Skip to main content
 

ip loss

Results 1 - 25 of 44Sort Results By: Published Date | Title | Company Name
Published By: Jamf     Published Date: Aug 06, 2019
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Published By: Skillsoft     Published Date: Aug 09, 2018
Compliance Training Tip: Why Should I Implement a Hearing Conservation Program in my Workplace? Excessive noise could be putting your organization at risk. Ongoing exposure to excessive noise in the workplace can lead to permanent hearing loss. It can also increase stress, reduce efficiency, interfere with concentration and cause fatigue. Excessive noise can even cause industrial accidents if employees can’t hear co-workers give them warnings or directions. Hearing loss due to excessive noise is often so gradual that employees may not realize they have a problem until it’s too late. Fortunately, there are simple steps you take to protect your employees’ hearing… Download our free paper today to learn what those steps are. You’ll also learn: • What you can do to prevent hearing loss in the workplace • The OSHA Standards for hearing conservation • How Hearing Conservation can affect the bottom line • And more
Tags : 
    
Skillsoft
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Websense     Published Date: Jul 08, 2014
A white paper on the shortest path to prevention and risk production.
Tags : 
protecting ip data, dlp implementation, websense data security suite
    
Websense
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Avanade DACH     Published Date: May 08, 2018
In this six-step guide, we aim to help you solve your data challenges to prepare for advanced analytics, cognitive computing, machine learning and the resulting benefits of AI. We’ll show you how to get your data house in order, scale beyond the proof of concept stage, and develop an agile approach to data management. By continually repeating the steps in this guide, you’ll sharpen your data and shape it into a truly transformational business asset. You’ll be able to overcome some of the most common business problems, and work toward making positive changes: • Improve customer satisfaction • Reduce equipment outages • Increase marketing campaign ROI • Minimize fraud loss • Improve employee retention • Increase accuracy for financial forecasts
Tags : 
    
Avanade  DACH
Published By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
    
Butler Technologies
Published By: IBM     Published Date: Oct 19, 2015
IBM InfoSphere Information Server connects to many new ‘at rest’ and streaming big data sources, scales natively on Hadoop using partition and pipeline parallelism, automates data profiling, provides a business glossary, and an information catalog, plus also supports IT.
Tags : 
ibm, infosphere, data profiling, business glossary, partition, pipeline parallelism, information server, data sources
    
IBM
Published By: Workday Netherlands     Published Date: Apr 30, 2019
Lees deze expertanalyse van SMB Group en ontdek waarom één systeem voor finance, HR en payroll hét verschil maakt voor uw organisatie. U krijgt ook tips voor het kiezen van de beste oplossing voor uw organisatie.
Tags : 
workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Workday UK     Published Date: Apr 25, 2019
Lees deze expertanalyse van SMB Group en ontdek waarom één systeem voor finance, HR en payroll hét verschil maakt voor uw organisatie. U krijgt ook tips voor het kiezen van de beste oplossing voor uw organisatie.
Tags : 
    
Workday UK
Published By: Workday Netherlands     Published Date: May 21, 2019
Lees deze expertanalyse van SMB Group en ontdek waarom één systeem voor finance, HR en payroll hét verschil maakt voor uw organisatie. U krijgt ook tips voor het kiezen van de beste oplossing voor uw organisatie.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: Absolute Software     Published Date: Feb 14, 2012
Leonard Niebo, Director of IT for Brick Township Public Schools leads a discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs, and incidents of loss and theft.
Tags : 
school, education, budget, diversity, managing diversity, auditing
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security
    
Absolute Software
Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect against advanced attacks.
Tags : 
threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
    
Vectra Networks
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
More and more people are using their personal devices to work from home, but are they secure enough? With the proper preparation, your laptop or smartphone can actually help improve security. Read our white paper for 5 easy tips to work securely on your personal device: Where to store your files to avoid data theft or loss Why those pesky update notifications are too important to ignore How often you should change your passwords, really
Tags : 
data security, personal device, security tips, passwords
    
Citrix ShareFile
Published By: Fiserv     Published Date: Jul 09, 2018
Cash may be popular with consumers, but it often presents challenges and extra costs for retailers. Manually handling, counting, reconciling and depositing cash every day, or multiple times a day, can be expensive. Smart safe technology and automated cash handling can help and benefit all areas of your business – from Finance to Operations to Loss Prevention – but, more importantly, your customers. Read this eBook to learn the four key benefits of automated cash handling: • Maximize your cash flow • Gain more flexibility with open systems • Reduce shrinkage and reconciliation • Care for customers instead of counting cash
Tags : 
cash automation, smart safe, cash handling, cash-in-transit, cash management, cit, cash vault, cash counting
    
Fiserv
Published By: IBM     Published Date: Oct 13, 2016
IBM InfoSphere Information Server connects to many new ‘at rest’ and streaming big data sources, scales natively on Hadoop using partition and pipeline parallelism, automates data profiling, provides a business glossary, and an information catalog, plus also supports IT.
Tags : 
ibm, data, analytics, big data, data integration
    
IBM
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Engineered Systems are architected to work as a unified whole, so organizations can hit the ground running after deployment. Organizations choose how they want to consume the infrastructure: on-premises, in a public cloud, or in a public cloud located inside the customer’s data center and behind their firewall using Oracle’s “Cloud at Customer” offering. Oracle Exadata and Zero Data Loss Recovery Appliance (Recovery Appliance) offer an attractive alternative to do-it-yourself deployments. Together, they provide an architecture designed for scalability, simplified management, improved cost of ownership, reduced downtime, zero-data loss, and an increased ability to keep software updated with security and patching. Download this whitepaper to discover ten capabilities to consider for protecting your Oracle Database Environments.
Tags : 
    
Oracle
Published By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : 
e-mail security, guide, clearswift, clearswift
    
Clearswift
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
When performing preventive maintenance or addressing a recall on IV pumps, Deaconess Gateway Hospital personnel spent hours scouring the facility to locate the right pieces of equipment. At the same time, the hospital was purchasing an average of 12 new telemetry packs each year—at over $1,000 each—due to accidental loss of these highly mobile devices. Read this white paper to learn more about how Deaconess Gateway Hospital is using a real-time locating platform to improve mobile equipment visibility and build a foundation for future analytics and intelligence.
Tags : 
hospital, healthcare, locating platform, mobile equipment visibility, analytics, intelligence, medical equipment, information technology
    
STANLEY Healthcare
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Patient falls were the largest category of adverse events reported at Barnes- Jewish Hospital. Progress in meeting targets for reducing falls and fall injury rates had been static despite multiple efforts. One component of the hospital’s Fall Reduction Program was a portable bed exit alarm system—a Bed-Check Classic-Check® control unit (CU) with Sensormat® pressure sensitive mat— widely used throughout the hospital. Due to high demand by staff, the CU was often not available, resulting in delayed care delivery and staff dissatisfaction. Loss or damage due to handoff between staff and the central service department resulted in additional resources and costs. Read this case study to learn how Barnes-Jewish Hospital implemented Bed-Check® Fall Management Solution as a part of their Fall Reduction Program, resulting in decreased fall injury rates and improved staff satisfaction.
Tags : 
patient falls, fall reduction, fall injury, healthcare, hospital, information technology, practice management
    
STANLEY Healthcare
Published By: Jamf     Published Date: Nov 05, 2018
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Published By: Mimecast     Published Date: Aug 22, 2017
Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry continue to cripple organizations. Business disruption, downtime, technical failure and data loss are all real risk factors that can’t be ignored. The power of preparedness is in your hands. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.
Tags : 
cyber resilience, petya, wannacry, cybersecurity
    
Mimecast
Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.