ats

Results 1 - 25 of 1844Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 26, 2016
Welcome to “How to put IBM Watson to work for powerful information access and insights,” where we’ll show you how Watson and its Watson Explorer application can get down to business and help your organization be more effective, more productive, and make better-informed decisions.
Tags : 
ibm, watson explorer, analytics, data, enterprise software
    
IBM
Published By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : 
    
Secunia
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Cybercriminals have been upping their game this year; the use of file-less attacks with macros and PowerShell scripts to evade preventive defenses and sandboxes mean that they are getting better than ever at using phishing, social engineering and drive-by techniques to gain initial footholds in private domains – and once they arrive, they are often avoiding detection for extended periods of time. Between April and July 2018, Fidelis interviewed over 580 security professionals from around the globe to understand how they are shifting their detection strategies and how confident organizations are in their ability to not only prevent targeted attacks – but root out threats that have by-passed traditional preventive defenses.
Tags : 
    
Fidelis Cybersecurity
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted?
Tags : 
cloud computing, digital economy, digital disruption, business operations
    
IBM
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Wheelhouse Technologies     Published Date: Mar 23, 2012
Phone systems are a critical part of any business infrastructure. Here is a list of 10 regrettable mistakes businesses have made when buying a phone system.
Tags : 
phone system, wheelhouse, wheelhouse, technologies, yachts, fleets, workboats, marine, maintenance, spare parts, services, owners, operators, fleet managers
    
Wheelhouse Technologies
Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
Cyveillance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and effectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and e ectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
    
BlackBerry Cylance
Published By: TrendKite     Published Date: Apr 25, 2018
This informative whitepaper that will help shape your PR decision making. Stats include: 43% of web traffic is driven by search engines 7 in 10 executives reported being more inclined to do business through organizations that are thought leaders Influencer campaigns did not exist 5 years ago...now brands swear by them Download now to learn more!
Tags : 
pr strategy, marketing, digital age
    
TrendKite
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : 
firewall, palo alto, security, network security, safe applications, cyber threats
    
Palo Alto Networks
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : 
anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark, windows 7 anti malware benchmark, anti malware protection comparison, west coast labs
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Protect systems from unknown, advanced persistent threats with centrally managed whitelisting
Tags : 
application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection
    
McAfee
Published By: Staples     Published Date: Oct 13, 2016
How are you sitting right now? In your chair? Are you SURE that’s good for your back? This infographic gives you 11 things you could do to reduce workplace soreness and injuries.
Tags : 
ergonomics, healthier workforce, musculoskeletal disorders, productivity, furniture
    
Staples
Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Spredfast, Inc.     Published Date: Mar 04, 2014
What have savvy brand marketers and social media strategists learned recently? Here’s a quick wrap-up of significant network trends, consumer behaviors, and brand results.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.
Published By: 15five     Published Date: Jul 22, 2019
Take off with OKRs! How do monumental feats of achievement like landing on the moon occur? We believe the key is marrying inspiration with the right strategy. The journey to the moon required countless teams planning and executing their contributions, all while measuring progress along the way. Your team also has the power to make the seemingly impossible happen with a process called Objectives and Key Results (OKRs). Whatever your version of landing on the moon, this book is designed to help you get there. It’s a resource for managers at all levels to implement the company-wide objectives established by leadership. We’ve included details for working with every employee so that they have measurable objectives that impact the entire company each quarter of the year.
Tags : 
    
15five
Published By: ReadyTalk     Published Date: Sep 19, 2014
59% of marketers are using webinars in their B2B content marketing strategy. While they require a significant level of effort to produce, webinars can provide a great return on investment. Fill your content pipeline by repurposing webinar assets into other pieces of content and extending the topic into other formats. Here are 19 pieces of content that can be created from every webinar.
Tags : 
webinars, qualified, leads, generation, strategy, marketing, investment, time, practices, tools, content, investment, pipeline, b2b, repurposing, topic
    
ReadyTalk
Published By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security
    
McAfee
Published By: ESET     Published Date: Feb 11, 2010
This document combines the thoughts of both Research teams in ESET Latin America and ESET, LLC into a single paper, proposing a comprehensive vision of how the threatscape is likely to evolve in 2010.
Tags : 
eset, cybercrime, security, threat, crimeware, botnets, malware, social engineering, antivirus
    
ESET
Published By: SHL     Published Date: Dec 13, 2011
47 business outcome studies were conducted for clients across multiple industries for the 2011 Business Outcomes Studies Report. It demonstrates the value of online talent measurement solutions against metrics specific to the goals of each organization.
Tags : 
bos, business outcomes study, business outcomes, outcomes study, business study, business objectives, people intelligence, outcomes report, employment testing, assessment simulations, ats, applicant tracking systems, talent development, business challenges, talent management, assessment program, assessment solutions, assessments, talent measurement, turnover
    
SHL
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library