RSS feed Get our RSS feed

News by Topic

proactive

Results 1 - 25 of 383Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
     Akamai Technologies
By: Bluecore     Published Date: Dec 10, 2018
Bluecore helped evo: Move from batch and blast to 1:1 email marketing Replace one-size-fits-all promotional emails with automated emails that feature targeted content and send based on customers taking certain actions or changes to products. Scale the email program and results without scaling the team Introduce 15 high performing email campaigns and expand the email program reach to support a growing business without adding new headcount. Add new value for shoppers and the marketing team Launch a series of emails that proactively notify customers about changes to products with which they’ve engaged, including price and stock changes, while simultaneously adding a new opportunity to capture email addresses.
Tags : 
     Bluecore
By: Akamai Technologies     Published Date: Dec 05, 2018
Akamai now mitigates the more than 65% of the 10,000-plus yearly DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. We attribute this growth to our proactive engagement with customers, and the ability to implement and manage proactive mitigation postures based upon their baselined network traffic. Akamai has been detecting and successfully mitigating DDoS attacks in an industry-leading SLA for 15 years. We will illustrate how Akamai continues to lead the industry with new capabilities including advanced customer traffic profiling and proactive mitigation controls to ensure the best possible results during an actual DDoS event.
Tags : 
     Akamai Technologies
By: Dell EMC Storage     Published Date: Nov 28, 2018
Dell EMC CloudIQ powered by Intel® Xeon® processors is like a fitness tracker for your storage environment, providing a single, simple, display to monitor and predict the health of your storage environment. CloudIQ makes it easy to track storage health, plan for future growth, report on historical trends, and proactively discover and remediate issues from any browser or mobile device.
Tags : 
     Dell EMC Storage
By: Amazon Web Services     Published Date: Nov 08, 2018
Join our webinar to learn how Inova is using this technology to proactively identify biomarkers for personalized treatment intended to improve health outcomes for children.
Tags : 
     Amazon Web Services
By: Dell     Published Date: Nov 02, 2018
For many organizations, digital transformation (DX) is the most strategically important initiative for the organization and may determine its ability to compete in the coming decade. IDC estimates that 60% of organizations will have created and begun implementation of a digital transformation strategy by 2020. These DX initiatives are designed to take the organization forward as a proactive, data-driven company that uses and monetizes data to gain competitive advantage in the marketplace.
Tags : 
     Dell
By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, you’re buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
     Spectrum Enterprise
By: Adobe     Published Date: Oct 24, 2018
Customer experience has quickly moved from competitive differentiator to business imperative. Our commissioned study, conducted by Forrester Consulting, found that organizations proactively making investments to become Experience-Driven Businesses (EDBs) achieve greater results across every stage of the customer journey. And EDBs boost ROI higher than companies that do not. To see how, read The Business Impact of investing in Experience.
Tags : 
     Adobe
By: ServiceNow     Published Date: Oct 22, 2018
Discover the lessons ServiceNow learned on their journey to building a business service–centric Services Reliability Team. Leveraging the combined power of ITSM & ITOM, they now deliver high performance & high-availability business services to all employees while proactively eliminating service outages.
Tags : itom, itsm, operations, business, servicenow
     ServiceNow
By: Comcast Business     Published Date: Oct 19, 2018
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion. As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Tags : 
     Comcast Business
By: Comcast Business     Published Date: Oct 19, 2018
Industry historically has run on the concept of "If it ain't broke, don't fix it." Companies that had found success with a process or technology were content to maintain their status quo, and it wasn't until they started falling behind their competition that they considered making a change. Digital Transformation changed that, as organizations increasingly embraced technology to push ahead of their competitors and be more proactive in the decisions that impact their business.
Tags : digital transformation
     Comcast Business
By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
     CloudEndure
By: ServiceNow     Published Date: Sep 18, 2018
What is a performance based business? A performance-based business is an organization guided by data-driven decisions. It is proactive, self-aware, and highly competitive. Data isn’t siloed in a business analytics department. Instead, the right people have the right data at the right time and in the right context. The top 5 reasons to become a performance-based business: 1. Get better results. 2. Align your entire business. 3. Make data-driven decisions. 4. Manage change more effectively. 5. Spot trends faster. Discover how ServiceNow Performance Analytics could benefit your business by downloading this eBook.
Tags : performance, business, data, servicenow
     ServiceNow
By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
     F5 Networks Inc
By: Iterable     Published Date: Sep 07, 2018
Today’s consumers are more informed, diverse, demanding and well-connected than ever before. With nearly unrestricted access to shopping resources used for discovery, comparison, and purchase, consumers are able to shop at will, often independent of branded retailer guidance. This rise of consumer independence can be attributed to the emergence of technological advancements favoring consumer empowerment; however, the repeated failures of brands to proactively offer personalized, high-value shopping experiences at scale is a significant contributing factor of consumer exodus. This has fostered an inclination among shoppers to become self-reliant in their pursuit of purchases, effectively shutting out promotional outreach from brands. Many brands continue to fall out of touch with their customers because they’ve lost sight of their customers’ true needs. Customer centricity has long been the foundation for modern marketing, but the brands which fail at creating deeply personalized market
Tags : 
     Iterable
By: Cylance     Published Date: Aug 22, 2018
According to Forrester, traditional approaches to endpoint security have become outdated and less effective as cyberthreats have increased in both number and complexity. To battle the ever-increasing threats, security professionals are now turning to new endpoint security technologies to either augment or replace their failing antimalware solutions. Below are the key trends in endpoint security, and the strategies that companies are using to address them.
Tags : cylance, proactively, security, threats, cyberthreats, cylance
     Cylance
By: Splunk     Published Date: Aug 21, 2018
Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks. This white paper, “The Five Essential Capabilities of an Analytics-Driven SOC”, dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels. Download this white paper to to learn about: *How advanced analytics and machine learning are now critical hallmarks of the modern security platform *How proactively hunting and investigating threats can shore up defenses *Why adaptive security architectures, like Splunk’s, are needed to prevent, detect and respond to attacks in today’s security landscape
Tags : 
     Splunk
By: ServiceNow     Published Date: Aug 20, 2018
Find out how leading healthcare providers are using a proactive approach to keep their EHR and supporting infrastructure continually running and compliant with strict regulations for health data security and privacy. Learn more about keeping critical systems operational and sensitive data secure. Download this white paper to see how eliminating outages and combatting cyberattacks can help improve patient care.
Tags : 
     ServiceNow
By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : threats, applications, cybercriminals
     F5 Networks Inc
By: Carbon Black     Published Date: Aug 14, 2018
Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attack objectives.
Tags : 
     Carbon Black
By: TIBCO Software APAC     Published Date: Aug 13, 2018
The combination of legislation, market dynamics, and increasingly sophisticated risk management strategies requires you to be proactive in detecting risks like fraud quicker and more effectively. Dynamic detection systems need to adapt to evolving compliance regulations, scale to deal with growing transaction volumes, detect sophisticated risk specific patterns, and reduce false-positives. TIBCO's Risk Management Accelerator uses a combination of predictive analytics, streaming analytics, and business process management to deliver a powerful and cost-effective system for detecting anomalies. Download this solution brief to learn more.
Tags : 
     TIBCO Software APAC
By: HireVue     Published Date: Aug 10, 2018
In retail, your people are your greatest asset. In this eBook you'll learn how to proactively drive revenue with recruiting, and how to prove the value of your efforts. Expect to learn: • 3 ways to calculate the ROI of your recruiting • How you can use the candidate experience to generate revenue • How to use the hiring process to decrease employee turnover • 2 approaches that remove the hiring burden on store managers Want to start driving revenue through your retail recruiting? Download the free eBook now!
Tags : 
     HireVue
By: ChannelAdvisor     Published Date: Jul 20, 2018
"If you’re an online retailer, you’re already familiar with the selling power of Amazon. With more than 310 million active user accounts and 44% of all online retail sales in the US going through the marketplace, this e-commerce giant’s influential position continues to expand. But for brands and retailers that want to succeed on Amazon, simply listing your products on the site is not nearly enough. In addition to being proactive and up-to-date with Amazon’s ever-evolving trends and requirements, you must also to take steps to ensure your products and brand stay one step ahead of competitors. In this eBook, we’ll share some of the most important strategies that online retailers and manufacturing brands should employ to succeed on Amazon including how to optimize your search terms and listings, maximize your advertising options, keep your products competitive and more. "
Tags : 
     ChannelAdvisor
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics