RSS feed Get our RSS feed

News by Topic

intel

Results 3626 - 3650 of 3834Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : upgrade, principled technologies, mobility, windows 10
     Dell
By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning
     Meltwater
By: eDataSource     Published Date: May 05, 2015
Looking to improve your email performance? Over 100 emailers achieved a 40 open rate for Mothers Day alone - Learn more...
Tags : edatasource, email tools, email performance, email subject line, real-time data, email competitive intelligence, email marketing, emerging marketing
     eDataSource
By: Firehost     Published Date: Jan 07, 2015
This Case Study gives information on the 16 Infrastructure Components to pass your next Audit.
Tags : firehost, intelligent security, infraestructure, security
     Firehost
By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Success of an effective threat defense strategy.
Tags : malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
"If your business is still running Windows Server 2003, you must act now to keep your business secure. This solution brief discusses three migration paths and how to choose the best one for your situation."
Tags : 
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
If your business is still running Windows Server 2003, you must act now to keep your business secure. This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, security
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Gartner Magic Quadrant for Mobile Data Protection
Tags : 
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : aberddeen, data center, datacenter, cloud, server security
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, security
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : server security, virtual server security, cloud server security, data center server security, security
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : management of native encryption, mne, data protection, filevault, bitlocker, pat correia
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and prevent data exfiltration.
Tags : data exfiltration, data loss prevention, dlp
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Fortunately, implementing and managing DLP isn’t nearly as difficult as many security professionals expect. For over 10 plus years Securosis has covered the technology — talking with hundreds of DLP users . In this 30 page report they have compiled valuable tips, tricks, and techniques for streamlined and effective DLP deployments into straightforward processes to ease most common pain points.
Tags : intel, mcafee, dlp, securosis
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : data loss prevention, dlp, office 365, security
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Management of Native Encryption for Apple FileVault and Microsoft BitLocker
Tags : 
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This guide will examine seven common misconceptions and distinguish between myth and reality.
Tags : mcafee, intel, security, malware, cyber, threat
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
This report provides details on the most common attack methods used by cyber-criminals, how they operate, and the technologies you need to stay safe.
Tags : mcafee, intel, security, cyber, criminal
     Intel Security
By: Acrolinx     Published Date: Apr 01, 2015
Content marketing is one of the highest priorities for today’s marketers, with growth rates for content development and distribution skyrocketing. According to the Content Marketing Institute, for example, 70 percent of marketers are investing more in content marketing than ever before. A recent research report from global market intelligence firm IDC further underscores the point, noting that “building out content marketing as an organizational competency” is one of CMOs’ most important initiatives, second only to measuring ROI. Read this white paper to learn more about the Global Content Impact Index.
Tags : global content impact index, brands, web pages, analysis, content marketing, roi, search marketing, email marketing
     Acrolinx
By: NetApp     Published Date: Mar 05, 2018
Did you know that by 2020, 50% of analytic queries will be generated using search, natural-language processing or voice, or will be automatically generated? Read the Gartner report Technology Insight for Modern Analytics and Business Intelligence Platforms and find out how to meet the time-to-insight demands of today's competitive business environment. Learn how to: • Determine when to use existing, traditional BI technologies versus modern analytics and BI • Broaden data access beyond relational systems • Adopt new approaches to data modeling
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
Start   Previous    136 137 138 139 140 141 142 143 144 145 146 147 148 149 150    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics