RSS feed Get our RSS feed

News by Topic

san solution

Results 1 - 25 of 115Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Feb 20, 2014
As a valued customer, Adobe understands that your enterprise takes extensive advantage of our software, with anywhere from hundreds to thousands of licenses for a variety of Adobe solutions. With the Adobe Enterprise Term License Agreement (ETLA), we are now making the management and procurement of your Adobe software simpler, more flexible, and predictable.
Tags : adobe, adobe software, enterprise term licensing, etla, adobe solutions, software management, software compliance, tco
     Adobe
By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : rdns, dns, anti-virus, security, network defense
     Akamai Technologies
By: AlienVault     Published Date: Oct 21, 2014
Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.
Tags : alienvault, sql injection, web security, cyber attacks, siem solutions, xss, cross site scripting attacks, siem
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
     AlienVault
By: Anaplan     Published Date: Sep 07, 2018
Les entreprises modernes doivent évoluer à un rythme sans précédent. Certaines peuvent réagir rapidement, d’autres doivent lutter. D’où la question : pourquoi certaines entreprises réussissent, mais pas d’autres ? La Harvard Business Review a interrogé 385 lecteurs représentant des entreprises de plus de 500 employés à propos des défis rencontrés dans le domaine de la planification, ainsi que des outils qu’ils utilisent. Le verdict est sans appel : 9 sur 10 utilisent des tableurs, et seulement 22 % sont satisfaits du résultat. « La planification basée sur des feuilles de calcul en silos n’est plus adaptée à la rapidité d’évolution, ni à l’envergure du business d’aujourd’hui », conclut la Harvard Business Review. Heureusement, une solution existe ! Dans l’étude approfondie publiée par HBR sous le titre « The New Game Plan for Strategic Planning », vous lirez des entrevues avec des experts de l’industrie, et découvrirez une analyse des conclusions de l’enquête, des illustrations clai
Tags : 
     Anaplan
By: Anaplan     Published Date: Sep 26, 2018
Les entreprises modernes doivent évoluer à un rythme sans précédent. Certaines peuvent réagir rapidement, d’autres doivent lutter. D’où la question : pourquoi certaines entreprises réussissent, mais pas d’autres ? La Harvard Business Review a interrogé 385 lecteurs représentant des entreprises de plus de 500 employés à propos des défis rencontrés dans le domaine de la planification, ainsi que des outils qu’ils utilisent. Le verdict est sans appel : 9 sur 10 utilisent des tableurs, et seulement 22 % sont satisfaits du résultat. « La planification basée sur des feuilles de calcul en silos n’est plus adaptée à la rapidité d’évolution, ni à l’envergure du business d’aujourd’hui », conclut la Harvard Business Review. Heureusement, une solution existe ! Dans l’étude approfondie publiée par HBR sous le titre « The New Game Plan for Strategic Planning », vous lirez des entrevues avec des experts de l’industrie, et découvrirez une analyse des conclusions de l’enquête, des illustrations clair
Tags : 
     Anaplan
By: Asure Software     Published Date: Sep 10, 2012
Key financial stakeholders for Lowenstein Sandler were looking for a solution for tracking employee time that would eliminate paperwork and increase efficiency and productivity. As a result, they settled on AsureForce Time & Labor Management.
Tags : time and labor management, human resources, payroll solutions, web-based solutions, workforce management
     Asure Software
By: Balihoo     Published Date: May 28, 2010
One of the major challenges facing manufacturers' marketing teams in their efforts to make reseller co-op marketing more effective is at the very heart of what defines the century-old co-op marketing concept -- the coordination and execution of programs and financial transactions across two separate organizations. Today, when the manufacturer is working with hundreds if not thousands of different resellers, the scale and breadth of the effort can be overwhelming. However breakthroughs are not only possible today,but quite achievable by applying specialized and fully integrated technology solutions, bringing co-op marketing management into the modern age.
Tags : co-op marketing, co-op advertising, reseller marketing, other
     Balihoo
By: BlackBerry Cylance     Published Date: Aug 22, 2018
Even if one minute a day is lost to productivity drains because of PC horsepower allocation to security scans and remediation, the cost over a year across a medium-sized enterprise adds up quickly. A 10,000 employee operation would face over $10M in direct productivity losses alone. As an early trigger for expensive PC hardware refresh is an onslaught of help desk calls, many companies find that they can actually extend the hardware refresh cycle out another 12–24 months simply by employing a security solution that does not tax the PC as heavily. The indirect costs associated with brand reputation and opportunity losses add untold thousands of dollars per year as well. Further, some institutions under green initiatives monitor power consumption related to security measures favor solutions that use less energy. As such, forward-thinking enterprises are looking beyond the software license fees when evaluating security software alternatives.
Tags : system, resource, impact, testing, cylance
     BlackBerry Cylance
By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : secure web gateway, web-based threats, web, solution, technology, security
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : gateway, web, security
     Blue Coat Systems
By: CA Technologies     Published Date: Jun 27, 2014
Comment réduire les contraintes liées aux processus sans coûts supplémentaires? La solution: un logiciel qui rassemble développement et opérations. Découvrez dans notre livre blanc gratuit « Que savent les grandes entreprises du DevOps ? » comment concrétiser l’approche DevOps au sein de votre entreprise. La démarche DevOps n’est plus une simple tendance. Lors d’une récente enquête menée auprès de 1 300 professionnels IT dans le monde, la société d’études de marché Vanson Bourne a constaté que le DevOps est devenu une stratégie informatique incontournable. Partout dans le monde, les entreprises comptent désormais sur cette méthode pour améliorer leurs processus métier, avec des résultats quantifiables.
Tags : devops, application development
     CA Technologies
By: CA Technologies EMEA     Published Date: Oct 19, 2017
Les API ne sont pas une technologie nouvelle, mais dans le monde numérique actuel, elles occupent une place croissante et deviennent essentielles pour chacune des facettes de l’entreprise. Dans ce contexte, il est logique que de plus en plus d’entreprises cherchent à gérer efficacement ces API. Mais à quoi ressemble une solution efficace de gestion des API ?
Tags : api, application programming interface, psd2, open banking, json, github, api gateway, apim
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 24, 2018
Dans l’économie numérique, les interfaces de programmation d’applications ou API (Application Programming Interfaces) sont essentielles pour mettre rapidement en œuvre vos idées et saisir les nouvelles opportunités du marché. Elles sont les éléments fondateurs de la transformation numérique, permettant aux organisations d’offrir une expérience client exceptionnelle, de générer de nouveaux flux de revenus et d’offrir aux employés, partenaires, applications et périphériques un accès aux données, partout et à tout moment.Les API ne sont pas une technologie nouvelle, mais dans le monde numérique actuel, elles occupent une place croissante et deviennent essentielles pour chacune des facettes de l’entreprise. Dans ce contexte, il est logique que de plus en plus d’entreprises cherchent à gérer efficacement ces API. Mais à quoi ressemble une solution efficace de gestion des API ?
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 25, 2018
Les solutions logicielles de gestion de portefeuilles de projets (PPM, Project Portfolio Management) ont énormément évolué ces dernières années. Bien éloignées aujourd’hui des simples outils de consolidation de tâches qu’elles étaient par le passé, elles sont devenues de puissantes solutions d’entreprise aux capacités multiples, de la planification et la gestion des investissements à la collaboration, en passant par l’automatisation des workflows sur différentes initiatives simultanées.
Tags : liberez, puissance, donnees, votre, entreprise
     CA Technologies EMEA
By: Carbon Black     Published Date: Nov 26, 2018
Deciding on an endpoint security solution can be a difficult task. Many organizations know their current security has gaps, but don’t know where to begin in the search for something new. To help with this, SANS has created a guide to evaluating these solutions. The guide outlines the necessary requirements you should look for, as well as how to prepare to run a test.
Tags : 
     Carbon Black
By: CarbonBlack     Published Date: Nov 01, 2016
A SANS Guide to Evaluating Next-Generation Antivirus Rather than dying, antivirus is actually growing up. Today, organizations look to spend their antivirus budget on replacing current solutions with next-generation antivirus (NGAV) platforms that can stop modern attacks, not just known malware.
Tags : carbonblack, sans, antivirus, security
     CarbonBlack
By: Cisco     Published Date: May 15, 2015
Le cloud privé VSPEX™ pour Microsoft Windows Server avec Hyper-V est une solution complète de virtualisation testée par Cisco et EMC qui permet d'exécuter des applications Microsoft et qui vous est proposée par votre partenaire de confiance. Conçu pour la flexibilité et validé pour l'interopérabilité et un déploiement rapide, le VSPEX utilise votre environnement Microsoft tout en réduisant la complexité et les risques généralement associés à la conception, à l'intégration et au déploiement d'une solution d'exception.
Tags : cloud computing, erp, productivity, applications, efficiency, migration. cisco
     Cisco
By: Cisco     Published Date: Jun 21, 2016
En adoptant de nouvelles technologies, telles que le cloud, la mobilité, le Big Data et l'Internet des objets, vous améliorez les interactions entre les personnes, les processus, les données et les objets, et tirez le meilleur parti des connexions réseau et des ressources disponibles. L'IT prend également une nouvelle dimension dans l'entreprise. Pour rester en phase avec les objectifs de l'entreprise, le département IT doit innover et offrir des solutions performantes encore plus rapidement. L'infrastructure intégrée Cisco UCS® (Cisco Unified Computing System™) vous permet de migrer vers le Fast IT, un nouveau modèle IT qui transforme votre infrastructure de data center en un environnement rapide, agile, intelligent et sécurisé. Faites tomber les barrières informatiques qui freinent votre croissance et créez des solutions qui exploitent tout le potentiel des nouvelles connexions et informations.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 11, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
     Cisco
By: Cisco     Published Date: Dec 21, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
     Cisco
By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
     Cisco
By: Cohesity     Published Date: Oct 02, 2018
The University of California, Santa Barbara (UCSB) is a public research university and one of the 10 campuses of the University of California system. Its secondary storage was a combination of multiple point solutions. The UI/setup and maintenance was complex. Maintaining multiple licensing and maintenance agreements negatively impacted the administrative cost. The skyrocketing cost for additional backup capacity limited the team’s ability to expand their backup protection to many critical systems. With Cohesity's unified hyperconverged secondary storage platform, the IT team provided a single solution for all 13 departments to consolidate their backups on one platform, and scale-out as required. Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting.
Tags : case, study, ucsb, consolidates, data, protection, cohesity, hyperconverged
     Cohesity
By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
     CrowdStrike
By: Damballa     Published Date: Apr 14, 2014
Learn the 6 shortcomings of security sandboxing and see what solutions your organization should be utilizing to detect and protect against advanced threats.
Tags : malware, threats, security, network based intelligence, detection, security sandboxing, virtual execution, network vulnerabilty
     Damballa
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics