RSS feed Get our RSS feed

News by Topic

graph

Results 676 - 700 of 1059Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: Aug 10, 2015
Download this infographic to uncover the economic benefits of private cloud and how to see a better ROI while building a solution ready for tomorrow.
Tags : 
     Dell
By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity
     Venafi
By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications
     Venafi
By: EMC Converged Platforms     Published Date: Aug 05, 2015
In today’s mobile and digital world, IT speed and agility are essential – which is why organizations are turning to converged infrastructure solutions to get the flexibility they need to transform their business. A recent IDC white paper reveals how EMC customers around the world are leveraging convergence to deliver faster business outcomes, accelerating their enterprise organizations to cloud speed. Take a look at this infographic to see how EMC converged solutions from VCE can help you triumph over the status quo and take on the next generation of IT challenges.
Tags : 
     EMC Converged Platforms
By: Cisco     Published Date: Aug 03, 2015
Workplace demographics are shifting; Millennials desire more mobility, flexible work schedules, and virtualized collaboration.
Tags : 
     Cisco
By: Dell EMC     Published Date: Aug 03, 2015
The infographic provide leading analyst insights on the all-flash array market and how innovation accelerators are driving the agile data center through high data growth and the need for increased scalability and performance.
Tags : innovation, industry, data center, data growth, scalability
     Dell EMC
By: MobileIron     Published Date: Jul 31, 2015
Windows 10 is a major OS overhaul that unifies device and security management for the modern enterprise architecture by converging separate OS versions onto one platform managed by an EMM console. This Infographic details 10 tips for ensuring you and your organization are ready to upgrade to Windows 10.
Tags : windows 10, emm, enterprise mobile management, mobile it administrators, security
     MobileIron
By: Citrix Systems     Published Date: Jul 28, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
     Citrix Systems
By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
     Venafi
By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates
     Venafi
By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection
     Venafi
By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
     Venafi
By: Socialbakers     Published Date: Jul 22, 2015
In this exclusive Socialbakers report, we look at how National Geographic uses competitive analytics and content optimization strategies to keep up with audiences and remain one of the most engaging social brands in the world.
Tags : social media, social media best practices, content optimization, engagement, social media engagement, social, social brands, social metrics
     Socialbakers
By: BMC Software     Published Date: Jul 22, 2015
Find out how BMC TrueSight IT Data Analytics can help you identify and resolve issues faster by leveraging both monitoring and log data so you can avoid performance issues and improve quality of service while also enhancing IT staff productivity.
Tags : bmc truesight it data analytics, monitoring data, log data, performance issues, quality of service, productivity
     BMC Software
By: Citrix Systems     Published Date: Jul 17, 2015
Solution for virtual application delivery.
Tags : security, cost, mobility, productivity, data
     Citrix Systems
By: Citrix Systems     Published Date: Jul 17, 2015
Choosing Citrix over VMware.
Tags : control, productivity, mobile workspace, data security, sharing, desktop virtualization, cloud
     Citrix Systems
By: Citrix Systems     Published Date: Jul 17, 2015
Business issues driving IT toward desktop virtualization.
Tags : data security, desktop management, seamless mobility, applications, it strategy
     Citrix Systems
By: Cornerstone OnDemand     Published Date: Jul 16, 2015
Forget the conventional wisdom – increasing employee engagement does not mean increasing salaries. So how exactly, then, can executives achieve a happy, motivated team? By offering simple free or low-cost perks! In the new infographic, Whistle While You Perk, you’ll uncover the hidden truth about engagement – that employees don’t want more money. They’d rather have a flexible lifestyle and not be married to their desk. You’ll also learn that employees really want: • a fluid work environment that promotes friendships • to put their personal stamp on the workplace • a professional experience that makes them say no to external job offers Want to discover additional easy ways to increase engagement? Download Whistle While You Perk today!
Tags : perks, productivity, engagement, performance, development
     Cornerstone OnDemand
By: Cornerstone OnDemand     Published Date: Jul 15, 2015
In the new infographic, Whistle While You Perk, you’ll uncover the hidden truth about engagement – that employees don’t want more money. They’d rather have a flexible lifestyle and not be married to their desk.
Tags : employee engagement, perks, flexibility, work environment, professional experience, talent retention
     Cornerstone OnDemand
By: IBM     Published Date: Jul 07, 2015
This Technical Support Services infographic explains how IBM can help you manage your multivendor IT environment.
Tags : multivendor, it environment, performance, software activities, virtualization, operating systems
     IBM
By: IBM     Published Date: Jul 07, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs. It also charts our four capabilities and the modular services aligned to them.
Tags : ibm, developer, app, platform, it manager, ciso, integration, support
     IBM
By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : lenovo, xclarity, server value, system management, automated discovery, configuration management
     Lenovo
By: Okta     Published Date: Jul 01, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
     Okta
By: Quantcast     Published Date: Jun 26, 2015
Quantcast commissioned two studies to test the demographic targeting accuracy of leading data vendors. The results? Considerable variability in data vendor performance.
Tags : quality, targeting, reach, audience, accuracy
     Quantcast
Start   Previous    21 22 23 24 25 26 27 28 29 30 31 32 33 34 35    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics