RSS feed Get our RSS feed

News by Topic

technical

Results 476 - 500 of 579Sort Results By: Published Date | Title | Company Name
By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
     AlienVault
By: AlienVault     Published Date: Jul 22, 2016
Join us for this technical demo showing how USM can help you detect: Malware infections on end-user machines Insiders misusing network resources Users engaging in suspicious behaviors
Tags : 
     AlienVault
By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
     AlienVault
By: IBM     Published Date: May 18, 2015
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions
Tags : application delivery, application deployment, software delivery methods, deployment solutions, automated application release, software development life cycle
     IBM
By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : wlan, wireless security, wireless freeloaders, wireless rogue, rogue, rogues, wireless infrastructure, monitoring
     AirDefense
By: Medium Blue     Published Date: Jan 29, 2007
Learn how an organic SEO firm works with site content instead of manipulating technical loopholes, attracts links instead of utilizing linking schemes, strives to make a website a valuable resource, and learns from the search engines rather than learning how to exploit them.
Tags : organic seo, search marketing, search engine optimization, medium blue, search marketing agencies, search engine optimization (seo)
     Medium Blue
By: Aladdin     Published Date: Aug 21, 2009
In this Aladdin white paper you will discover an overview of spyware, security threats seen with spyware, the technical underpinnings to spyware, the technology challenges inherent in trying to block spyware, and spyware's legal issues.
Tags : spyware, malware, antispyware, anti-spyware, anti spyware, email security, aladdin, security
     Aladdin
By: Schneider Electric     Published Date: Feb 12, 2018
This white paper explains the technical terms of power factor, crest factor, and surge factor. The use of these terms in specifying UPS is explained.
Tags : 
     Schneider Electric
By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
Tags : ssl, vpn, ssl vpn, ssl vpn purchase, vpn purchase, buyers guide, buying guide, ipsec
     Aventail
By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Technical Primer explains how SSL VPNs work, and includes an objective comparison of the distinguishing factors between IPSec and SSL VPN technologies. You'll learn why these two technologies, based on fundamentally different designs and methodologies, each serve specific use cases best.
Tags : ssl, vpn, ssl vpn, comparison table, comparison guide, comparison chart, ipsec, ipsec vpn
     Aventail
By: DataSynapse     Published Date: Feb 26, 2007
This technical white paper reviews the principal tenets of application virtualization; freeing application configurations from OS and infrastructure; gaining centralized command and control over system resources; and dynamically allocating resources to applications based on demand. 
Tags : infrastructure, interoperability, load balancing, utility computing, business continuity, enterprise applications, application integration, data synapse
     DataSynapse
By: EMC     Published Date: May 01, 2009
During this recorded webcast, you'll find out how organizations are combining 3D and 2D into their brand centers and creating new ways to engage their customers. You'll learn how CGI saves money and maximizes the reuse of CAD assets and CGI artwork for a variety of emerging media. And, you'll see a product demonstration, showing the impact 3D images can have on your marketing programs. Learn more today!
Tags : marketing, concent, cgi, cad, digital media, emc, images, artwork
     EMC
By: IBM     Published Date: Sep 09, 2008
Today, companies have more at risk than ever before. To stay in business, they must evolve their traditional business continuity programs to include continuous enhancements. They must also provide continuous service and support to their customers, suppliers, stockholders and stakeholders. The best approach requires a detailed analysis of both business and technical requirements, an understanding of available options, and a deep inspection of the many variables that will support their ultimate strategy.
Tags : business continuity, ibm, information, protection, risk, ibm mi
     IBM
By: IDFocus     Published Date: Aug 21, 2009
HRFeed is one of the most critical elements of every Identity Management or User Provisioning solution. This document outlines the different business and technical challenges that IDFocus faced when building successful HR-to-Provisioning integration for several clients.
Tags : identity management, human resources, hrfeed, identity management, user provisioning, system integration, idfocus
     IDFocus
By: PassGo     Published Date: Aug 21, 2009
The law in the United Kingdom has various influences on organizational information security policy. As well as protecting the rights of individuals and organizations, it also imposes many duties and responsibilities. For organizations to meet their legal obligations a number of technical controls can be put in place.
Tags : information security, europe, security policies, policy based management, compliance, united kingdom, european, database security
     PassGo
By: PTC     Published Date: Aug 21, 2009
An ECM solution can give you lasting differentiation from your competitors by improving the quality and availability of your publications. Download this white paper to learn why you can't afford to overlook an ECM solution for your technical publications process.
Tags : content management, competitive edge, content delivery, cms, ecm, enterprise content, ptc
     PTC
By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design
     RuleStream
By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security
     Secure Computing
By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
     Sigaba
By: Quocirca     Published Date: Apr 23, 2007
The need to understand how the performance and problems within the technical infrastructure impacts the capabilities of the business is massive.  However, the majority of companies can only measure application and specific asset performance, whereas many issues within the infrastructure lie at the transport level, where packet switching presents both great opportunities and major issues.
Tags : networking, infrastructure, network management, tcp/ip protocol, wide area networks, wan, wans, packet switching
     Quocirca
By: Quocirca     Published Date: Jun 13, 2008
Over the past decade, the internet has evolved from a technical environment into a commercial marketplace. The impact on consumers and large enterprises has been significant, but what about the small and medium sized business? With few of the skills and resources of their larger counterparts, these organizations need to get the best value from the internet and the network based services it enables, without risking day-to-day operations.
Tags : quocirca, smb, smbs, small business, medium business, mid-sized business, connectivity
     Quocirca
By: Winshuttle     Published Date: Dec 04, 2006
This article describes an easy non-technical alternative to LSMW to update customer master records in SAP in fewer steps than LSMW, without technical involvement, and without requiring authorizations in SAP.
Tags : sap, master record, master records, legacy system migration workbench, lsmw, data migration, data management, winshuttle
     Winshuttle
By: Xirrus     Published Date: May 04, 2007
Get a technical foundation for deploying a high performance Wi-Fi network. Learn the details of how they work/compete, where they complement and where they're most effective.
Tags : wifi, wireless, 802.11, xirrus, wi fi, wimax
     Xirrus
By: GFI     Published Date: Jun 12, 2007
GFI MailSecurity can be deployed as an SMTP gateway or as a VS API version for Exchange 2000/2003. This technical white paper describes each operating mode and helps you decide which to deploy and whether you should deploy both.
Tags : gfi, mailsecurity, email security, anti virus, virus, network security, deployment, implementation
     GFI
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics