RSS feed Get our RSS feed

News by Topic

scribe

Results 651 - 675 of 857Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Nov 16, 2012
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management program.
Tags : web applications, web application security, security and compliance, security
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats
     Qualys
By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
     Qualys
By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
     Qualys
By: Quest Software, Inc.     Published Date: Nov 18, 2010
This white paper describes how real organizations have handled these challenges and how a strong and reliable messaging solution like Quest Recovery Manager for Exchange could have mitigated risk, reduced cost, and improved regulatory compliance.
Tags : quest software, messaging, microsoft exchange server, quest recovery manager, business communication, migration, consolidation
     Quest Software, Inc.
By: Red Hat     Published Date: Aug 22, 2018
Unlike surveys that just look at what respondents say at a specific point in time, the BPTrends survey has been asking questions of process practitioners for over a decade. Thus, we are in a good position to generalize about ongoing trends in process work. Broadly speaking, the interest in business process change has evolved slowly. For some organizations the progress has been dramatic, but for most, their process initiatives are best described by the phrase “two steps forward; one step back.” An amazing number of organizations have focused on process work for several years, made significant progress, then, seemingly forgotten all about their process work, regressed, and then, a few years later, started up again.
Tags : 
     Red Hat
By: Red Hat Government     Published Date: Jul 21, 2011
This whitepaper describes the various forms that cloud computing can take and how different types of technology relate to each other.
Tags : red hat, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat
     Red Hat Government
By: Redhat     Published Date: Sep 11, 2015
This paper describes the characteristics of a modern middleware platform and how companies benefit by migrating from older inflexible monolithic infrastructures to a modular and flexible environment.
Tags : modern middleware services, benefits of modern middleware platform, cloud, create a dynamic computing platform, modern middleware architecture
     Redhat
By: Return Path     Published Date: Jan 29, 2013
Measuring your data can be difficult, but knowing what to do next is even harder. Identify issues quickly with the “Email Metrics Troubleshooter” checklist, so you can focus less time on identifying problems and more time on reaching your goals.
Tags : email failure, high unsubscribe rate, low click-through rate, drop in open rate, low response rate, rise in traffic but not in conversion, email trends, email marketing trends
     Return Path
By: Revinetix, Inc.     Published Date: Nov 11, 2010
Standard School District in Bakersfield, CA had outgrown their backup system and needed to find a replacement. This case study describes their challenges and how they solved their backup problem with a complete disk backup solution.
Tags : revinetix, school district, data protection, disk backup, network backup, tape backup, backup solution, exchange backup
     Revinetix, Inc.
By: Riverbed     Published Date: Sep 05, 2014
This paper examines various technologies and strategies that have traditionally been the basis for DR planning, as well as new methodologies that have arisen around the public cloud. For those situations where a cloud-based DR strategy makes sense, specific best practice recommendations and implementation steps are described.
Tags : recovery, public cloud, cloud storage, gateways, dr planning, recommendations, implementation, storage
     Riverbed
By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
In this report 1,500 Australians describe how they currently use and rate digital public sector services across all levels of government, and what they expect from them today and into the future. The survey shows that Australians regularly engage with government through digital services, with half of respondents saying they do so on a quarterly basis, and 30 per cent accessing them fortnightly; but that the quality of the digital experience is paramount.
Tags : digital, experience, australia, public, sector, transition, hardware, software
     Riverbed ANZ DWA IT Leads GTM
By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
What do Australians think? 1,500 Australians described how they use and rate digital public sector services across all levels of government and outlined current and future expectations for the platforms.
Tags : australians, confidence, experiences, public sector, improvement, government, digital
     Riverbed ANZ DWA IT Leads GTM
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata
     Rohde & Schwarz Cybersecurity
By: RolePoint     Published Date: Apr 12, 2016
Over the last three years, social networks have experienced exponential growth. Employee networks have grown accordingly, offering access to structured career data through sites like LinkedIn in particular, and unstructured data through networks like Facebook. Employees are continually adding new contacts and growing personal networks. Job posting tools that share jobs into social networks are often described as social referral tools, though this is an inaccurate and misleading description. The more sophisticated of these tools create unique links for sharing that enable employers to identify which of their employees originated the share. This is useful for recognition and reward, whilst the practice of sharing jobs in the wider network is to be encouraged in order to reach job seekers who are browsing or using search engines to identify opportunities. Job seekers are increasingly connecting with their peers in organizations they want to work for. Encouraging employees to share jobs in
Tags : rolepoint, social referral, facebook, linkedin, career data, personal network
     RolePoint
By: rPath     Published Date: Dec 10, 2010
This paper describes how rPath's centralized hub becomes the control infrastructure for managing IT system construction and change. This hub becomes the basis for managing and reusing standardized system components.
Tags : rpath, application delivery automation, integration, lifecycle management, enterprise appliances
     rPath
By: rPath     Published Date: Dec 10, 2010
This white paper introduces rPath intelligent system automation as a way to bring consistency, control and scale to .NET production environments. In particular, it describes three scenarios for using rPath within .NET environments.
Tags : rpath, automation, sccm
     rPath
By: Sage     Published Date: Jul 08, 2015
This white paper describes how ERP technology can improve efficiency by: • Standardizing and automating business processes—locally as well as across multiple locations and countries—to accelerate business operations. • Offering a fully integrated suite of business management applications that share a common dataset and extending these applications over the Internet, allowing visibility and collaboration across departments, as well as with customers, partners, suppliers, and remote users. • Providing flexible and customizable reporting to improve business reporting, analysis,and insight.
Tags : enterprise resource planning, erp, efficiency, operating costs, standardization, automation, business management
     Sage
By: Sage     Published Date: Jul 08, 2015
This white paper describes two strategies organizations can employ to maximize the returns from their ERP investments: Use a proven methodology to speed implementation and achieve ROI faster, and define and track metrics to measure progress in meeting business objectives.
Tags : enterprise resource planning, erp, investment dollars, erp implementation
     Sage
By: Sage     Published Date: Mar 07, 2018
There comes a time in a company’s growth when applications that used to work well can no longer keep up with complexities of scale. This white paper describes 3 warning signs that indicate your disconnected financial applications are holding you back. Also, learn how migrating to a unified cloud solution can improve financial forecasts, enable you to act on more accurate information, increase productivity, and more. Don’t make this mistake. In this eBook, we explain the three warning signs you must watch out for if you want to know when it’s time to move your important customer and financial information to the cloud. Then we’ll show you exactly what managing your most important information with a cloud-based accounting solution means for you and your business. Download it today.
Tags : 
     Sage
By: Salesforce.com     Published Date: Apr 26, 2007
This paper summarizes the key ingredients for a successful on-demand implementation. Find out how you can benefit from the knowledge gained by the Salesforce.com Global Services organization, as outlined in the seven domains described in this paper.
Tags : salesforce, salesforce crm, crm, customer relationship management, mobile, saas, sales tools, best practices
     Salesforce.com
By: SAP     Published Date: Jun 23, 2009
Is your company seeking to incorporate finance as a core line of business? This SAP Executive Insight examines the changing role of the finance organization in today's business environment - and describes how companies can develop best-run finance organizations.
Tags : finance, sap, business realities, best-run finance organizations, executive insight, sox, agile, metric
     SAP
By: SAP     Published Date: Apr 07, 2011
As organizations seek to grow beyond their current markets and activities, executives look beyond the existing business model to expand their business. This paper looks at most common areas of business model innovation, describes how organizations are leveraging innovation in different parts of their business, and shows how to implement a solid and adaptive foundation that is flexible enough to support rapid innovation.
Tags : sap, business model, adaptive enterprise, innovation
     SAP
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics