RSS feed Get our RSS feed

News by Topic

net response

Results 26 - 50 of 67Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
     Cisco Umbrella EMEA
By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms
     MessageLabs
By: WatchGuard     Published Date: Oct 16, 2012
The importance of effective security for businesses can't be understated and effective IT policies must be made. With this overwhelming amount of data in your hands, how do you ensure proper network defense and actionable incident responses?
Tags : watchguard, it policy, data management, aup, risk, data security, security
     WatchGuard
By: AppNeta     Published Date: Oct 28, 2013
This article explores a new approach to assuring web-based application performance and the three key capabilities you need to ensure exceptional application delivery and end-user experience.
Tags : appneta, web application performance, web applications, application performance, deployment, latency, end user experience, response time
     AppNeta
By: Emulex Corporation     Published Date: Nov 07, 2013
Organizations don’t know what’s going on inside their networks, and that’s costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target. The impact of network performance problems on worker productivity has become a serious business risk. To mitigate it, organizations need to strategically embrace a network recording infrastructure that provides them with accurate, network-wide visibility. Only accurate visibility will empower them to slash maximum and mean response and repair times and keep network-reliant business applications and processes running. Download this Whitepaper for more information.
Tags : network monitoring, network visibility, technology, endace, best practices
     Emulex Corporation
By: Emulex Corporation     Published Date: Nov 07, 2013
The status quo in network monitoring is no longer adequate for large organizations. It’s simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals. It takes so long to diagnose, fix, and eradicate network incidents that network uptime and performance are suffering. Because of this, organizations need to embrace incident response and root cause analysis capabilities to accelerate resolution times and avoid the network downtime and service degradation that can cost them thousands, if not millions, of dollars per minute. Download this Whitepaper for more information.
Tags : network monitoring, network visibility, technology, endace, best practices
     Emulex Corporation
By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
     FireEye
By: Oracle     Published Date: Feb 21, 2018
Over the last decade we have seen the dramatic increase in adoption of Mobile as an engagement channel for consumers and employees within the enterprise. What we are seeing now is the emergence of messaging through channels like FB Messenger, WhatsApp, WeChat, Slack, SMS, as a dominant engagement channel. Over 4.1 Billion users around the world are on instant messaging apps, adopted a rate that was much faster than on social networks. What makes these channels the default choice is the expected instant response if the other person is on or the push notification that triggers the person on the other side to respond immediately. These users that use instant messaging channels to converse with their friends and family want to use the same familiar user experience and channel to instantly communicate with the enterprise. These channels are doing to apps what browsers did to client server apps i.e. these channels are rapidly becoming the next browser. This is leading to the innovations in c
Tags : 
     Oracle
By: Entelo     Published Date: Sep 06, 2017
Engaging with candidates is a long game. To be remembered, it's crucial to take the necessary steps to develop effective relationships, grow your network, and cleverly capture candidates' attention. Join TripAdvisor's Jeff McCarthy and Lori Busch as they share how to leverage recruitment marketing and outreach platforms to improve response rates, influence long-term relationships, and stay top of mind with candidates. In this webinar, you'll learn: TripAdvisor's messaging strategies for increasing open rates by 15% How to structure a multi-touch nurturing workflow to sustain a relationship with candidates A breakdown of TripAdvisor's Attract, Engage, and Convert model Why they emphasize employee-generated content as vital to branding and candidate engagement
Tags : 
     Entelo
By: dinCloud     Published Date: Jun 19, 2018
Too often, the debate about IT is dominated by a narrow focus on near-term objectives: shrill cries claim that the business will stop (or fail) if a feature isn’t added to the ecommerce site, if the mobility platform isn’t improved, if the network and compute back end aren’t upgraded, if storage and database performance isn’t accelerated. Often, these changes are truly essential, and demand immediate attention. However, midmarket firms can’t assemble a meaningful strategy from point responses to near-term issues. Increasingly, midmarket enterprises are finding that continued operational success requires an “agile-cloud” – an agility-oriented, cloud-based IT strategy that addresses the three core changes faced by midmarket firms: the changing nature of business infrastructure, the accelerating pace of change in business, and the expanding scope of IT.
Tags : virtual, data, centers, services
     dinCloud
By: dinCloud     Published Date: Jun 19, 2018
Too often, the debate about IT is dominated by a narrow focus on near-term objectives: shrill cries claim that the business will stop (or fail) if a feature isn’t added to the ecommerce site, if the mobility platform isn’t improved, if the network and compute back end aren’t upgraded, if storage and database performance isn’t accelerated. Often, these changes are truly essential, and demand immediate attention. However, midmarket firms can’t assemble a meaningful strategy from point responses to near-term issues. Increasingly, midmarket enterprises are finding that continued operational success requires an “agile-cloud” – an agility-oriented, cloud-based IT strategy that addresses the three core changes faced by midmarket firms: the changing nature of business infrastructure, the accelerating pace of change in business, and the expanding scope of IT.
Tags : empowered, it< tech, ecommerce
     dinCloud
By: F5 Networks Inc     Published Date: Jan 22, 2009
Getting your applications to work properly over a Wide Area Network (WAN) is a complex task, and it is not likely to get easier any time soon. Trends such as data center consolidation, the advent of Web 2.0 applications, and the move to web-based application delivery have only served to increase complexity and slow user response times. Often, the result is sluggish application response and at worst, abandoned applications and shopping carts due to slow or failed web page loads. The good news is that you can do something to improve application performance over slow or congested WAN networks. An Application Delivery Network can accelerate your applications and help make sure they’re secure, fast, and available.
Tags : acceleration, data center consolidation, web-based application, application performance, application delivery network, accelerate, optimize, big-ip
     F5 Networks Inc
By: Citrix Systems     Published Date: Nov 10, 2014
Citrix NetScaler helps your organization fully optimize, secure and control the delivery of all enterprise and cloud services. NetScaler Insight Center and ActionAnalytics deliver unprecedented visibility and enables real-time control in response to network traffic from a variety of services such as native web and mobile apps and virtual desktops.
Tags : optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization
     Citrix Systems
By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
     Apstra
By: Cisco     Published Date: Jul 11, 2016
The Internet of Things (IoT) stands to benefit a number of key public sector subverticals, particularly public safety, because it will be leveraged to enhance real-time situational awareness, improve response times and safety, function as a force multiplier, help minimize operational expenditures, and facilitate evidence-based operations and real-time safety decisions.
Tags : 
     Cisco
By: NETIQ     Published Date: Dec 05, 2013
This flash point paper discusses advanced persistent threats, the risks they pose, and how automation makes real-time response a reality. It covers questions you should ask yourself and things to consider before making an investment.
Tags : netiq, advanced persistent threats, insider credentials, real-time threat response, automation, security
     NETIQ
By: Delta Risk     Published Date: Jun 07, 2016
Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise? One of the best methods of protecting organizations is by ensuring that response capabilities are effective and efficient, and one of the most valuable steps in strengthening a response capability is learning from others’ experiences. This white paper discusses the pain points that organizations grapple with when responding to incidents, and how they can address them.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     Delta Risk
By: NexGen     Published Date: Feb 09, 2015
Data integrity and ultra-high performance dictate the success and growth of many companies. One of these companies is BridgePay Network Solutions, a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Due to the nature of their business, their IT team needed to strike the perfect balance between meeting regulatory-mandated data security measures with the lowest possible levels of latency and response times. As their growth accelerated, BridgePay realized the need to immediately address infrastructure shortcomings and prepare for their future growth. Download the case study now and see how BridgePay built a competitive advantage and scaled transactions by 500% in the same storage footprint using some of the most advanced and differentiated technology available today.
Tags : vmware, bridgepay, solutions, spx, hyrbrid, flash
     NexGen
By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics
     NetIQ
By: IBM     Published Date: Jun 20, 2013
The global financial crisis of 2008 still reverberates today. Sluggish economic growth, stricter regulatory requirements and rapidly changing consumer behavior are placing unprecedented demands on the banking industry. In recent years, banks – particularly those with substantial retail operations – have relied on the lethargy of their customers to maintain their business. Customer loyalty has been based more on proximity of local branches and convenience of ATM networks than the quality of customer care or products and services priced and tailored to a bank’s best customers. In response to the financial crisis, banks have focused on wringing complexity and costs from their systems – exacerbated by mergers and acquisitions – while dealing with new and tighter regulations. Yet, their traditional “one-size-fits-all” mass-marketing approach to customers has remained constant.
Tags : customer-centric, increase revenue, relationships, operations
     IBM
By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
     HP
By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a “Goldilocks’ for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. They’ll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. We’ll dive into Zeek’s creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
     Gigaom
By: Genius Inc     Published Date: Apr 28, 2010
This event will give you what you need to: •Evaluate your social media needs •Set the ground rules for your organization •Establish Goals •Match response and engagement to buyer interest •Measure Success •Get started and be successful with Social Marketing
Tags : genius, webinar, social marketing, social media, networking, response, engagement, sales
     Genius Inc
By: SAS     Published Date: Mar 14, 2014
Fan loyalty is everything in the sports business. So when Major League Soccer (MLS), the top flight pro soccer league in the US and Canada, wanted to deepen customer engagement, it turned to SAS® Marketing Automation to get a better understanding of its fans.
Tags : sas, customer engagement, data acquisition, monetization, measurement and tracking, mls, major league soccer, database
     SAS
By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : on-the-job training, it professionals, cyber security services, security programs, security
     Symantec
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics