RSS feed Get our RSS feed

News by Topic

awareness

Results 1 - 25 of 174Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
     Proofpoint
By: NAVEX Global     Published Date: Jul 17, 2017
Establishing a culture of integrity, ethics and respect is the number one priority for companies in 2017, according to a new report. In common with the 2015 report, getting an organisation's culture right is the main objective for compliance professionals in the year ahead, with 85 per cent of respondents saying it is one of their three main goals. However despite this, only 32 per cent of firms indicated that they are planning to undertake a culture or ethics assessment in the next twelve months. In addition, workplace behaviour was rated as the lowest area of risk receiving attention by stakeholders (29 per cent). Download the full report for additional stats on board level reporting, increasing compliance programme awareness and satisfaction with third party risk management.
Tags : measuring programme effectiveness, insufficient staff, managing regulations, lack of tools, budget issues, programme reporting
     NAVEX Global
By: Cisco     Published Date: Jul 30, 2015
Enhance real-time situational awareness.
Tags : 
     Cisco
By: Samsung     Published Date: Feb 03, 2016
Maverik is a regional convenience store chain that operates more than 270 convenience stores with a brand identity and décor theme around adventure, sports, and the outdoors. Maverik needed a digital signage program to reinforce the brand, drive foot traffic from the pump stations into the store, and promote food purchases.
Tags : samsung, display, retail, maverik, digital, brand, customer experience/engagement, branding
     Samsung
By: Commvault     Published Date: Jul 06, 2016
Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions that have been overwhelmed by data growth. The challenge is that native array snapshot tools – and alternative 3rd party solutions – have varying degrees of functionality, automation, scripting requirements, hardware support and application awareness. These approaches can add risk as well as administrative complexity and make it more difficult to realize the full potential of snapshots – whether in single disk vendor estates or in heterogeneous storage environments. This checklist will enable you to build a shortlist of the 'must have' features needed for snapshots to deliver exactly what you require in your application environment or Private Cloud.
Tags : commvault, snapshot management, replication, array based snapshots, data protection solutions, gui driven, intellisnap, no scripting
     Commvault
By: Polycom     Published Date: Aug 16, 2017
"WR believes that huddle rooms should be an integral part of every organization’s meeting room and collaboration strategy for several reasons including: - the addition of millennials to the work environment - the enhanced interest (and in some cases use) of open work spaces and telecommuting - the increased need to support large numbers of collaborative and distributed work teams But most companies remain stymied about how to deal with these spaces. This study, sponsored by Polycom, is intended to raise awareness of the value and importance of these misunderstood, mismanaged, and often under-appreciated meeting spaces."
Tags : polycom, huddle room, wainhouse report, work environment, video collaboration
     Polycom
By: Oracle     Published Date: Feb 24, 2015
Content marketing is driving the way marketing organizations are engaging their audiences. In our consumer-empowered world, it’s become more difficult for marketers to cut through clutter and a lot more challenging to garner loyalty with their audiences. That’s why smart content delivered in context will make you stand out in the crowd. Read the modern marketing essentials guide on Content Marketing now.
Tags : oracle, marketing cloud, essentials, content, strategy, business objectives, target audience, engagement
     Oracle
By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : mobile security, solutions, websense, mobile security, solutions, major it security strategy, security
     Websense
By: Adobe     Published Date: Nov 07, 2013
Aberdeen's Insights provide the analyst's perspective on the research as drawn from an aggregated view of research surveys, interviews, and data analysis.
Tags : adobe, aberdeen group, analyst insight, technology tools, buying behavior, customer experience management, cem, buyer interactions
     Adobe
By: VMWare - vFabric     Published Date: May 10, 2012
View this webcast to learn how to achieve real-time awareness by managing ever-increasing data volumes and transaction rates.
Tags : vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware
     VMWare - vFabric
By: NAVEX Global     Published Date: Aug 18, 2016
This Cyber Security Awareness Kit illustrates how to make your organisation more secure by neutralizing the leading cause of cyber security risk: your employees.
Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security, security application, cyber security awareness kit
     NAVEX Global
By: VMware     Published Date: Aug 23, 2011
View this webcast to learn how to achieve real-time awareness by managing ever-increasing data volumes and transaction rates.
Tags : application server, data management, application monitoring and management, web server load balancing, enterprise messaging, vmware virtualization, server virtualization, desktop virtualization
     VMware
By: Dell EMC     Published Date: Nov 02, 2015
Learn about Workload Awareness findings documented in a recent worldwide IDC survey of 683 enterprise IT decision makers.
Tags : emc, enterprise, hybrid, cloud, strategy, security
     Dell EMC
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Cloud technology has changed everything—it has been one of the biggest transitions in the IT industry over the past three to four decades. Today’s customers require greater agility and faster innovation, and need the flexibility to run their workloads both in the public cloud and on premises with a predictable and transparent IT cost structure. Learn more in this new mini digi book. (Digital awareness asset/.pdf of value proposition for OCM and new Oracle Exadata Cloud Machine)
Tags : 
     Oracle PaaS/IaaS/Hardware
By: CA Mainframe     Published Date: Sep 12, 2008
The CA Performance Management Handbook for DB2 for z/OS by renowned tuning experts Susan Lawson and Dan Luksetich of YL&A covers information to enhance your skills and raise awareness for databases performance management issues and tuning strategies. This supplement to the CA Performance Management Handbook provides specific information on which technologies apply to which issues and how CA Database Management addresses your most pressing database performance management challenges.
Tags : ca mainframe, mainframe, apm, application performance management
     CA Mainframe
By: Cisco     Published Date: Sep 15, 2015
To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times. Cisco and our partners can help agencies obtain secure networks.
Tags : public safety, iot, law enforcement, emergency response, strategy
     Cisco
By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : cisco, public safety, disaster response, networking, security
     Cisco
By: Cisco     Published Date: Nov 18, 2015
The Internet of Things (IoT) stands to benefit a number of key public sector subverticals, particularly public safety, because it will be leveraged to enhance real-time situational awareness, improve response times and safety, function as a force multiplier, help minimize operational expenditures, and facilitate evidence-based operations and real-time safety decisions. The following questions were posed by Cisco to Dr. Alison Brooks, research director, on behalf of Cisco's customers.
Tags : cisco, idc, public safety, iot, internet of things, response time, situational awareness
     Cisco
By: Bazaarvoice     Published Date: Oct 15, 2012
Our survey of 100 members of The CMO Club reveals most CMOs gather insights from first-person, always-on online consumer conversations, and share them across their organizations, to power more than just marketing.
Tags : bazaar voice, social marketing, social data, research, social data, marketing data, consumer awareness, marketing research
     Bazaarvoice
By: TIBCO     Published Date: Nov 11, 2013
The right integration platform lets you extract more value from your ERP system - including improved business performance, increased organizational awareness, and better coordination of processes.
Tags : erp, process coordination, tibco, mobile strategy, integration, technology, best practices, inefficient integration
     TIBCO
By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : best practices, network security, it security, security management, threat response, hacker detection
     McAfee
By: McAfee     Published Date: Jan 20, 2015
The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.
Tags : situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw
     McAfee
By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : risk, security, security programme, security, security application
     Forcepoint
By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : security, advance threat detection, nav
     Trend Micro
By: EMC Corporation     Published Date: May 27, 2014
ESG Whitepaper: New security risks and old security challenges often overwhelm legacy security controls and analytical tools. This ESG white paper discusses why today's approach to security management—that depends on up-to-the-minute situational awareness and real-time security intelligence—means organizations are entering the era of big data security analytics.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
     EMC Corporation
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics