attention

Results 276 - 290 of 290Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 25, 2015
This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: PGi     Published Date: Oct 01, 2018
Large companies have made considerable investments in video webcasting to their external audiences. Now they need to turn their attention toward internal communications—for reasons that can enhance their competitiveness and bottom line. As companies undergo a digital transformation, the playing field becomes increasingly technology-democratized and fierce. In this climate, an organization’s employees are one of its most, if not the most, valuable competitive differentiators. And the same energy and focus that companies put toward reaching their external audiences needs to go toward reaching and engaging their employees. Here’s where strong internal communications can pay big dividends. High-performing companies recognize the significant impact effective internal communication has on their business. Chief among the gains are: • Increased productivity. • Improved brand trust and company loyalty among employees. • Increased company alignment within and between departments and remote loc
Tags : 
    
PGi
Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids, spam, spam filtering, security policies, gateway av, risk management, perimeter, perimeter esecurity
    
Perimeter
Published By: Cohesity     Published Date: Nov 20, 2018
Today, hybrid cloud is increasingly the norm, and enterprises are challenged with ways to have visibility, manage and make use of all this data – both on-premises and in the cloud. While much attention has been given to primary data affecting mission-critical workloads, data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide. Download to learn more.
Tags : 
    
Cohesity
Published By: Indegy     Published Date: Jul 29, 2019
Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events.
Tags : 
    
Indegy
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: Citrix Systems     Published Date: Feb 10, 2016
An ADC is one of the most critical elements of an organization’s datacenter and cloud architecture. As you evaluate ADC solutions, it’s essential to pay close attention to their ability to address the most important challenges in your environment. This paper highlights nine key datacenter and cloud architecture challenges that NetScaler helps solve more effectively than F5 to help you.
Tags : 
    
Citrix Systems
Published By: eDataSource     Published Date: Jun 15, 2015
Among the many useful elements of eDataSource’s visibility into the email activity of 50,000 brands is what we can see of how each subscriber in an email marketer’s audience is being mailed by specific other brands. This view provides a picture of which other brands are competing against yours for attention in your audience’s inboxes.
Tags : 
    
eDataSource
Published By: Inspirus     Published Date: Oct 04, 2017
Learning and development plays a critical role in any organization. Although learning has been unequivocally linked to high-performing organizations, we believe there hasn’t been enough attention paid to the lasting effects learning plays in engaging your workforce.
Tags : 
    
Inspirus
Published By: StoryDesk     Published Date: Jan 04, 2013
What makes for a winning iPad presentation app for sales teams? How can interactivity keep prospects' attention focused? How can you use technology to make your message more memorable? Learn the answers to these questions and more.
Tags : 
    
StoryDesk
Published By: Workday Nordics     Published Date: Sep 19, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
workday, workday technology, digital strategy, financial auditing
    
Workday Nordics
Published By: HP Software     Published Date: Dec 16, 2015
Each year we explore the major trends and issues that consume IT and QA leaders' attention and then share the results to help you put the changes into context and plan how to respond.
Tags : 
testing, quality assurance, devops, qa transformation
    
HP Software
Published By: HP Software     Published Date: Jan 07, 2016
Each year we explore the major trends and issues that consume IT and QA leaders' attention and then share the results to help you put the changes into context and plan how to respond.
Tags : 
    
HP Software
Published By: Oracle     Published Date: Nov 08, 2017
IT departments are under constant pressure to do more with less. Now, as well as keeping the lights on, they are expected to deliver projects that create real business value. As more businesses use digital technologies to disrupt their markets, this pressure is intensifying. Infrastructure as a service (IaaS) is evolving against this background. Initially, it caught CIOs’ attention because it helped them cut costs. Today, IaaS underpins organizations’ agility in the face of disruption and drives innovation-led growth.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: IBM     Published Date: Nov 07, 2016
Apache Spark hit the scene in 2014 and has grown to be the most popular software project in the history of Open Source. Attend this webinar and learn more about; -What is Apache Spark? -Why, is it so popular? -Why is it important to you and your organization? Apache Spark is allowing companies to drive innovative ways to compete using one of the most valuable assets in the 21st century, Data! Apache Spark is the fastest growing framework for powering Big Data Analytics today and for the future. Register to attend this webcast and learn more.
Tags : 
ibm, big data, platform computing, apache spark
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12     Next   End
Search Resource Library