RSS feed Get our RSS feed

News by Topic

asp

Results 326 - 350 of 564Sort Results By: Published Date | Title | Company Name
By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Feb 20, 2014
Don’t get caught in the crossfire. Read our special report "Who's spying on you?" to find out more about the threats of malware to your business.
Tags : kaspersky, malware threats, cyberespionage, internet perpetrators, security technology, internet safety, business protection, cybercriminals
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Jul 31, 2014
Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe. Download the whitepaper now to learn what you need to create a resilient infrastructure to guard against targeted attacks.
Tags : kaspersky, security, cyber attacks, cybersecurity, targeted attacks, data protection, cybersecurity framework, security intelligence
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Aug 14, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it’s imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : kaspersky, kaspersky lab, security, cyberthreats, corporate cyberthreats, it security, data protection
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, security
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Download Kaspersky Lab’s Security for Virtualization: Getting the Balance Right to answer your most pressing questions.
Tags : kaspersky, virtualization, security, virtual environment, business protection, business transformations
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity to learn more.
Tags : kaspersky, cybersecurity, employee knowledge, internet safety, cybercrime, security policy, phish, threats
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization? A new whitepaper from Kaspersky Lab, "Virtualization Security Options: Choose Wisely" will tell you.
Tags : kaspersky, virtualization, security, virtual environment, business protection, business transformations
     Kaspersky Lab
By: IBM     Published Date: Feb 25, 2008
Going green is becoming more than an altruistic aspiration to save the planet. A proactive corporate environmental policy is now an essential part of any company’s overall business strategy. Download this paper to find out how IBM can help you to support environmental initiatives while achieving your company's long-term business goals.
Tags : green, environment, environmental, compliance, cost, green strategy, ibm
     IBM
By: IBM     Published Date: Mar 04, 2009
Web Application Security Podcast featuring Paul Kaspian. This PodCast touches on how to meet application security compliance deadlines.
Tags : ibm, podcast, rational appscan, application security, security
     IBM
By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities
     IBM
By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : c-level, stratus, itic, end users, customers, partners, high availability, corporate applications
     Stratus Technologies
By: GoToMeeting     Published Date: Oct 08, 2013
Are you an Extreme Leader? Do you aspire to be one? The Extreme Leader doesn't just meet the existing standards; she or he defines higher ones. This handbook draws upon lessons from The Radical Leap Re-Energized by leadership expert Steve Farber, offering tips for taking your leadership to the next level.
Tags : yankee group, pim bilderbeek, leadership, daily, handbook, productivity, communication, collaboration
     GoToMeeting
By: ScriptLogic     Published Date: Jan 11, 2012
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Tags : scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore
     ScriptLogic
By: iCims     Published Date: Mar 06, 2014
In this whitepaper, explore how cutting-edge video technology can be leveraged to optimize all aspects of the recruitment process: • Video as a Candidate Engagement Tool • Video as a Screening Tool • Video as an Interviewing Tool • Video as an Onboarding Tool Now is the perfect time to dive deeper into modern video technology to see what video can do to support your recruiting staff, your candidate engagement, and your bottom line.
Tags : video recruiting, candidate engagement tool, human resources, hr technology, icims
     iCims
By: Gluster     Published Date: Mar 17, 2011
This document discusses some of the unique technical aspects of the Gluster architecture, discussing those aspects of the system that are designed to provide linear scale-out of both performance and capacity without sacrificing resiliency.
Tags : gluster, cloud computing, virtual environments, open source storage software, infrastructure
     Gluster
By: IBM Software     Published Date: Jul 06, 2011
Learn why you should keep your software subscription up to date.
Tags : ibm, tivoli, software subscription and support, renewal, bill kribbs, laura sanders, risk compliance, search
     IBM Software
By: IBM Unica     Published Date: Apr 16, 2012
With end-to-end enterprise marketing management solutions from IBM, you can transform all aspects of marketing to engage customers in highly relevant, interactive dialogues across digital, social, mobile and traditional marketing channels. Read to find out more.
Tags : ibm, enterprise marketing management, enterprise, end-to-end, it solutions, it management, marketing software, web analytics
     IBM Unica
By: Dell     Published Date: Jul 30, 2012
Small and mid-sized businesses are hopping on the virtualization bandwagon. A recent study indicates that a healthy number of SMBs have virtualized some aspect of their IT environments.
Tags : smb objectives, data applications, virtualizations, virtual machine, data storage, data management, capex reductions, saas
     Dell
By: IBM     Published Date: Aug 10, 2012
This brief video shows how advanced analytics can incorporate survey methods designed to help you with every aspect of survey research - everything from gathering the data, to data analysis, to reporting.
Tags : survey data, ibm, business analytics, ibm spss, patient satisfaction, analytics solutions
     IBM
By: Adobe     Published Date: Aug 02, 2017
Customer experience (CX) continues to dominate the agenda, and it is clear from the research that retailers collectively grasp the importance of a personalised and mobilefriendly experience which is relevant at every stage of the customer journey. It makes absolute sense for retailers to focus on optimising the mobile experience as part of their CX initiatives. CX is a differentiator for retail brands and, as part of this trend, the mobile experience in particular will increasingly define your brand.
Tags : digital skills, culture, strategy, data management, processing, technology, ux design
     Adobe
By: SAP     Published Date: Jul 17, 2012
As the "bring your own device" (BYOD) trend sweeps across the business world, it raises a huge management challenge for many companies. It changes who within an organization gets access to mobility. It also affects the way a business operates, with implications that go far beyond simply IT. BYOD presents new, fundamental questions about security, liability, and cost. Answers depend on two aspects of mobility management: device management policy and the technology used to fulfill and enforce a policy.
Tags : sap, mobile, managing, business, mobility, technology
     SAP
By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : leveraging, visualization, optimizing, processes, technology, optimizing, server utlization, storage
     SunGard
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics