RSS feed Get our RSS feed

News by Topic

read

Results 401 - 425 of 5467Sort Results By: Published Date | Title | Company Name
By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
     OKTA
By: Intralinks     Published Date: Jun 18, 2013
Intralinks a New York based company, has announced the general availability of its new Intralinks VIA service, and unveiled new brand containers for existing core services in extra-corporate document-based collaboration. Intralinks VIA, in development for nearly two years, is initially positioned to serve "the rest" of the employee population inside customers, which already use Intralinks. Download this white paper to learn more about the role of Intralinks in the broader business collaboration market, with more robust security, controls, and other necessary features for enterprise use.
Tags : enterprise, file sharing, collaboration, technology, market, security, new news
     Intralinks
By: SafeNet     Published Date: Jun 03, 2013
To learn more about the current state of the data braech epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : data breach, it security, data security, data protection
     SafeNet
By: Workday UK     Published Date: Apr 25, 2019
We know medium enterprises have limited resources. That’s why we've put together a plan to help guide you through priority initiatives when it comes to building out your HR Core strategy and how to apply it in to a system for scalability. Read now.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: Workday     Published Date: Apr 30, 2019
We know medium enterprises have limited resources. That’s why we've put together a plan to help guide you through priority initiatives when it comes to building out your HR Core strategy and how to apply it in to a system for scalability. Read now.
Tags : workday, workforce technology, digital strategy
     Workday
By: Workday     Published Date: May 21, 2019
We know medium enterprises have limited resources. That’s why we've put together a plan to help guide you through priority initiatives when it comes to building out your HR Core strategy and how to apply it in to a system for scalability. Read now.
Tags : 
     Workday
By: IBM     Published Date: Jul 25, 2012
IBM PureSystems offers highly integrated solutions that can help you deploy and tune applications for cloud architectures with ease. Read the research report to take a deeper look at PureFlex Systems within the PureSystems family and learn how PureFlex Systems can help you streamline management and accelerate client time-to-value with a new integrated and modular system/subsystem.
Tags : technology, cloud computing, cloud architecture, storage, management, storage management, ibm puresystems, ibm
     IBM
By: Websense     Published Date: Aug 23, 2012
All DLP controls have two things in common.First, they provide the ability to identify: data-in-motion, data-in-use, data-at-rest. Read this whitepaper to find out more about DLP.
Tags : websense, data loss, prevention, dlp
     Websense
By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
     CA Technologies
By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
     Symantec
By: Citrix     Published Date: Feb 22, 2013
An enterprise cloud network is one that embodies the characteristics and capabilities that define public cloud services. These include being 'elastic' so that performance can be scaled and etc. Read on to learn more about Citrix Triscale Technology.
Tags : revolution in cloud networking, triscale technology, triscale technology, application management, capability management
     Citrix
By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
     CrowdStrike
By: Oracle     Published Date: Sep 21, 2016
The job of keeping business data safe has spread across the organization to become an enterprise wide concern. The critical question now—the one that’s being asked, not only by IT but also by CFOs—is “Whether it’s on-premises or in the cloud, how do you keep sensitive data secure?” Your cloud provider should be able to provide the right answers.
Tags : 
     Oracle
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracle’s SPARC M7 processor, with Oracle’s Software in Silicon technology, is the industry’s most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Staples     Published Date: Jan 22, 2018
Genplex, a manufacturing business in rural Maine, sought to reduce its shipping costs without sacrificing quality of its shipments to customers. Staples Business Advantage accepted their challenge. Read about the solution and results.
Tags : 
     Staples
By: IBM     Published Date: Oct 19, 2017
Customer engagement has emerged as the most critical competitive factor in the current environment. Fueled by widespread mobile access and constant social connectedness, customers are demanding that every interaction, across every channel, be simple, streamlined and seamless. High expectations mean high stakes. When options abound and patience is low, customers don’t stick around. Companies need to get it right the first time. This new customer-centric standard and the ability to connect directly with customers is fueling a depth and breadth of enterprise reinvention. Ensuring that every customer experience across every conceivable channel delights and adds value calls for a Smarter Process approach and a new perspective on business process management.
Tags : 
     IBM
By: Workday UK     Published Date: Apr 25, 2019
Read this expert analysis from SMB Group to learn how using a single system across finance, HR and payroll can make all the difference for your organisation. You can also get some guidance on how to choose the solution that's the best fit for your organisation.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: Workday UK     Published Date: Apr 25, 2019
Read this expert analysis from SMB Group to learn how using a single system across finance, HR and payroll can make all the difference for your organisation. You can also get some guidance on how to choose the solution that's the best fit for your organisation.
Tags : 
     Workday UK
By: Workday     Published Date: Apr 30, 2019
Read this expert analysis from SMB Group to learn how using a single system across finance, HR and payroll can make all the difference for your organisation. You can also get some guidance on how to choose the solution that's the best fit for your organisation.
Tags : workday, workforce technology, digital strategy
     Workday
By: Workday     Published Date: May 21, 2019
Read this expert analysis from SMB Group to learn how using a single system across finance, HR and payroll can make all the difference for your organisation. You can also get some guidance on how to choose the solution that's the best fit for your organisation.
Tags : 
     Workday
By: Workday APAC     Published Date: Apr 10, 2019
Read this expert analysis from SMB Group to learn how using a single system across finance, HR, and payroll can make all the difference for your organization. You can also get some guidance on how to choose the solution that’s the best fit for your organization.
Tags : 
     Workday APAC
By: Abacus Labs     Published Date: Jul 25, 2018
We’ve all been there: staring at a pile of receipts at the end of a business trip, dreading the process of filling out a report just to get your money back. Wouldn’t it be great if all your expenses automatically entered into the system and you got reimbursed the next day? At Abacus, we thought so too. Meet real time expense reporting.
Tags : abacus, sales, report, system
     Abacus Labs
By: IBM     Published Date: Apr 10, 2013
Companies are pressured more than usual to get the most out of their current asset base. Read this Analyst Insight from Aberdeen Group to learn how companies are using analytics to predict asset failure to avoid costly downtime and reduce maintenance cost.
Tags : aberdeen, analytics, drive, predictive, maintenance, reduce, maintenance
     IBM
By: Dyn     Published Date: Oct 04, 2016
With nearly 80% of businesses experiencing four or more disruptions to their site each month, Aberdeen Group recently conducted a study to get to the root of today's internet performance challenges. Read the findings and discover how companies: Improve resolution times resulting from web outages - 65% of companies experience an hour or more to repair an internet related outage Increase customer satisfaction by 30% - A consistent, reliable and fast web experience is your key to happy, loyal customers Protect revenue - 60% of businesses record a minute of downtime resulting in a $1,000 loss in revenue Are your online services and sites built for resiliency or destined for the headlines? Get the report to find out how leading organizations are bucking the stats and implementing Internet Performance Management (IPM ) tools to boost time to resolution and improve site performance.
Tags : performance management, website, internet, dns
     Dyn
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics