Skip to main content
 

vendors

Results 101 - 125 of 955Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 24, 2019
Respond to customer feedback faster Organizations are demanding greater flexibility from the software they use. Yet, most line-of-business applications are built on top of rigid commercial databases that make them difficult and expensive to deploy. By building applications on top of Amazon Aurora, a cost-effective database solution from Amazon Web Services (AWS), independent software vendors (ISVs) can get away from commercial databases and the hassles they create for end customers. In this webinar, AWS Partner Network (APN) Premier Consulting Partner Onica will show you how to leverage Amazon Aurora to make it easier for customers to operate your software, in turn increasing sales. You will also learn how to leverage the breadth and depth of AWS services to improve developer productivity and become more responsive to customer feedback as a result.
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 24, 2019
Add more value to your business Independent Software Vendors (ISVs) are turning to the cloud to modernize their applications and get rid of their commercial database dependencies to improve application performance, lower total cost of ownership (TCO), and reach new customers. DB Best delivers the established processes and technology ISVs need to accelerate the modernization of applications still running on commercial databases to Amazon Aurora. This enables your customers to quickly get up-and-running on the cloud and drive greater business value through Amazon Web Services (AWS). View the webinar to learn how DB Best and AWS enable you to accelerate every stage of your application modernization journey – from evaluating the right migration path for your application, to following a proven and repeatable database migration process, to driving growth and reaching more customers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 24, 2019
Reduce costs and scale to meet customer expectations Software-as-a-service (SaaS) delivery models are being adopted faster than ever to meet business and consumer demand, prompting organizations to move their customer-facing applications to the cloud. As a result, Independent Software Vendors (ISVs) need to modernize their applications to deliver the flexibility and scale customers expect, without the restrictions and high costs of running applications on commercial databases. mLogica provides deep industry expertise, backed by powerful engineering, to help ISVs quickly modernize their applications on Amazon Aurora and drive greater business value with Amazon Web Services (AWS). Register for our webinar to learn how mLogica and AWS can help you transform your business on the cloud, so you can deliver modern, high-performing solutions to your customers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 24, 2019
Modernize your applications quickly Many organizations are finding their legacy technology to be inadequate due to its rigidity and high costs. In search of more flexible and cost-effective solutions, many are turning to the cloud. Most Independent Software Vendors (ISVs), however, still build their solutions on commercial databases that are expensive and time-consuming for their customers to deploy and maintain. This is a significant undertaking that can hinder adoption. To address these challenges head on, ISVs can modernize their applications on Amazon Aurora, a database offering from AWS that combines the reliability and performance of commercial databases with the cost-effectiveness and flexibility of open source solutions. In this webinar, you will learn how Virtusa, an AWS Partner Network (APN) Premier Consulting Partner, can accelerate your application modernization journey and help you grow your business. PTNR_ipc-database-migration-icon_245×155_Mar-2019.png View the webin
Tags : 
    
AWS
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management
    
Axeda Corporation
Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox
    
Axeda Corporation
Published By: Ayla Networks     Published Date: Aug 11, 2015
Innovative approaches for the Internet of Things on core building-block technologies in communications, IoT platforms and security. Gartner profiled five Cool Vendors that can help CIOs, IT leaders and decision makers to build IoT solutions.
Tags : 
    
Ayla Networks
Published By: B Channels     Published Date: Apr 27, 2018
This white paper provides an overview of Cloud service providers and outlines three key learnings for dealing with them effectively. Discover what connects cloud service providers with traditional software vendors Download to explore 3 key differences.
Tags : 
    
B Channels
Published By: B Channels     Published Date: Apr 27, 2018
We understand how IIoT (IoT Segment) solutions are designed and delivered through discrete ecosystems, we are able to work with IIoT vendors to identify routes to market, align programs, and partner engagements. We identify, recruit and nurture IIoT ecosystems that drive IIoT sales and delivery
Tags : 
    
B Channels
Published By: B Channels     Published Date: May 01, 2018
Many Enterprise & Mid-Market I.T Vendors are offering or moving towards Hybrid Cloud. bChannels has the right expertise and credentials to assess a vendor’s ecosystem & program needs to find, connect and nurture partners on a Hybrid Cloud proposition. Download this paper to find out more
Tags : 
    
B Channels
Published By: B Channels     Published Date: May 01, 2018
The Industrial IoT market is estimated to reach $123.89 Billion by 2021. Successful IIoT design and build requires tech and installer skills and products from many vendors. It also needs a Vendor / Aggregator marketplace and ecosystem for customer and partner access at scale. Vendors are looking for IoT consultative skills from channel partners today.
Tags : 
    
B Channels
Published By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
    
BeyondTrust
Published By: BillingPlatform     Published Date: Apr 18, 2019
Every Billing Platform Looks the Same… Unless You Know What To Ask. Read this exclusive whitepaper to explore the billing capabilities that can mean the difference between business success or customer fatigue. This executive brief describes: • The most important capabilities in any billing solution. • How the major billing solution vendors differ in each area. • The exact questions to ask vendors...including your current vendor. This whitepaper outlines the areas to consider when evaluating billing solutions. For each, we provide a description of the area, an explanation of the range of differentiation between billing vendors, and when to consider one approach over another. We also give you the exact questions to ask.
Tags : 
    
BillingPlatform
Published By: Birst     Published Date: Jul 16, 2013
Covering 23 vendors and 5 market segments, the 2013 Wisdom of Crowds Business Intelligence Market Study helps readers understand the current market landscape including the perceptions and plans of organizations adopting BI solutions, the latest user trends and technology.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics
    
Birst
Published By: BitSight Technologies     Published Date: Jun 12, 2015
Gartner has named BitSight Technologies a “Cool Vendor” in Vendor Management for 2015. This report highlights three vendors for offering “tools and services to support vendor risk management and improve performance visibility.” Download this paper to learn how BitSight processes and synthesizes terabytes of data to create security ratings, and how a leading North American Bank uses BitSight Security Ratings in their vendor risk management program.
Tags : 
bitsight, technologies, gartner, cool, vendor, data, risk
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : 
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : 
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management, enterprise applications
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Aug 02, 2016
Organizations today aren’t just single entities—they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. Because of this, vendor risk management (VRM) is a critical business practice.
Tags : 
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security, security
    
BitSight Technologies
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
volitionrx, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. That’s not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.