with increased pressure on driving higher ROI. Webcasts are scalable events enabling marketers to educate prospects, nurture leads, and retain customers without strain on time and budget.
Tags : 
webcast, web conferencing, webinar, web collaboration, webinars, web events, web collaboration, online meeting
    
Arkadin
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The proliferation of remote and unmanned facilities is exposing many enterprises to devastating events. The need is to not only detect a threatening condition, but to also get a precise message to the person who is prepared to do something about it.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla
    
ASG Software Solutions
Published By: ASME     Published Date: Oct 03, 2019
One of the most frustrating aspects of the measurement of severe pyroshock events is the acceleration offset that almost invariably occurs. Dependent on its magnitude, this can result in large, low-frequency errors in both shock response spectra (SRS) and velocity-based damage analyses. Fortunately, recent developments in accelerometer technology, signal conditioning, and data acquisition systems have reduced these errors significantly. Best practices have been demonstrated to produce offset errors less than 0.25% of Peak-Peak value in measured near-field pyrotechnic accelerations: a remarkable achievement. This paper will discuss the sensing technologies, including both piezoelectric and piezoresistive, that have come together to minimize these offsets. More important, it will document the many other potential contributors to these offsets. Included among these are accelerometer mounting issues, cable and connector sources, signal conditioning amplitude range/bandwidth, and digitizi
Tags : 
    
ASME
Published By: Asure Software     Published Date: Jun 22, 2012
Meeting Room Manager now gives you the option to share your company's reservations and events with others via SocialView - an innovative new optional add-on that's essentially a public, shared online calendar, view-only interface that you control. Integrate this online calendar creator option into your internal or external website, and you'll be able to announce event information and room availability in an instant.
Tags : 
asure software, desktop, technology, business, content management, application integration
    
Asure Software
Published By: AT&T     Published Date: Jun 25, 2008
Most companies have plans in place to ensure employee-to-employee communications following a business disruption event (BDE). But many companies haven’t addressed how communications will be maintained with partners (suppliers, vendors, channel partners, etc.) and customers.
Tags : 
disaster recovery, high availability, disruption, downtime, disaster, business continuity, communications, att
    
AT&T
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Security Event & Threat Analysis Service, a full service security monitoring, mitigation and compliance solution.
Tags : 
at&t, security event, threat analysis, security monitoring, compliance, regulations, security tools, threat identification
    
AT&T
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Threat Manager – with Advanced Log Management, a security logging and event correlation monitoring solution for any size organization.
Tags : 
threat manager, at&t, advanced log management, security logging, event correlation monitoring, hackers, cybersecurity
    
AT&T
Published By: Athena Security     Published Date: Jan 28, 2010
SIEM solutions detect real attacks from the thousands of events that are happening in the network. When an unexpected and potentially dangerous event is recognized, engineers take a quick (temporary) action to block the security leak, diagnose what really went wrong, determine what else is at risk, and decide on a fix.
Tags : 
firewalls, security, sim, siem, network security, risk, firewall analytics, security incident
    
Athena Security
Published By: athenahealth     Published Date: Jul 22, 2019
When physicians regularly experience a deep sense of fulfillment in their work, they’re less likely to feel burnt out - and satisfied physicians are good for business and your bottom line. This article describes recent research that connects physician satisfaction with high-capability organizations, and the associated benefits of reduced errors and increased patient satisfaction.
Tags : 
    
athenahealth
Published By: athenahealth     Published Date: Jul 22, 2019
Your genes contain clues to your future health. Now, some companies are broadening their DNA testing programs to identify genetic variants that put patients at risk. Read more about this early program and its potential to detect and prevent disease—and change lives.
Tags : 
    
athenahealth
Published By: athenahealth     Published Date: Jul 22, 2019
Medicare Advantage is expanding coverage for what it considers “primarily health related supplemental benefits.” That’s good news, not just for treating illness and injury, but for helping high-risk patients maintain their health and prevent avoidable utilization. This article discloses the new list of services to be covered under Medicare Advantage, including transportation and in-home support.
Tags : 
    
athenahealth
Published By: AtTask     Published Date: Jul 17, 2014
Rapid changes in both technology and business mean that IT departments are constantly barraged with new projects whether it's writing a web app or implementing new infrastructure for mobile application. It's a challenge just to stay ahead of the curve. This Whitepaper examines the top 10 every day pains that prevent IT managers from getting work done and offers some new and trusted solutions for improving your productivity.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management
    
AtTask
Published By: AtTask EMEA     Published Date: Mar 11, 2014
This paper examines the top 10 every day pains that prevent marketing managers from getting work done and offers some new and trusted solutions for improving your productivity.
Tags : 
    
AtTask EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library