Skip to main content
 

response

Results 351 - 375 of 538Sort Results By: Published Date | Title | Company Name
Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
Published By: CarbonBlack     Published Date: Mar 16, 2016
Carbon Black has integrated with Microsoft endpoint technologies to provide enhanced prevention, detection, and response capabilities. This paper from EMA provides an overview of these integrations and discusses the key benefits of Carbon Black’s partnership with Microsoft.
Tags : 
endpoint security, carbon black, ema, microsoft, protection, detection, response capabilities
    
CarbonBlack
Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s cyber-attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today’s advanced attackers are using to break into your organization and why you require a defense-in-depth cyber security program that incorporates automatic detection and incident response.
Tags : 
carbon black, cyber attacks, cyber security, attacks, security, advanced attacks, detection
    
CarbonBlack
Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention, vendor, detection, response
    
CarbonBlack
Published By: Port25 Solutions     Published Date: Mar 23, 2012
As the chief crisis management solution nationwide, it is essential that eAlert utilizes a delivery system with maximum reliability, delivery performance, and reporting features to meet its clients' demands - PowerMTA was the only SMTP software flexible enough to supply these necessary features and easily integrate into eAlert's current system without interruption.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: Skillsoft     Published Date: Nov 21, 2013
Learning is critical to enabling business strategy, from onboarding new hires to developing future leaders, to educating channel partners and customers. This study, based on responses collected from 185 organizations between July and September 2013, looks at how organizations connect learning to business priorities, create development programs that impact every stage of the employee lifecycle and utilize technology to support learning initiatives. It also examines the business impact of building learning capability and running effective learning programs. Research conducted by Aberdeen Group and brought to you thanks to Skillsoft.
Tags : 
career advancement, learning, training, certification, onboarding, employee development, human capital management, learning, employee performance
    
Skillsoft
Published By: beep! Directed Voicemail     Published Date: Mar 12, 2013
Download this white paper to learn about the insights from B2B sales experts on how to properly use voice mail to drive more response.
Tags : 
voicemail, beep!, sales strategy, crm, customer relationship management, calling center strategy, sales
    
beep! Directed Voicemail
Published By: IBM     Published Date: Mar 28, 2013
Find out how organizations can use social approaches to create meaningful business value. This report is based on responses from more than 1,100 individuals and interviews with more than two dozen executives from leading organizations.
Tags : 
social business, business, organizations, social media, workforce productivity, ibm, business value, search marketing, email marketing, website development, emerging marketing, advertising agencies, internet marketing, crm & customer care, marketing research, e-commerce, traditional marketing, sales
    
IBM
Published By: IBM     Published Date: Nov 08, 2013
IBM SPSS Statistics helps Assess Systems improve its candidate assessment instruments
Tags : 
ibm, uncovering assessment response, assess systems, evaluate assessment data, ibm spss statistics, job performance, test development, test research, company fit, candidate to employee, solution components, business analytics
    
IBM
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs
    
Symantec
Published By: Cisco     Published Date: Sep 07, 2016
This white paper goes into detail about continuous endpoint threat detection and response in a point-in-time world.
Tags : 
    
Cisco
Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Spend less on prevention; invest in detection, response and predictive capabilities.
Tags : 
security architect, information, continuous response, incident, monitoring, remediation, adaptive architecture, protection, advanced threats, prevention, detection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Enterprises can use the Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
Tags : 
risk, threat, attack vector, security strategy, security architect, information, continuous response, incident, monitoring, remediation
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This report examines organizations’ security strategies, cyber-attack environments, IR challenges and needs, including a lack of visibility into user and network activity, shortage of investigative skills and poor security analytics capabilities.
Tags : 
siem, esg, jon oltsik, golden hour, attack detection and incident response
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : 
siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
The SANS 2015 Incident Response survey results reveal an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Tags : 
siem, incident response, sans, continuous monitoring
    
Intel Security
Published By: LookingGlass Cyber Solutions     Published Date: Jul 18, 2016
Download this whitepaper to learn more about these four steps to protect your organization from phishing attacks: Prevention: make your organization a tough target Detection: speed is everything Response: communication is key Recovery: have a process in place
Tags : 
    
LookingGlass Cyber Solutions
Published By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : 
security, data security, networks, branding, attacks, security, security breach, safeguarding, infastructure, risk, risk tolerance, security attacks
    
IBM
Published By: IBM     Published Date: Oct 31, 2014
To understand the impact of marketing management on business outcomes, IBM surveyed more than 500 professionals across fifteen industries. We linked responses to public financial information to see correlation between marketing sophistication and financial performance.
Tags : 
marketing management, marketing sophistication, financial performance, customer experience, crm & customer care, marketing research, sales
    
IBM
Published By: IBM     Published Date: Nov 05, 2014
IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, ibm threat protection, security, it security, protection system, threat protection system, prevention, detection
    
IBM
Published By: IBM     Published Date: Aug 28, 2014
The paybacks from paper-free processes can be dramatic: much improved response times and greater productivity of back-office staff. Extending capture to mobile devices provides even closer coupling to back-office workflows. Yet the progress being made towards paper-free processes is very slow. In this report, AIIM looks at the reasons for this poor progress, measure the adoption of digital mailrooms, chart the progress of mobile capture, and show which paper-free processes are the most effective. It helps you build a business case for the battle against paper, and make recommendations on how to move the business forward on all fronts.
Tags : 
paper-free processes, digital mailrooms, mobile capture
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
BM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, threat protection system, automated response capabilities, it security practices
    
IBM
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.