RSS feed Get our RSS feed

News by Topic

abs

Results 201 - 225 of 492Sort Results By: Published Date | Title | Company Name
By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
     Blue Coat
By: Skillsoft     Published Date: Oct 20, 2015
SumTotal Systems, a Skillsoft company, delivers the SumTotal Work suite of solutions that provides time and attendance, scheduling, absence and leave management, and payroll data processing.
Tags : skillsoft, sumtotal, workforce management, wfm data, payroll processing, human capital management
     Skillsoft
By: Juniper Networks     Published Date: Oct 20, 2015
As with sports cars, performance is a top buying criteria for firewalls. Because if you can’t keep up with the traffic—real traffic, not traffic in the labs—your apps will be unhappy, and your users even more so.
Tags : juniper, firewall, traffic, security
     Juniper Networks
By: Maxaudience     Published Date: Oct 12, 2015
The value of hiring a full service marketing company is absolutely undeniable. Studies have shown that you can expect to see a growth revenue as high as 30% when you enlist the help of one of these companies, but that’s not true for every marketing company out there. Instead, you have to land with the right one to get results like that. Unfortunately, that’s not always as easy as it seems. Not only do you have to consider the type of ?rm you’re choosing, but the quality of the ?rm itself. Read the following for tips that can help when you are looking to change your marketing company!
Tags : full service marketing, growth revenue, marketing company, advertising agencies, marketing research
     Maxaudience
By: Thawte     Published Date: Oct 05, 2015
L’heure est à la sécurisation intégrale de votre site. Face à des attaques de plus en plus fréquentes et faciles à exécuter, les internautes sont plus que jamais attentifs à la capacité des sites à sécuriser leurs données confidentielles. Pour les entreprises intraitables sur les questions de réputation et de protection de leurs clients, Always-On SSL s’impose comme une priorité absolue. Sa mission : protéger les internautes tout au long de leur parcours sur votre site – des recherches aux achats, en passant par le partage d’informations. Pour en savoir plus sur ce dispositif de renforcement de la protection en ligne, téléchargez notre nouveau guide de référence.
Tags : always on ssl, online protection, confidential data, user experience, customer protection, security
     Thawte
By: Qlik     Published Date: Aug 12, 2015
The Business Intelligence Survey provides you with well-designed KPI dashboards packed with concise information, which can be absorbed at a glance.
Tags : business technology, qlik, data, big data, analytics, qlikviews, dashboard vendor
     Qlik
By: Vectra Networks     Published Date: Aug 03, 2015
Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.
Tags : cyber attack, protection, security, network
     Vectra Networks
By: Citrix Systems     Published Date: Jul 28, 2015
Discover why NetScaler AppFirewall earns a Recommended rating in NSS Labs’ Web Application Firewall (WAF) Public Test.
Tags : 
     Citrix Systems
By: K2     Published Date: Jun 10, 2015
Business process management (BPM) needs can vary widely, from top-down business transformation initiatives to smart process applications to enterprise resource planning, marketing, social and more. With this breadth and depth of reach, BPM – and BPA, business process automation – are more than a couple of buzzwords, they are absolutely mission critical.
Tags : 
     K2
By: Workforce Software     Published Date: Jun 04, 2015
This brief Infogencer Management Guide provides an executive summary of the key themes which, in our view, must be considered.
Tags : workforce software, absence management, minimise cost, administrative processes
     Workforce Software
By: Workforce Software     Published Date: Jun 04, 2015
A Guide to Developing a Strategy to Minimise Cost and Risk
Tags : 
     Workforce Software
By: Workforce Software     Published Date: May 26, 2015
New labor laws are a regular occurrence these days… and yet they’re just a small slice of your compliance demands. To help you stay informed and effective, our Director of Compliance takes an annual look at some of the biggest upcoming challenges and lets you know how to prepare.
Tags : workforce software, software, automation, budgets, costs, compliance, visibility, labor
     Workforce Software
By: Workforce Software     Published Date: May 26, 2015
In this informative webinar Jason Chester, the CEO and Director of Research for Infogencer, will outline his organisation’s findings on the business challenges surrounding absence management and share insights on addressing these challenges from both a technical and a business perspective.
Tags : workforce software, software, automation, budgets, costs, compliance, visibility, labor
     Workforce Software
By: Workforce Software     Published Date: May 26, 2015
Inform your HR and labor practices with this list of issues to watch, compiled and analyzed by WorkForce Software’s Director of Compliance. Honing in on U.S. wage, hour, and absence regulations, this paper runs the gamut of compliance factors, including: • Legislative developments • Key court decisions • Enforcement actions • Common employer mistakes • Emerging trends
Tags : labor practices, hr practices, compliance, compliance update
     Workforce Software
By: Acronis EMEA     Published Date: May 18, 2015
Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.
Tags : backup, data protection, database backup application solution, data security, unified data, recovery, backup data
     Acronis EMEA
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, cisco
     Cisco
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5585-X SSP60 v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall methodology v5.4 available on nsslabs.com.
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, cisco, firewall
     Cisco
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
     Cisco
By: MobileIron     Published Date: Apr 20, 2015
Angesichts der Geschwindigkeit, mit der Unternehmen auf Mobiltechnik umsteigen, muss man statt von einer Entwicklung schon eher von einem globalen Wandel sprechen. Unter Berücksichtigung der Tatsache, wie schnell Benutzer und Unternehmen von PCs auf Mobilgeräte umsatteln, prognostizierte IDC, dass der Absatz von PCs 2013 auf ein Rekordtief fallen würde.
Tags : mobileiron, byod, enterprise app store, productivity apps, mobile network access
     MobileIron
By: IBM     Published Date: Apr 09, 2015
Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.
Tags : ibm, nss labs, product testing, network security, computer security, application security
     IBM
By: Cisco     Published Date: Apr 08, 2015
NSS research indicates that NGFW devices are typically deployed to protect users rather than data center assets, and that the majority of enterprises will not tune the IPS module separately within their NGFW. Therefore, NSS evaluation of NGFW products is configured with the vendor pre-defined or recommended,“out-of-the-box” settings, in order to provide readers with relevant security effectiveness and performance dimensions based upon their expected usage.
Tags : next generation, firewall, malware, threat, complexity, costs, visibility, protection
     Cisco
By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : vmturbo, virtualization, it economic model, virtual environment, it management solutions
     VMTurbo
By: STANLEY Healthcare     Published Date: Mar 24, 2015
IASIS Healthcare LLC executives challenged the Arizona-based supply chain team to find innovative ways to manage inventory and reduce cost. Targeting areas with some of the most expensive supplies—catheterization laboratories and interventional radiology (IR)rooms—the team sought a new way to drive down costs while still providing a wide variety of products, offering patients innovation and high quality, and maintaining physician satisfaction. Read this case study to learn how Arizona Hospitals use STANLEY Healthcare's SpaceTRAX® Point of Use™ Inventory Management System to overcome the challenges of managing inventory in Cath Labs and IR Rooms.
Tags : inventory management, healthcare, cath labs, ir room, supply chain, cost reduction, physician satisfaction, medical technology
     STANLEY Healthcare
By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : cisco, nss, cyber, prevention, risk management, resilience, firewall, security
     Cisco
By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges
     IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics