RSS feed Get our RSS feed

News by Topic

act

Results 13626 - 13650 of 13985Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: Sep 16, 2015
In this whitepaper, we discuss common enterprise use cases and define the advantages of MDM, containerization and the layered approach to security that both can provide.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
Over the last couple of years SD-WAN technology has matured into a mainstream solution. Yet, the most appropriate migration path is not always clear. While there are many considerations to balance during a migration, the enduring benefit of an SD-WAN architecture is simplification: branch design, data center design, routing, edge platform choices, security choices, management. To ensure an understanding of the fundamental concepts, let’s quickly discuss the architecture and components of SD-WAN, and then move on to cover the best practices of various aspects of an SD-WAN migration
Tags : 
     VMware SD-WAN by VeloCloud
By: Conversica     Published Date: Nov 10, 2015
In this whitepaper you will learn how artificial intelligence can automatically interpret and respond to emails from leads.
Tags : conversica, sales leads, leads, lead nurturing, intelligence, web analytics, business intelligence, data management/analytics
     Conversica
By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
     ZScaler
By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : ibm, cognos, mobile, inelligence, business intelligence
     IBM
By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware
     Webroot
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
     Cisco Umbrella EMEA
By: Rackspace     Published Date: Apr 15, 2019
Scale events — like online sales and digital product launches — present great revenue opportunities, but they also present large risks to your business. Whether you are a retailer preparing for Black Friday and Cyber Monday, or a digital vendor launching a new service, your brand is both at its most visible and its most vulnerable during these scale events. Many more customers visit your site over a short period of time, raising the potential for resource constraints and discovery of software bugs. Information about issues spreads quickly via social media and news outlets. And, your customers typically spend more per transaction, so every lost order has a greater negative impact on your bottom line. Site reliability engineering (SRE) can help you better prepare for scale events through an iterative cycle of data-driven improvement.
Tags : 
     Rackspace
By: Net Atlantic     Published Date: Mar 04, 2010
This white paper covers several ways to manage your subscribers to maximize deliverability, including permission options, suppression files, re-engagement campaigns, and more.
Tags : net atlantic, subscriber management, email management, deliverability, response rates, transactional mailing, emarketing, email marketing services/software
     Net Atlantic
By: TIBCO Software     Published Date: Feb 14, 2019
With the new TIBCO Spotfire® A(X) Experience, we are revolutionizing analytics and business intelligence. This new platform accelerates the personal and enterprise analytics experience so you can get from data to insights in the fastest possible way. With the fusion of technology enablers like machine learning, artificial intelligence, and natural language search, the Spotfire® X platform redefines what’s possible for analytics and business intelligence, simplifying for everyone how data and insights are generated, consumed, and acted on. Download this whitepaper to learn more, then check out the new Spotfire analytics. It’s unlike anything you have ever seen. Simple, yet powerful, it changes everything.
Tags : 
     TIBCO Software
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security
Tags : 
     VMware SD-WAN by VeloCloud
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldn’t fully anticipate how quickly emerging technologies would transform their business operations — and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: CrowdStrike     Published Date: Aug 01, 2017
Download this white paper to learn:?The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence?How fileless attacks exploit trusted systems —the types of processes compromised, the specific exploit tactics used to gain a foothold, and more?Why traditional technologies fail to protect against fileless attacks and what you can do to better defend your organization against them
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Jun 06, 2018
Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where noexecutable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
     CrowdStrike
By: Uberflip     Published Date: Mar 16, 2018
When it comes to content production, marketers across the globe can let out a collective “we’ve got this.” Content marketing is now the cornerstone of most organizations’ marketing strategies. In fact, 91 percent of all B2B companies use content marketing. And 38 percent of North American marketers say they expect their content marketing budget to increase in the next 12 months. We’ve invested heavily in it because it works.
Tags : 
     Uberflip
By: ADP     Published Date: Mar 22, 2018
Your global organization’s network of human capital management (HCM) platforms is the nerve center of your entire enterprise. But passing data back and forth between disparate HCM systems has never exactly been easy. So your HR, payroll, talent, benefits and time and attendance systems, often specific to regions and countries, fire futilely across data synapses that in real-world terms leave you blind to the true state of your business.
Tags : 
     ADP
By: ADP     Published Date: May 23, 2018
Your global organization’s network of human capital management (HCM) platforms is the nerve center of your entire enterprise. But passing data back and forth between disparate HCM systems has never exactly been easy. So your HR, payroll, talent, benefits and time and attendance systems, often specific to regions and countries, fire futilely across data synapses that in real-world terms leave you blind to the true state of your business.
Tags : 
     ADP
By: ServiceNow     Published Date: Jan 03, 2017
Migrating to a modern ITSM solution offers a myriad of benefits. So why aren’t more companies doing it? This white paper explores the fear of legacy suite change and how to overcome it, including: How choosing the right partner can smooth the transition Best practices for each phase of legacy migration A first-hand look at how one company migrated successfully Download the white paper to understand why modernizing your legacy ITSM is the right choice.
Tags : it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management
     ServiceNow
By: IBM     Published Date: Apr 18, 2016
Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : ibm, big data, trusted data, data management, data solutions
     IBM
By: IBM     Published Date: Jul 06, 2016
Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : ibm, big data, trusted data, data management, data solutions
     IBM
By: IBM     Published Date: Oct 13, 2016
Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : ibm, big data, trusted data, data management, data solutions
     IBM
By: IBM     Published Date: Jul 08, 2015
Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
     IBM
By: IBM     Published Date: Oct 19, 2015
This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : ibm, integration, data volume, business technology, information
     IBM
By: LifeSize, a division of Logitech     Published Date: Jan 12, 2011
As an industry expert in VoIP and UC technologies, I am personally declaring "2011 as the Year of Videoconferencing". Yes videoconferencing is here and it's going mainstream - BIG time. Read this white paper to find out why.
Tags : lifesize, roi, telecommunication, voip, web conferencing, broadband, bandwidth
     LifeSize, a division of Logitech
Start   Previous    539 540 541 542 543 544 545 546 547 548 549 550 551 552 553    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics