Skip to main content
 

san

Results 126 - 150 of 971Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
gateway, web, security
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Oracle     Published Date: May 15, 2018
More than 75% of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. To help you navigate your own journey to modernization, we’ve crafted this handbook series to share the knowledge gained working with many thousands of companies using both legacy and modern ERP systems.
Tags : 
    
Oracle
Published By: QAD     Published Date: Jan 19, 2018
Las industrias en México atraviesan por un momento coyuntural. Tienen la oportunidad de transformarse digitalmente para adaptarse a las nuevas exigencias del mercado.
Tags : 
    
QAD
Published By: QAD     Published Date: Jan 19, 2018
Las industrias en México atraviesan por un momento coyuntural. Tienen la oportunidad de transformarse digitalmente para adaptarse a las nuevas exigencias del mercado.
Tags : 
    
QAD
Published By: QAD     Published Date: Jan 19, 2018
Las industrias en México atraviesan por un momento coyuntural. Tienen la oportunidad de transformarse digitalmente para adaptarse a las nuevas exigencias del mercado.
Tags : 
    
QAD
Published By: QAD     Published Date: Jan 19, 2018
Las industrias en México atraviesan por un momento coyuntural. Tienen la oportunidad de transformarse digitalmente para adaptarse a las nuevas exigencias del mercado.
Tags : 
    
QAD
Published By: Ixaris     Published Date: Jan 25, 2018
Why travel agencies are losing 20% of their profits to unnecessary costs. Travel agents, tour operators and travel wholesalers are typically spending thousands in unnecessary costs each year. And in a fiercely competitive market operating on high volumes and low margins, ensuring efficiency with sales and purchasing systems is no easy task.
Tags : 
    
Ixaris
Published By: IBM     Published Date: Feb 23, 2012
Visa Europe addressed the unique nature of the European market by building a new payment platform which houses tens of thousands of business rules governing payment clearing and settlement. The result is greater business agility and competitiveness for both Visa Europe and its 4,000-plus member institutions. Read to find out more.
Tags : 
visa europe, payment process, ebusiness, internet, customer service, payment services
    
IBM
Published By: Adobe     Published Date: Feb 20, 2014
San Diego County District Attorney’s Office accelerates Juvenile Court proceedings using Adobe® Acrobat® Pro in Microsoft SharePoint environment.
Tags : 
adobe, adobe acrobat pro, file management, software, data management, electronic documentation, paperless processing, pdf documents
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
As a valued customer, Adobe understands that your enterprise takes extensive advantage of our software, with anywhere from hundreds to thousands of licenses for a variety of Adobe solutions. With the Adobe Enterprise Term License Agreement (ETLA), we are now making the management and procurement of your Adobe software simpler, more flexible, and predictable.
Tags : 
adobe, adobe software, enterprise term licensing, etla, adobe solutions, software management, software compliance, tco, total cost of ownership, deployment, workflow, support, collaboration, information management, document management
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
Les données sont la clé de cette opération. Toutefois, les collecter ne suffira pas. Il faudra s’en servir pour créer un profil holistique du client, puis utiliser ce dernier pour mettre au point des expériences intéressantes, personnalisées et, en fin de compte, mémorables. Cette série d’e-books en trois parties détaille étape par étape comment utiliser les données pour offrir à chaque client la meilleure expérience possible.
Tags : 
customer experience, marketing, data management
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
Cinquante ans plus tard, dans le monde réel de l’entreprise, la révolution annoncée dans cette scène atteint enfin un nouveau tournant. Technologie et créativité fusionnent pour créer des campagnes marketing d’une efficacité sans commune mesure avec celles d’il y a à peine dix ans.
Tags : 
marketing, data, customer relationship
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
Der Schlüssel hierzu sind Daten. Es reicht jedoch nicht aus, Daten einfach nur zu erfassen. Sie müssen anhand der Daten ganzheitliche Kundenprofile erstellen und diese anschließend verwenden, um interessante, personalisierte und nachhaltige Erlebnisse zu entwickeln. Diese dreiteilige E-Book-Reihe erläutert Schritt für Schritt, wie Sie Daten tatsächlich verwenden können, um jedem Kunden das bestmögliche Erlebnis zu bieten.
Tags : 
customer experience, marketing, data management
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Aujourd’hui, certaines prévisions sont moins complexes qu’elles ne l’étaient auparavant. Nous disposons désormais d’une quantité d’informations sans précédent sur les consommateurs et de la technologie adéquate pour faire parler les données. Les marketeurs peuvent prévoir avec une grande précision le comportement des clients, parfois même avant que ces derniers ne sachent eux-mêmes ce qu’ils vont faire.
Tags : 
data, information available, customer, customer experience, customer relationship
    
Adobe
Published By: Okta     Published Date: Mar 10, 2016
Large enterprises, SaaS providers and businesses with major web properties increasingly depend on Okta to handle authentication for their thousands or even millions of users. Learn about the technology and processes Okta has put in place in building a highly scalable platform that will be ready to securely store and serve billions of user identities.
Tags : 
    
Okta
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Founded in 1992 as a provider of integrated network, voice and data centre solutions, Colt’s business today has grown to encompass a wide range of IT services, spanning enterprise application hosting, business critical cloud and end-user computing solutions. Colt has 29 data centre locations supporting thousands of customers across 28 countries in Europe and Asia, including Swiss International Airlines, Shurgard, Berenberg, and Jaguar Land Rover. Colt’s award-winning solution portfolio is based on end-to-end data centre, network and IT services capabilities; its aim is to help its customers compete and win in their markets without being held back by hardware, licensing and resource limitations.
Tags : 
network management, best practices, network optimization, network applications, application management, technology, telecommunications
    
SolidFire_NetApp
Published By: Q2 eBanking     Published Date: Jul 30, 2017
This report is intended to serve as a guide to an effective digital banking conversion/change management plan. From your initial kickoff meeting to post-launch, you’ll learn about the key components required for success. The framework is the result of interviews with Q2 personnel who have been personally involved in thousands of hours of digital banking conversions, across hundreds of FIs, with every major core banking system on the market over the course of the past twenty years.
Tags : 
    
Q2 eBanking
Published By: Q2 eBanking     Published Date: Oct 24, 2017
The proliferation of fraud is an unpleasant reality. But the dispute management workload that fraud creates doesn’t have to be as unpleasant, or as unmanageable, as it is today.
Tags : 
    
Q2 eBanking
Published By: Juniper Networks     Published Date: Oct 19, 2015
Apprenez à protéger votre réseau, aujourd'hui et à l'avenir. Lisez notre dossier de solutions et découvrez comment vous protéger face à des menaces passant par le contenu et les applications, gérer la bande passante et réduire la complexité grâce à notre pare-feu de nouvelle génération.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 19, 2015
Consultez notre livre électronique pour apprendre à choisir les composants parfaits afin de construire un data center ouvert, évolutif et à l'épreuve du futur. Découvrez les tendances, défis et opportunités que vous rencontrerez au fur et à mesure de l'évolution de vos déploiements réseau cloud et de centre de données.
Tags : 
    
Juniper Networks
Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC
Published By: Logrhythm     Published Date: Sep 05, 2017
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defences with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Published By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
Formata da quattro aziende e dalla consociata Anteo Group, The CSI Companies offre servizi specifici per il personale in grado di soddisfare un’ampia gamma di esigenze dei clienti. Con sede a Jacksonville, in Florida, l’azienda fornisce dal 1994 servizi di incremento del personale, ricerca di dirigenti e assunzione diretta di collaboratori per clienti che operano nel settore sanitario, bancario, dei servizi finanziari, dell’hospitality, del retail e della tecnologia, solo per citarne alcuni. Intel Inside® per nuove, infinite possibilità. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, il logo intel, intel atom, intel atom inside, intel core, intel inside, il logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, celeron, celeron inside
    
DellEMC and  Intel®
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.