Skip to main content
 

sam

Results 101 - 125 of 1172Sort Results By: Published Date | Title | Company Name
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: Emotive Brand     Published Date: Jan 27, 2010
The concepts of "brand" and "reputation" are often seen as one and the same. However, when viewed separately, significant opportunities arise to improve both. The road to successful branding has never been more complex or challenging. What started, as a one-way lane going directly from the manufacturer's door to the buyer's door is now an everexpanding, two-way, multi-lane superhighway with intersections, tollbooths, and rest stops.
Tags : 
emotive brands, reputation, branding, brand
    
Emotive Brand
Published By: Oracle     Published Date: Feb 21, 2018
Over the last decade we have seen the dramatic increase in adoption of Mobile as an engagement channel for consumers and employees within the enterprise. What we are seeing now is the emergence of messaging through channels like FB Messenger, WhatsApp, WeChat, Slack, SMS, as a dominant engagement channel. Over 4.1 Billion users around the world are on instant messaging apps, adopted a rate that was much faster than on social networks. What makes these channels the default choice is the expected instant response if the other person is on or the push notification that triggers the person on the other side to respond immediately. These users that use instant messaging channels to converse with their friends and family want to use the same familiar user experience and channel to instantly communicate with the enterprise. These channels are doing to apps what browsers did to client server apps i.e. these channels are rapidly becoming the next browser. This is leading to the innovations in c
Tags : 
    
Oracle
Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility
    
LogRhythm
Published By: VMware AirWatch     Published Date: Feb 21, 2017
For many IT organizations that have implemented desktop virtualization, a game-changing decision is on the horizon. New options are now available that can significantly simplify desktop management – and at the same time eliminate trade-offs between performance and cost. Download this Datamation whitepaper to learn about the options IT now has to unify desktop virtualization and application delivery under one platform, reducing costs and improving user experience with VMware® Horizon®.
Tags : 
    
VMware AirWatch
Published By: eTouch     Published Date: Aug 04, 2009
The native speakers of the islands of Hawaii probably had no notion of the inadequacy of the Word and Email duopoly to corporate communications when they coined the term Wiki - literally meaning fast. However, Wikis have grown into just that -- a fast and efficient way of fostering knowledge sharing across corporations worldwide; combining elements of Word, email, RSS, plugins and other relevant technologies.
Tags : 
roi, wiki, etouch, rss, plugins, word, email, blog
    
eTouch
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
In the same way, the WLAN seems to be demanding more of our attention these days. IT teams are spending an increasing amount of time managing, configuring and troubleshooting to accommodate a growing number of devices and apps, and to meet user demands for ever-faster speeds and better coverage.
Tags : 
it teams, wlan, intelligent architecture, unified network, security management, iot onboarding
    
Alcatel Lucent Enterprise
Published By: Avi Networks     Published Date: May 23, 2019
TCPdump may be old, but does that matter? Application proliferation as apps move from bare metal to virtual machine to containers Network teams are asked to do more with the same number of people Network analysis in public clouds and containers requires different tools
Tags : 
    
Avi Networks
Published By: DellEMC and Intel®     Published Date: Jul 05, 2017
Accelera applicazioni e piano di produzione dell'IT con la velocità, l'efficienza e la convenienza delle soluzioni completamente flash di Dell EMC e Intel®. Esamina la linea di array completamente flash e scopri perché Dell EMC è leader nelle soluzioni completamente flash. Processore Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, il logo intel, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: RelayHealth     Published Date: May 31, 2013
Join RelayHealth for a recorded Healthcare Finance News webinar, Accelerating Service-to-Payment Velocity. With all of the changes happening in healthcare today, some things do remain the same. Your two primary sources of cash are still patients and third-party payers. While patient financial responsibility is rapidly increasing, a large percentage of revenue still flows in via governmental payers and commercial health plans.
Tags : 
accelerate payment, payment resolution, service-to-payment velocity, claims data, continuing education credit, financial / revenue cycle management, claims processing, electronic health records
    
RelayHealth
Published By: Oracle     Published Date: Sep 26, 2019
As marketers chase after the same people with the same tactics, traditional marketing has become less worth the time—and the money. Email outreach worked until spam clogged up inboxes. Content marketing worked until everybody started to put out sub-standard material. And search engine marketing worked until it became inundated with new players clamoring for attention. Even inbound tactics aren’t delivering the results they once did. And as the need for performance continues to climb, so does the status of account-based marketing (ABM). In the B2B sphere it’s on the tip of everyone’s tongue. Download this whitepaper to learn more about ABM, a potent approach that puts sales and marketing together.
Tags : 
    
Oracle
Published By: AON     Published Date: Oct 25, 2016
The unfortunate reality is that not all of your employees are going to be engaged. You can institute every program imaginable - there will always be a subset of your organization that do not Say positive things about your company, do not feel motivated to Strive to give extra effort, and do not intend to Stay with your company. All the same, this shouldn’t deter you from creating a culture of engagement.
Tags : 
    
AON
Published By: Cotendo     Published Date: Sep 01, 2010
The company wanted a high-performing CDN partner that understood and supported AdBrite's vision and provided the same transparency in its services.
Tags : 
cotendo, case study, adbrite, high-speed ad delivery, cdn, content delivery
    
Cotendo
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
Qualys
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
BlackBerry Cylance
Published By: IBM     Published Date: May 30, 2008
WinterCorp analyzes IBM's DB2 Warehouse and how it addresses twin challenges facing enterprises today: improving the value derived from the torrents of information processed every day, while lowering costs at the same time. Discover why WinterCorp believes the advances in data clustering strategies and intelligent software compression algorithms in IBM's Data Warehouse improves performance of business intelligence queries by radically reducing the I/O's needed to resolve them.
Tags : 
data warehousing, data management, database management, database administration, dba, business intelligence, ibm, leveraging information
    
IBM
Published By: IBM     Published Date: May 09, 2016
The clear benefits of agile development—better collaboration, incremental delivery, early error detection and the elimination of unnecessary work—have made it the default approach for many teams. Agile methods are also being adopted by systems engineering teams to deliver the same benefits. Some developers have questioned whether requirements fall into the category of unnecessary work, and can be cut down or even completely eliminated. Meanwhile, teams developing complex products, systems and regulated IT continue to have requirements-driven legacy processes. So how does requirements management fit in an agile world? This paper argues that requirements management can bring significant value to agile development in regulated IT and complex product development projects, and sets out the characteristics of an effective requirements management approach in an agile environment.
Tags : 
ibm, watson, iot, internet of things, continuous engineering, agile, agile development
    
IBM
Published By: Tricentis     Published Date: Jan 22, 2019
Agile is all about change. IT leaders adopt agile to accelerate the pace of change for their business-differentiable software. Adopting agile requires changes throughout the people, processes and technologies involved in building that software. Development teams must significantly change their structure, culture, tooling and daily activities for agile. And once agile is adopted, the applications under development change on a daily (or more frequent) basis.
Tags : 
    
Tricentis
Published By: CA Technologies     Published Date: Nov 02, 2016
Business moves fast. Customers demand now. You need to get ahead of it all. Markets are changing overnight, and the startups are disrupting the giants. The biggest risk you can take is to stand still. Do what you’ve always done and, you guessed it, you’ll be lucky to get the same results you’ve seen in the past. Odds are, those smaller, faster companies are going to sail right by.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Nov 16, 2017
Die Application Economy hat sich fest etabliert, denn mittlerweile hängt unser gesamtes Leben von vernetzten Anwendungen ab, die auf einer Vielzahl unterschiedlicher Geräte und Systeme und in On-Premise- wie auch Cloud-basierten Infrastrukturen laufen.
Tags : 
    
CA Technologies EMEA
Published By: Pluribus Networks     Published Date: Sep 25, 2014
Software Defined Networking (SDN) allows organizations to deliver networking with the same level of flexibility and agility as virtualization has allowed them to deliver other parts of their infrastructure. This free webinar will examine current networking architectures at a high level.
Tags : 
pluribus, pluribus networks, sdn, software defined networking, distributed networking, distributed computing, network virtualization, rack switching
    
Pluribus Networks
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Global corporate enterprise AI practitioners are clearly still dealing with infrastructure issues related to talent and technology. End-to-end processes remain stubbornly carbon-based. Rule-based automation is truly not yet globally scaled across the majority of organizations. Double the AI And yet, the AI & Intelligent Automation Network members went from 21%, having deployed Intelligent Enterprise solutions to over 44% in just one year’s time. Over 4/5 expect to deploy AI in under two years The stated goal for deployment is just under 83% by the end of 2020. Considering the fact that they’ve essentially got two years, and those ranks have doubled in one year – doubling again in two years is achievable. Incidentally, that same number was only 67% a year ago. 50% expect to be established, globally scaling or refining AI in under two years Global corporate enterprise is in fact slowly but surely transforming into the intelligent enterprise of tomorrow. Having said that, it will be
Tags : 
analyst, artificial intelligence, intelligent automation, rpa
    
Automation Anywhere APAC
Published By: Veeam '18     Published Date: Mar 13, 2018
Windows Server 2016 has been generally available since October 2016. This eBook has been updated to provide the latest and greatest additions within Window Server 2016 as it applies to virtualization; Hyper-V. This is the main topic we will be discussing in this eBook, Windows Server 2016 Virtualization — also known as Hyper-V 2016. Components within Hyper-V are updated or additional functionality is added with each release of Windows Server. Knowing this is important to understanding the increased functionality as well as the overall usability of Windows Server through documents such as this. Many of the new features and functionalities do require some basic usage of PowerShell. Throughout this eBook you will find sample PowerShell scripts documented as examples allowing IT professionals to leverage Hyper-V PowerShell within their own environments.
Tags : 
microsoft, windows, server, technology, organization, optimization
    
Veeam '18
Published By: NetApp     Published Date: Dec 05, 2016
"All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all-flash storage in the enterprise. Originally used to accelerate performance for dedicated, mission-critical applications, all-flash arrays are now replacing disk and hybrid-flash systems as the preferred storage systems for virtualized environments. At the same time, scale-out solutions have emerged that are designed to power the new cloud services of the future. The book examines various elements of all-flash storage: how it evolved, and why you should now consider it for all of your primary applications. You get acquainted with the NetApp portfolio of all-flash storage solutions and learn how each is designed to meet the needs of a specific type of application environment. You’ll also learn five strategies for making smart decisions about all-flash arrays for your next storage project. In that classic Dummies style, you’ll walk away with useful tips on how to select and deploy all-flash
Tags : 
netapp, database performance, flash storage, storage for dummies, data management, cost challenges
    
NetApp
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
    
Cymfony
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.