RSS feed Get our RSS feed

News by Topic

combat

Results 1 - 25 of 151Sort Results By: Published Date | Title | Company Name
By: Nuance EMEA     Published Date: Jun 04, 2019
New market entrants are shifting the way the financial sector operates, new business models are changing customer expectations, and ever-changing client demographics are forcing businesses to adapt the way they work. As we move into a decade of artificial intelligence (AI) and digital innovation, huge opportunities are opening up for the financial sector to combat these changes. But with this comes new challenges, and exponential increases in available information must be accompanied by smart tools and processes to make sense of it, ensure regulatory compliance, and add real value to clients. To find out more, download this ebook!
Tags : 
     Nuance EMEA
By: Mimecast     Published Date: Jun 03, 2019
Knowing where to look and what to watch out for is half the battle. Download this report to understand the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them. Most importantly, you’ll walk away with actionable steps to improve your organization’s email security and cyber resilience. Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
Tags : 
     Mimecast
By: DataCore     Published Date: Apr 23, 2019
Innovations in data storage technology come with surprising frequency as competitors constantly leapfrog each other. That’s both good and bad. Good because they promise to solve pressing performance, reliability and cost problems. Bad because they often render perfectly good equipment prematurely obsolete.
Tags : storage virtualization, disk pooling, storage pooling, storage performance, storage refresh, storage consolidation, storage array
     DataCore
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
     Cisco
By: SAS     Published Date: Jan 17, 2018
We have conditioned patients not only to expect opioids for pain relief, but to utilize more and more of them, and the addiction is both psychological and physical. To remedy the situation, a lot of policies and practices and behaviors must change around how the health care system approaches pain. But we do not yet have the data and analytics we need to determine what specifically to do at the patient level or the policy level. Download this whitepaper to learn more about the resources available and how we can fix this issue.
Tags : 
     SAS
By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
     Gigamon
By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless
     Ruckus Wireless
By: Pega     Published Date: Aug 11, 2016
Citizens rely on government social services programs to help combat poverty, disease, disabilities, and economic and physical hardships. Governments are also tasked with providing healthcare, security, and infrastructure services.
Tags : 
     Pega
By: FireEye     Published Date: Nov 27, 2012
Combating the Attack of Choice for Cybercriminals
Tags : cybercriminals, fireeye, phishing attacks, apt, advanced persistent threat, security
     FireEye
By: Riverbed     Published Date: Jul 17, 2013
Your business is complex. Big data promises to manage this to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, causing delays and downtime. Forrester predicts this will worsen. To combat this onslaught, you need machines to analyze conditions to invoke automated actions. To perform adaptive automation, you need IT analytics, a disruption to your monitoring and management strategy. This report helps leaders prepare for IT analytics that turn big data efforts inward to manage the technology services that run your business. Register to get the full report.
Tags : analytics, big data, forrester
     Riverbed
By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
     Tenable
By: Kindred Hospital Rehabilitation Services     Published Date: Feb 22, 2019
A rehab program is only as good as its staff. Acquiring, retaining and keeping rehab talent engaged is critical for program effectiveness. Staffing issues can burden providers with additional costs and make it hard for them to deliver a consistently high quality of care, but there are key strategies to help relieve the staffing burden. The medical industry is facing a growing talent shortage. Recent estimates predict that America will be short of more than 130,000 doctors by 2025.1 Specialized departments will suffer especially high shortage rates. If healthcare providers want to minimize the impact of this shortage, they must optimize their recruitment and retention practices. This guide details the best strategies for making that happen.
Tags : 
     Kindred Hospital Rehabilitation Services
By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Combattere contro il costo e la complessità della gestione dei PC lascia al reparto IT poco tempo per l’innovazione. La rapida evoluzione delle tecnologie e delle esigenze aziendali equivale a minori opportunità per sfruttare le nuove tendenze che stanno cambiando il modo in cui la tecnologia viene erogata e consumata. Inoltre, la tecnologia hardware non dura per sempre. Ha un ciclo di vita, un periodo misurabile di inizio e di fine in termini di produttività e valore. Il reparto IT ha il compito di ottimizzare il ciclo di vita dei PC mentre promuove svolte strategiche per la propria organizzazione. Scopri di più sulle soluzioni Dell in collaborazione con Intel®
Tags : ottimizzazione, ciclo, dell, intel
     Dell PC Lifecycle
By: Keas     Published Date: Sep 17, 2013
The start of the Affordable Care Act has been delayed to January 2015 and now is the time to get educated on provisions for Corporate Wellness Programs which are critical to combatting rising healthcare costs.
Tags : aca, affordable care act, employee wellness, health and wellness programs, wellness programs
     Keas
By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : app security, mobile apps, operating systems, corporate security, enterprise data
     MobileIron
By: IBM     Published Date: Oct 26, 2016
In this paper, you’ll explore how business analytics can form the foundation for a proactive threat management strategy. - See examples of how different types of organizations are applying analytics. - Learn practical steps you can take to combat threat and fraud in your own organization.
Tags : ibm, analytics, predictive analytics, risk management
     IBM
By: BI WORLDWIDE     Published Date: Dec 22, 2014
The number of employees still engaged after their first six months on the job is roughly 40%. As the workplace continues to evolve, it’s more important than ever to develop an engagement strategy that will combat the fatigue you’ll see among the other 60% of your employees. You can’t rely on 20th-century strategies for 21st-century challenges. Download our article to learn the top 6 workplace trends you’ll experience in 2015, as well as best practices to follow to drive engagement.
Tags : employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives
     BI WORLDWIDE
By: CA Technologies     Published Date: Jul 13, 2015
It’s not exactly breaking news that cardholder security is front and center of the payments ecosystem “to do” list. And, with that, the search for a solution that keeps cardholder data secure without compromising the consumer experience at checkout. Nowhere is this more important than online, where the incidences of fraud are increasing, and it becomes harder to authenticate the user.
Tags : 3d secure, ca technologies, mobile
     CA Technologies
By: LifeLock     Published Date: Mar 02, 2015
Mobile devices enable workers to take care of business from virtually anywhere, at any time. But, what’s the catch? Mobile, social media-savvy employees and customers may be more likely to become identity fraud victims.
Tags : 
     LifeLock
By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
     Mimecast
By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
     VMware AirWatch
By: Cisco     Published Date: Apr 11, 2016
En este documento se identifican las funcionalidades esenciales necesarias en una solución de protección contra malware avanzado y las preguntas clave que debe formularle a su proveedor, y se muestra cómo Cisco combate los ataques de malware avanzado actuales mediante una combinación de cuatro técnicas
Tags : 
     Cisco
By: Cisco     Published Date: Apr 11, 2016
A través de los años, todos hemos escuchado hablar de soluciones simples y aparentemente mágicas que permiten resolver problemas de seguridad, incluido el uso exclusivo de la tecnología de sandboxing para combatir el malware avanzado y las amenazas dirigidas.
Tags : 
     Cisco
By: illusive networks     Published Date: May 18, 2016
Today's cyber attackers are more specialized, targeted and innovative when it comes to seeking new attack vectors and circumventing perimeter defenses and old-school honeypot traps. Download this whitepaper and learn why Honeypots fail in comparison to Deceptions Everywhere™ Technology, how to mimic real-world scenarios to catch cyber attackers, and leveraging deception technology to combat modern APTs.
Tags : 
     illusive networks
By: illusive networks     Published Date: May 18, 2016
This case study serves as a summary of illusive networks’ Red Team exercise with a global tech leader. The fact that a system employing illusive networks' Deceptions Everywhere® technology can stand up to a highly-trained Red Team, with the odds stacked against it, demonstrates how you can protect your systems against sophisticated attackers. Learn why a threat deception approach to cybersecurity, focused on the humans behind the attacks, is the most effective way to combat modern cyber threats.
Tags : 
     illusive networks
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics