Skip to main content
 

activity

Results 1 - 25 of 297Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Insect Shield     Published Date: Sep 12, 2012
Tick-borne diseases such as Lyme disease, Rocky Mountain spotted fever, and ehrlichiosis are a significant concern for many thousands of workers who have frequent and unavoidable exposure to tick-infested habitats. Treatment of clothing with permethrin, a nontoxic chemical with insecticidal, knockdown, and repellent properties, is highly effective against ticks. However, most permethrin products must be reapplied after several washings to maintain insecticidal activity. Recently, a factory-based method for long-lasting permethrin impregnation of clothing has been developed by Insect Shield, Inc., that allows clothing to retain insecticidal activity for over 70 washes. This study provides preliminary evidence that long-lasting permethrin-impregnated clothing may be highly effective against tick bites.
Tags : 
    
Insect Shield
Published By: StoryDesk     Published Date: Aug 17, 2011
Take advantage of the iPad's interactivity and mobility to wow your clients and leave an impression that sets you apart from the competition.
Tags : 
ipad, sales tool, apple ipad, ipads, presentation, presentation tools
    
StoryDesk
Published By: StoryDesk     Published Date: Jan 04, 2013
What makes for a winning iPad presentation app for sales teams? How can interactivity keep prospects' attention focused? How can you use technology to make your message more memorable? Learn the answers to these questions and more.
Tags : 
advertising agencies
    
StoryDesk
Published By: Dell EMC     Published Date: Aug 07, 2018
The media and entertainment industry was valued at $1.81 trillion in 2016, and is expected to reach $2.14 trillion by 2020. Activities within this industry have grown over the last couple of years, and now range from creating content for movies, TV and games, to delivering that content. This is increasingly performed via on-demand data networks rather than traditional over-the-air broadcasting, watched over high resolution displays that enhance the overall viewing experience of the user, and even the latter is being delivered from the same storage repositories. Media production is also now prevalent in areas not traditionally associated with this activity, such as training, museums, and education.
Tags : 
    
Dell EMC
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: HotSchedules     Published Date: Jul 28, 2017
After filing for bankruptcy in 2012, the Real Mex Restaurant Brands turned their stores’ performance and sales around with the help of HotSchedules Activity-Based Forecasting Module.
Tags : 
retail management, business growth, performance scheduling, management, retail performance
    
HotSchedules
Published By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
    
Gigamon
Published By: Riverbed     Published Date: Jan 25, 2018
"Visibility into the live mix of network and application activity being hosted and delivered by the IT infrastructure has always is a 'must-have' for many aspects of IT planning and operations. But the greatest value and impact is achieved when those two viewpoints are blended together into one unified view. This paper reviews the primary challenges that IT teams face in establishing unified visibility, the key requirements that management solutions must meet to address those challenges, and examines a Riverbed solution that has been specifically designed to offer a path to success."
Tags : 
    
Riverbed
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Make your app experiences count by focusing on your core competency — your awesome app and killer content — and enlist a trusted partner who can: Accelerate Content Optimize Images Gain insight into real-user activity Download now to learn more!
Tags : 
app, akamai, content, marketing
    
Akamai Technologies
Published By: Adobe     Published Date: Nov 07, 2013
A key finding of this research is that most companies have a great opportunity to improve their business performance by taking a more integrated approach to managing their digital media mix.
Tags : 
adobe, econsultancy, media optimisation report, effective optimisation, media mix, tactical objectives, complex media landscape, consumer buying patterns, digital media, optimisation of media activity, online display, paid research, campaign performance, business imperatives, disparate ownership, outsourced to agency
    
Adobe
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: Akamai Technologies     Published Date: Nov 30, 2016
The latest analysis of cloud security DDoS and web application attacks observe across the Akamai Intelligent Platform for Q32016. Highlights include analysis of the latest wave of mega attacks, a look at NTP trends and shrinking of NTP reflection capabilities, and a look at how bot activity can create DDoS-like conditions.
Tags : 
akamai, ddos, web application attacks, ntp, akamai intelligent platform
    
Akamai Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies
Published By: Adobe     Published Date: Feb 03, 2015
This Benchmark report evaluates digital advertising activity, predicts trends of Social Media and Online Advertising.
Tags : 
digital advertising report, search marketing, social media
    
Adobe
Published By: Adobe     Published Date: Feb 03, 2015
This Benchmark report evaluates digital advertising activity, predicts trends of Social Media and Online Advertising.
Tags : 
digital advertising report, search marketing, social media
    
Adobe
Published By: Evariant     Published Date: Nov 14, 2016
All parts of the health system can, and should, contribute to alignment success. Today’s health system C-suite executives are realizing they have the ability and the responsibility to contribute to physician alignment efforts. That means just making phone calls and visiting physicians to promote your services is not enough. To achieve both physician alignment and optimize patient care, you must have a view into physician activity and referrals. Understanding physician behavior provides the basis for more meaningful dialogue with physicians.
Tags : 
physician alignment, physician relationships, revenue growth
    
Evariant
Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Limelight Networks     Published Date: Oct 17, 2011
Learn how to use every mobile opportunity to your advantage. This report shows you how to: . Optimize your website for mobile devices . Take advantage of mobile context . Create richer mobile experiences by adding video and interactivity
Tags : 
mobile ads, marketing strategy, mobile marketing strategy, mobile optimization, retail
    
Limelight Networks
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: Cirque Du Soleil     Published Date: Apr 04, 2017
In today’s very competitive business world, it’s difficult to retain employees that are a “fit” with the corporate culture. Keeping the teams motivated is a constant challenge and good communication between departments and even co-workers can sometime seems like an unattainable goal. Team building can improve employees' ability to work together and increase your organizations' efficiency and productivity. By building a strong team, your employees will also feel a sense of belonging and loyalty to the business. Cirque du Soleil not only provides high quality entertainment, but offer a range of turnkey corporate packages that will allow you to truly socialize with your team members.
Tags : 
team building, corporate events, event planning, team bonding, cultural outings, company events
    
Cirque Du Soleil
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
Continuous testing is the practice of testing across every activity in the SDLC to uncover and fix unexpected behaviors as soon as they are injected. Continuous testing is the embedding of testing as a fundamental and ongoing aspect of every activity through the application lifecycle, from requirements through production, to ensure the business value is being achieved as expected. As the pace of business continues to quicken, companies are starting to recognize that to stay competitive the process of developing and releasing software needs to change. Release cadence has greatly accelerated. There is no occasion anymore for a six- to 18-month find-and-fix turnaround in which the customer will find the delay acceptable. Things need to move faster, and they need to be ready and perfect faster. Download this whitepaper to find out how CA Technologies can help with your Continuous Testing.
Tags : 
    
CA Technologies EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.