Skip to main content
 

intel

Results 3276 - 3300 of 3462Sort Results By: Published Date | Title | Company Name
Published By: FireEye     Published Date: Feb 28, 2014
This whitepaper further educates you on the new security challenges for state and local governments.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: HP     Published Date: May 05, 2014
Service virtualization and testing automation speed time-to-market: Discover how Walgreens has reduced application development cycle time (from 10 weeks to 5 to 7 weeks), transformed testing into a non-linear, agile process and ensured high quality of proprietary business applications using HP Application Lifecycle Management solutions. Walgreens is a leader in providing consumers with multi-channel access to pharmacy and health-and-wellness related goods and services
Tags : 
hp uft, hp service virtualization, hp application, hp software tools, it case study, lifecycle intelligence, lifecycle management, alm, walgreens, services, hp performance center
    
HP
Published By: HP     Published Date: May 14, 2014
In today’s world of explosive data volumes, midmarket companies face a growing number of challenges when it comes to safeguarding data, and today's approaches to backup and data protection are falling short. The Brief outlines HP solutions to meet IT needs for backup appliances that tightly integrate deduplication, data protection and recovery.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication
    
HP
Published By: EMC     Published Date: Jul 31, 2014
ESG report on virtualization, intelligent management software and the benefits of ICP.
Tags : 
    
EMC
Published By: Adobe     Published Date: Feb 08, 2016
The highly-anticipated Adobe and Econsultancy report, Quarterly Digital Intelligence Briefing: The Quest for Mobile Excellence, details the results of a global survey of marketers and digital professionals. It highlights key priorities, challenges and areas of investments that companies need to consider for 2015 and beyond.
Tags : 
adobe, mobile, marketing, mobile challenge, emerging marketing, internet marketing, crm & customer care
    
Adobe
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: Epicor     Published Date: Jun 22, 2017
If you’ve started to think your lumber and building materials (LBM) business could be getting more from your software, then it might be time for a change. It is no longer sufficient to own a solution that is “good enough.” The most successful LBM companies know that growth comes from integrated online trading, access to business intelligence tools, and using technology to be more efficient. It can be daunting to make the switch to a new enterprise resource planning (ERP) system, and with so many options, it’s hard to know when if you’re choosing the right one. Epicor has provided LBM businesses with the tools needed to make the most informed software choice. The lumber and building materials solutions evaluation kit consists of three white papers that tell you: • How to know when you’ve outgrown your current software solution • How to choose between generic and industry-specific ERP systems • How to outperform in an era of LBM sales growth You’re ready for growth. Learn how Epicor ca
Tags : 
lumber, building materials, lbm, erp, bistrack, building materials distributors, lumber distributors, lumber manufacturers
    
Epicor
Published By: Cray Inc.     Published Date: Aug 21, 2014
Learn how to optimize codes for faster application performance with Intel® Xeon® Phi™ coprocessor.
Tags : 
optimization, nics, intel, supercomputers, hybrid processing, performance
    
Cray Inc.
Published By: Drillinginfo     Published Date: Nov 20, 2015
OFS companies in and around the Marcellus Play need fast, accurate rig intelligence from one comprehensive source to stay competitive. With Drillinginfo (DI) you’ll gain an edge in the Marcellus Play by using the best data and the broadest intelligence available. Tracking prospects can be a lucrative opportunity, but since rigs move on a daily basis it’s important to have updated information. Learn how DI can drive a company’s success by gathering up-to-the-minute rig intelligence from a single, comprehensive software solution. The Marcellus Shale is seeing an increase in drilling every day, and with Drillinginfo you’ll have the products and solutions to help gain an edge on everything from permitting and leasing information to rig locations and pricing trends. Is your oilfield service team working from the right playbook? Find out how to get the most accurate, timely drill-site and well event information while making the most out of each and every opportunity.
Tags : 
ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
    
Drillinginfo
Published By: Drillinginfo     Published Date: Nov 26, 2015
Today data sources are still not detailed enough to support competitive decision-making, and that’s what makes Drillinginfo (DI) so innovative: The DI platform offers the most inclusive, accurate, and fastest information available, allowing OFS companies to make informed decisions and drive the best leads — that can turn into opportunities. With DI, OFS companies can now make rig data useful quickly and easily. Sales managers can work crucial data into an actionable format, provide and implement the right analytical tools, and supplement lead intelligence, so operators don’t get left in the dust. From permitting and leasing information to rig locations and pricing trends, you’ll find innovative products and solutions from DI to help transform how your team qualifies leads and closes deals. See how Drillinginfo can drive your success by gathering the very latest rig intelligence from a comprehensive, easy-to-use SAS solution.
Tags : 
ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
    
Drillinginfo
Published By: HPE     Published Date: Feb 11, 2015
Delivering high-quality services with greater speed and efficiency is one of the greatest pressures facing your information technology (IT) infrastructure. The rise of computing in the cloud, expansive mobility options, and increasing pressure to boost application performance have added even further complexity - leading to inefficiencies that can limit your opportunity for growth and success. Traditional, siloed IT infrastructures are often too labor intensive, inefficient, and slow to overcome these challenges. Organizations need a converged, cloud-ready, software defined infrastructure to help them meet the evolving demands of their business. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries. Sponsored by: HP and Intel® Xeon® processor HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s
Tags : 
    
HPE
Published By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : 
upgrade, principled technologies, mobility, windows 10
    
Dell
Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning, social listening, brand crisis, brand monitoring, brand protection, reputation management, corporate communications, public relations, emerging marketing, advertising agencies, internet marketing, crm & customer care, marketing research
    
Meltwater
Published By: eDataSource     Published Date: May 05, 2015
Looking to improve your email performance? Over 100 emailers achieved a 40 open rate for Mothers Day alone - Learn more...
Tags : 
edatasource, email tools, email performance, email subject line, real-time data, email competitive intelligence, email marketing, emerging marketing, e-commerce
    
eDataSource
Published By: Firehost     Published Date: Jan 07, 2015
This Case Study gives information on the 16 Infrastructure Components to pass your next Audit.
Tags : 
firehost, intelligent security, infraestructure, security
    
Firehost
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
Intel Security
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Success of an effective threat defense strategy.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis, simplifies remediation
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Avoid these worst practices.
Tags : 
gartner, network security, network management, best practices
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
"If your business is still running Windows Server 2003, you must act now to keep your business secure. This solution brief discusses three migration paths and how to choose the best one for your situation."
Tags : 
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
If your business is still running Windows Server 2003, you must act now to keep your business secure. This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Gartner Magic Quadrant for Mobile Data Protection
Tags : 
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
aberddeen, data center, datacenter, cloud, server security
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center, virtual datacenter
    
Intel Security
Start   Previous    125 126 127 128 129 130 131 132 133 134 135 136 137 138 139    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.