RSS feed Get our RSS feed

News by Topic

romi

Results 1 - 25 of 455Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : cloud security, cyberattacks, cloud service, security
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : ddos, technical support, data security, application security
     Akamai Technologies
By: Entrust Datacard     Published Date: Apr 26, 2017
Properly managed, multi-server and wildcard certificates can provide increased flexibility. Since the consequences of a compromise can be more severe than they would be for a conventional certificate, supplemental safeguards should be employed. In the absence of these safeguards, we do not recommend the use of either multi-server or Wildcard certificates, due to both the security risks involved and the expanded scope of management issues in the wake of a compromise.
Tags : 
     Entrust Datacard
By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
     MobileIron
By: Panaya     Published Date: May 17, 2017
Learn new methods you can easily apply for better control and accelerated functional testing. Learn to reduce time-to-market cycles in a competitive business environment – without compromising quality - by removing the bottlenecks caused by testing.
Tags : performance testing, testcenter, business process management, business process
     Panaya
By: Fugue     Published Date: Mar 27, 2017
Check out this report to see why Ovum recommends Fugue’s solution to help developers generate applications that can exploit cloud capabilities and deliver on the promise of the cloud.
Tags : cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration
     Fugue
By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : black duck software, open source, platform, sap, multi-source, code, source, intellectual property
     Black Duck Software
By: IBM     Published Date: Apr 10, 2017
"Is your premium video content really secure? Don’t let security blind spots compromise your content – or business. Download the latest installment in IBM Cloud Video’s OTT Success Series and discover insights around: -Business logic security and why it matters more than ever -The importance of matching the proper level of security with your intended content use case -New security considerations – and solutions – associated with migration to the cloud"
Tags : ibm cloud video, premium content, cloud migration, security, content
     IBM
By: IBM     Published Date: May 17, 2017
Making predictions is a risky activity. Making predictions in the utility industry can be perilous. History is filled with missed or prematurely exuberant pronouncements of the future of utilities and energy. For example, in the late 20th century, many predicted that the world’s oil supply had reached peak production and would become scarce. Instead, shale gas and oil are in abundance. In the 1990s, people predicted that fuel cells and hydrogen would dominate the landscape by 2010, another illustration that predictions can fail to reach their promise. Learn more. Download now
Tags : energy, utilities, ibm, pov
     IBM
By: Marketo     Published Date: May 18, 2017
Across industries, marketing increasingly plays a critical role in company growth. After all, the top expectation of CEOs polled by Gartner, in the 2014 Gartner Executive Summary for CMO Leadership, Accountability, and Credibility within the C-suite, is that the CMO would not only improve, but also own the customer experience by 2016. Combine this with the fact that digital is quickly becoming the de facto medium for customer interactions, and it’s easy to see why it’s essential that CMOs build an effective, efficient, and scalable marketing technology (aka MarTech) stack. Today, according to Forrester’s 2015 research, “Don’t Let Muddled Messaging Compromise Customer Experience,” as much as 90% of a buyer’s journey is self directed. Your buyers have moved online and many of them (likely a majority of them) prefer to be reached through digital channels.
Tags : integrate, social lead tool, slide share, webinar platform, lead capture, web forms, delivery assurance, event automation
     Marketo
By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : application modernization, forrester consulting, apo, asg, application portfolio optimization
     ASG Software Solutions
By: SAS     Published Date: Apr 25, 2017
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
     SAS
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise for enterprise IT. Within the SDDC, the benefits of server virtualization are extended to storage and networking, so the entire infrastructure can be abstracted and centrally managed under a unified platform. IT teams are able to leverage unprecedented levels of virtualization, orchestration, and automation to achieve the services-based delivery model that enables true digital transformation.
Tags : data center, networking
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise forenterprise IT. Within the SDDC, the benefits of server virtualization areextended to storage and networking, so the entire infrastructure can beabstracted and centrally managed under a unified platform. IT teams areable to leverage unprecedented levels of virtualization, orchestration, andautomation to achieve the services-based delivery model that enables truedigital transformation.
Tags : data center, networking
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : cyber threats, threat intelligence, cyber attack, cyber attack prevention
     McAfee
By: IBM     Published Date: May 31, 2017
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : iot, internet of things, iot technology, digital transformation
     IBM
By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : vision, high availability, ibm, cdp, aix, xsm
     Vision Solutions
By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : cyber crime, security compromise, software management, information security, it management
     IBM
By: SAS     Published Date: Apr 20, 2017
Enterprises routinely claim to be focused on the customer experience, yet few really keep that promise. What’s in the way? Fragmentation and complexity in both customer data and customer-facing processes. IIA spoke with Wilson Raj, Global Director of Customer Intelligence, and Jonathan Moran, Customer Intelligence Product Marketing at SAS Institute Inc. about how organizations can leverage technology platforms and analytics to become more completely and genuinely customer-centric – making connections in the right way, at the right time, and on the right device.
Tags : 
     SAS
By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs, security
     QTS
By: SAP     Published Date: May 18, 2014
In-memory technology—in which entire datasets are pre-loaded into a computer’s random access memory, alleviating the need for shuttling data between memory and disk storage every time a query is initiated—has actually been around for a number of years. However, with the onset of big data, as well as an insatiable thirst for analytics, the industry is taking a second look at this promising approach to speeding up data processing.
Tags : sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
     SAP
By: HPE     Published Date: Mar 02, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : 
     HPE
By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
     Freshdesk
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
     Hewlett Packard Enterprise
By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
     Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics