RSS feed Get our RSS feed

News by Topic

scribe

Results 451 - 475 of 838Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
     Qualys
By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
     Qualys
By: ServiceSource     Published Date: Nov 01, 2013
In this book we describe best practices honed through 13 years of experience and partnership with some of the leading technology companies in the world. These best practices will give you insight into three key areas: • Data management & renewal opportunity generation • Sales strategy & execution • Continuing the renewal cycle We hope you enjoy this book!
Tags : reducing customer churn, servicesource, recurring revenue, higher profit margins, drive innovation, drive performance, saas companies, competitive markets
     ServiceSource
By: IBM     Published Date: Oct 24, 2013
"The potential to manage assets more efficiently, replace and upgrade them, and exploit them for purposes beyond their initial role, is significant in all cities in today’s world. However, technologies that support asset management in cities are numerous, fragmented and often inadequate. For any individual city agency, the level of cost and effort required to make improvement may seem daunting. This white paper highlights how Capgemini can help cities to become ‘smarter’: It describes how to offer to city agencies a leading practice asset management technical solution provided as-a-Service. This accelerates implementation, substantially removes funding hurdles, ensures an ongoing quality solution and incentivizes cities to migrate from a fragmented, costly and inadequate model to a common leading-edge solution."
Tags : city assets, asset managemnet, efficiency, smart city, work management, architecture, real estate management, facilities management
     IBM
By: IBM     Published Date: Oct 22, 2013
Testing service-oriented architectures and other distributed systems has provided a wealth of expertise. Eight key lessons about avoiding some of the most common testing pitfalls are described, together with methods for mitigating certain issues.
Tags : ibm, thought leadership, service-oriented architectures, test virtualization, measure performance, integration projects, test interleaving, software vendor
     IBM
By: Plantronics     Published Date: Oct 18, 2013
The following describes some typical UC usage scenarios, and how you can deploy products that will maximize productivity while minimizing downtime, excessive inventory costs, operational overhead, and unsatisfied users.
Tags : plantronics, solutions for uc users, solutions for uc applications, sound innovation, mobile and wired workers, web-based collaboration, voice communications, deploy products
     Plantronics
By: IBM     Published Date: Oct 17, 2013
ROI: The Value of Deployment Automation explains how a deployment automation framework can streamline release operations and increase business agility. The document describes the benefits of Deployment Automation. In addition, the whitepaper contains a formula for calculating the ROI of a Deployment Automation solution.
Tags : ibm, roi, deployment automation, deployment, automation, roi, automation framework, visibility
     IBM
By: Cisco Systems     Published Date: Oct 16, 2013
75% of business leaders believe that in-person collaboration is critical to business success. This Economist Intelligence Unit survey identifies key areas of collaboration, and describes how Cisco TelePresence is being used to create in-person experiences with colleagues, customers, and partners. Download Now
Tags : collaboration, cisco, best practices, technology, business success, telepresence, in-person collaboration
     Cisco Systems
By: Cisco Systems     Published Date: Oct 16, 2013
75% of business leaders believe that in-person collaboration is critical to business success. This Economist Intelligence Unit survey identifies key areas of collaboration, and describes how Cisco TelePresence is being used to create in-person experiences with colleagues, customers, and partners. Download Now
Tags : collaboration, cisco, best practices, technology, business success, telepresence, in-person collaboration
     Cisco Systems
By: Scribe     Published Date: Oct 09, 2013
Today’s customers are empowered with information – if they want to know something, they can look it up in an instant. Having information they need at their fingertips is expected. Having information at the ready – whether your sales or service personnel are in the field or in the office – is no longer a competitive advantage, it’s expected and required. In this whitepaper, you will learn how Scribe’s customer data integration solutions and connectors let you put customer information where it needs to go quickly and easily. Don’t be that business who makes their customers wait for answers!
Tags : scribe, scribe software, data, data integration, business systems integration, applications, integration platforms, cloud
     Scribe
By: Scribe     Published Date: Oct 09, 2013
The State of Customer Data Integration 2013 survey report is based on over 900 responses ranging from independent business and IT leaders to Scribe's data integration channel partners. Overall results reveal that today's businesses are still on the journey to connect their core business systems and deliver customer data to their users across the business. Customer data should be free-flowing across all business touch points to enable companies to run faster, do more, and at lower cost.
Tags : scribe, scribe software, data, data integration, business systems integration, crm, crm systems integration, cloud
     Scribe
By: IBM     Published Date: Sep 30, 2013
This interactive eBook describes how virtualization is not a device to implement, but rather a journey to realize greater and greater gains. Featuring cases from midsize companies around the world, the eBook details how to get started, the importance of consolidation, tangible ways to fully benefit from virtualization and more.
Tags : ibm, virtualization, consolidation, virtualization management
     IBM
By: IBM     Published Date: Sep 27, 2013
In this paper, Ptak/Noel describes the new IBM PureFlex system and the unique management capabilities of the IBM Flex System Manager.
Tags : ibm, data center, data center management, ibm pureflex, ibm pureflex system, expert integrated system, computing systems, ibm flex system manager
     IBM
By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
     Arbor
By: Arbor     Published Date: Sep 20, 2013
Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.
Tags : distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions
     Arbor
By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware
     Webroot
By: Bronto     Published Date: Sep 09, 2013
Like any relationship, the marketing lifecycle has unique phases with appropriate (and inappropriate) actions. Reading subscriber cues is important in getting this right. Learn about the elements of a strategic email marketing program that help move subscribers from introduction to a lifelong relationship.
Tags : lifelong subscribers, marketing lifecycle, strategic email marketing, email marketing services/software, list management
     Bronto
By: TeamQuest     Published Date: Sep 09, 2013
This paper describes the fundamental steps for performing capacity planning.
Tags : teamquest, capacity planning, cost effective, fundamental
     TeamQuest
By: IBM     Published Date: Sep 03, 2013
This paper describes how workgroups and midsize companies can transform their spreadsheet-only process to create flexible and timely plans, budgets and forecasts. It outlines recommendations for implementing a complete performance management system, using IBM Cognos Express, an integrated reporting, analysis and planning solution purpose-built for workgroups and midsize companies.
Tags : transforming spreadsheets, planning, budgeting, forecasting, midsize companies, cognos express, management system, ibm
     IBM
By: Dell     Published Date: Aug 16, 2013
"IOPS (I/O operations per second) is an easily understood and communicated unit of measurement, which is why it’s so widely used. Unfortunately, it’s also easy to oversimplify. IOPS describes only the number of times an application, OS or VM is reading or writing to storage each second. More IOPS means more disk I/O, and if all IOPS are created equal, we should be able to measure disk activity with it alone. But they aren’t. Read the White Paper "
Tags : iops, i/o, disk activity
     Dell
By: Dell Software     Published Date: Aug 15, 2013
IOPS describes the number of times an application, OS or VM is reading/writing to storage each second. More IOPS means more disk I/O, but all IOPS are not created equal. Read the White Paper >>
Tags : dell, operations, iops, application, storage, disk, technology, security
     Dell Software
By: Oracle     Published Date: Aug 15, 2013
John Moxley describes the reasons behind the company’s decision to choose Oracle Taleo Cloud Service.
Tags : cricket's, oracle, taleo, cloud service, cloud
     Oracle
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics