RSS feed Get our RSS feed

News by Topic

discover

Results 401 - 425 of 1873Sort Results By: Published Date | Title | Company Name
By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : cyber defenses, threat actors, it security, security analytics
     Arbor
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Ransomware is the fastest growing malware threat today. Utilize these security best practices and risk mitigation strategies to improve your overall security posture. Discover how to: • Reduce risk of ransomware • Get immediate protection against attacks • Prevent malware from spreading laterally To find out how to keep your business protected, we recommend Ransomware Defense For Dummies.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Welcome to the multicloud era - SaaS apps in the cloud, public and hybrid clouds hosting infrastructure, employees and branches accessing the cloud and internet from anywhere. -300,000 OAuth-connected SaaS apps discovered -84% of companies will use multiple clouds -70% of branches have direct, anytime cloud access Elevate Your Cloud Security with Cisco.
Tags : 
     Cisco Umbrella EMEA
By: KPMG     Published Date: Jun 06, 2019
HR’s most confident leaders are using data, predictive insights and AI to transform HR into a new value driver. Discover what it takes to become an HR transformation trailblazer. Read this report to discover: • how trailblazers are exploiting uncertainty to drive new competitive advantage • which technologies HR leaders are investing in • what it means to integrate human and digital labour in a collaborative workplace • six priorities for forward-looking HR leaders.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 06, 2019
AI will transform the workplace in ways we’re still trying to imagine. What skills and capabilities will your organisation need to survive? Read this report to find out – with contributions from government, academics and the Big Innovation Centre. Download the report to discover: • how AI will change the way economies, societies and businesses operate • how AI will change the skills your workforce needs in the 21st century • what AI means for the way we learn • how AI will change the role of the HR function.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 06, 2019
Businesses increasingly see cloud as the best route to enhanced agility and digital transformation. But this survey reveals that keeping the lid on cloud costs is far from straightforward. Read this report to discover: • whether businesses are realising the benefits they anticipated from cloud migration • how effective companies are at managing cloud investments • the risks and consequences of getting locked into inefficient architectures.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 06, 2019
What impact will the cloud-enabled workplace have on your cybersecurity strategy? This year’s research shows that organisations are navigating a myriad of both old and new cybersecurity challenges to bring the cloud into scope. Read this to discover: • how growing cloud dependency has created distinctive challenges around cyber security • what the biggest cyber challenges are for organisations in this context • how intelligent automation and machine learning is being used to overcome operational obstacles hampering cloud security • a set of cybersecurity considerations for modern IT environments.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 10, 2019
A supplier partnership model delivers greater levels of innovation than traditional transaction methods. Here’s how to get started. Read this insight to discover: • key steps for building strong supplier relationships • potential risk areas that must be managed • why behaviour change is as important as processes and tools • why aligning your own organisation is essential.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 10, 2019
As advanced technologies catapult manufacturing into the future, find out how to manage the most complex business challenge in generations. Read this briefing to discover: • why I4.0 transformation demands a cross-functional approach • how to get planning for I4.0 transformation the right way round • how to identify the best opportunities to create value • critical enablers for I4.0 transformation • five questions to ask for smarter I4.0.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 10, 2019
Getting complex decisions right across complicated operational networks is the key to optimum performance. Find out how one of the UK’s biggest bus operators is using data and analytics to make better decisions and optimise the use of resources across their network. Read this story to discover: • how data and analytics can transform operational performance • the benefits of using decision-support tools in the middle office • key lessons for getting your plans for digital transformation right.
Tags : 
     KPMG
By: Logi Analytics     Published Date: Jan 12, 2016
This white paper takes a no-nonsense approach to discovering which side of the "buy versus build" dichotomy you belong on, based on your business' requirements.
Tags : embedding analytics, analytics
     Logi Analytics
By: IBM     Published Date: Dec 29, 2015
This book helps you understand DevOps and how your organization can gain real business benefits from it. You also discover how a holistic view of DevOps that encompasses the entire software delivery life cycle.
Tags : ibm, devops, software delivery, life cycle
     IBM
By: IBM     Published Date: Feb 02, 2016
Discover what it takes to deliver truly proactive care to customers and find out how active customer experience management can deliver significant business benefits in the form of cost savings, reduced churn, and increased revenue.
Tags : ibm, customer management, customer loyalty, analytics, data, telecom, crm & customer care
     IBM
By: IBM     Published Date: Feb 02, 2016
Read this whitepaper published by Heavy Reading and sponsored by IBM to look at why network service quality matters to customer loyalty and CSP attitudes to improve it and discover how CSPs can correlate customer loyalty indicators like Net Promoter Scores with network and service quality metrics to help drive better business and operational performance
Tags : ibm, telecom, analytics, customer management, customer loyalty, network service, crm & customer care, branding
     IBM
By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : mdm, big data, automation, organization
     IBM
By: VMware     Published Date: Jun 28, 2019
With the benefits quickly stacking up, it’s easy to understand why Gartner stated HCI (Hyper-Converged Infrastructure) as one of the hottest trends in data centre infrastructure. HCI is intended to reduce infrastructure complexity and cost, whilst enhancing scalability, agility and operational efficiency. This consolidated infrastructure enables organizations to leverage the software layer by using low cost commodity hardware, while reducing concerns around vendor lock-in, to form a seamless software- defined IT infrastructure environment well suited to today’s IT challenges. Simple to use and manage, without specialists and more cost-effective than most traditional solutions, it’s easy to understand why more organisations are making the move from traditional architecture to Hyper-Converged Infrastructure. Submit the form to view the infograph to discover the benefits and whether this solution is right for you.
Tags : 
     VMware
By: IBM     Published Date: Feb 01, 2016
Discover the benefits of deployment automation and how to maximize your automation investments!
Tags : ibm, applications, deployment, automation, roi
     IBM
By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: Lenovo - APAC     Published Date: Oct 11, 2018
While many organizations have acknowledged the importance of digitally transforming their businesses and processes to deliver speed and agility, most are just starting their cloud journey. Cloud-in-a-Box delivers an enterprise cloud platform with a mix of on- and off-premises private cloud and public cloud, with orchestration between them. This will provide the organization with the ability to avoid vendor lock-in, find the optimal cloud services for a particular business or technical need, and increase redundancy. Download IDC Infobrief on “Cloud-in-a-Box” to understand: • How you can deliver the different functions of a data center and meet business requirements by deploying a “Cloud-in-a-Box.” • Understand how industries such as financial services, manufacturing and healthcare can benefit from “Cloud-in-a-Box” technology. • Self-discovery questions and focus areas that every organization needs to go through for successful cloud deployment.
Tags : 
     Lenovo - APAC
By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : byod, device discovery, data privacy, data security, it security, security
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Oct 30, 2014
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : cyber threat, cyber defenses, security intelligence, malware discovery, security
     Kaspersky Lab
By: mindSHIFT     Published Date: Nov 29, 2007
Have you adjusted your data retention policies and electronic discovery procedures to comply with the new Federal Rules of Civil Procedure (FRCP)? Learn how email archiving can help you with these electronic discovery requirements.
Tags : frcp, secure content, secure data, data protection, database security, compliance, frcp compliance, data governance
     mindSHIFT
By: EMC Corporation     Published Date: Mar 12, 2014
Discover how to manage your data growth with the new EMC eBook, Manage Data Growth. Interact with the latest facts, insights and solutions, and hear what customers and subject matter experts are saying in the fast-growing world of data.
Tags : emc, digital data, data growth, idc report, big data, internet of things, customer behavior
     EMC Corporation
By: SumTotal     Published Date: May 24, 2013
The Value Matrix is based on functionality and usability, the two core measures that Nucleus has found indicate an application’s ability to deliver initial ROI and, ultimately, maximum value over time. Leaders, Experts, Facilitators, and Core Providers are identified in this matrix. Discover how the current workforce management providers stack up in this streamlined and concise evaluation.
Tags : workforce management, streamline hr, workforce management solutions, sumtotal
     SumTotal
By: Blue Coat Systems     Published Date: Jul 07, 2011
View this paper now to explore the top four security risks businesses face when using social networks. In addition, discover various ways to protect against and mitigate these risks.
Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
     Blue Coat Systems
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics