Skip to main content
 

net

Results 251 - 275 of 7736Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Jun 26, 2019
Everything changes. We are in a period of significant shifts in companies—even entire industries—demonstrated in rankings, like the Fortune Global 500. For the last century, these periods of volatility have been driven by a combination of technological change and capital expansion.1 There is obvious competition between direct, traditional market segments, but digital disruption also opens up the ability to compete and gain revenue in new areas. For example, a movie streaming service like Netflix also launches a community around the software it created to run its services, or an online retailer like Amazon also innovates with public cloud management. Innovation requires more than a slick customer user interface (UI). There has to be a foundation of technology, processes, and culture that allow an organization to be flexible, to build on its existing knowledge, and to incorporate new ideas. At a strategic level, today’s software is expected to deliver on a multitude of new and different
Tags : 
    
Red Hat
Published By: Citrix Systems     Published Date: Jun 26, 2019
https://technews.onlinetechreports.com/Technews/Citrix-ManagingJAP.html
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 26, 2019
https://technews.onlinetechreports.com/Technews/Citrix-OptimazingJAP.html
Tags : 
    
Citrix Systems
Published By: List Sotheby's International Realty, Singapore     Published Date: Jun 26, 2019
Citadel-founder Ken Griffin lit up the luxury residential sector in January 2019 when he bought a super penthouse in New York City for US$240 million. This purchase followed another acquisition he made in London in which he forked out US$122 million for a 200-year old house overlooking London’s St James Park. These ultra-high-net-worth (UHNW) buyers, local or foreign, are chief executive officers (CEOs) of tech companies or investment funds, and chairmen of major multi-national corporations (MNCs). They are also collectors of trophy assets who go for nothing less than the best-in-class attributes such as location, size, views, privacy, luxurious furnishings, and architectural merit. Trophy real estate is the ultimate collectible treasure. Like buying a prized sports car or a high-value masterpiece of art, trophy residences can ignite the desires of the UHNW individuals. As such, many developers of ultra-luxury properties have conceived collectible concepts right from the planning
Tags : 
    
List Sotheby's International Realty, Singapore
Published By: Zscaler     Published Date: Jun 25, 2019
Una soluzione per un ambiente IT in costante evoluzione Dato questo spostamento verso cloud e mobilità, il tradizionale perimetro di sicurezza che una volta proteggeva utenti e servizi interni alla rete aziendale è ormai in gran parte scomparso. È arrivato il momento per la sicurezza di evolvere, posizionando le protezioni più vicine all’utente e ponendo una nuova enfasi su elementi quali praticità, flessibilità e affidabilità. Scopri di più sulla soluzione SDP di Zscaler in questo libro bianco.
Tags : 
    
Zscaler
Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
In our 27-criterion evaluation of global internetof-things (IoT) services for connected business operations providers, we identified the 14 most significant ones — Accenture, Atos, Capgemini, Cognizant, Deloitte, Dimension Data, EY, HCL Technologies, IBM, Infosys, KPMG, PwC, Tata Consultancy Services (TCS), and Wipro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice.
Tags : 
    
Group M_IBM Q3'19
Published By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore
Published By: Commscope     Published Date: Jun 25, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up.
Tags : 
    
Commscope
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: Commscope     Published Date: Jun 24, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up. >
Tags : 
    
Commscope
Published By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
An online threat prevention strategy should be more than a collection of security tools. It needs to be an integrated and intelligent approach. A complete threat prevention solution not only enhances the performance of prevention tools, but it also increases the efficiency of operations teams by enabling them to quickly deploy patches and implement new technology without impacting network performance or relying on maintenance windows. Read this solution brief in local language to learn how you can gain 50% in team productivity.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
    
Gigamon
Published By: Darktrace     Published Date: Jun 21, 2019
As a prominent US credit union, TruWest was faced with a number of challenges when securing its network and critical digital assets against cyber attackers. With the threat landscape evolving rapidly, and the cost of breaches rising, TruWest security chief, Chris Sprague, discusses how Darktrace gave his team a new way of approaching cyber security.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
The City of Las Vegas serves as the legislative body that governs Las Vegas, Nevada. While their network covers 3,000 users, the City of Las Vegas oversees private and sensitive data of both the 600,000 residents and over 42 million tourists per year. With Darktrace's unique ‘immune system’ approach, City of Las Vegas has increased its confidence that sensitive information is protected and secure.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
Published By: Zscaler     Published Date: Jun 20, 2019
Découvrez grâce à ce guide comment rediriger de manière optimale le trafic de vos filiales, pour permettre un accès direct à Internet et à vos applications cloud. Baissez vos coûts, obtenez une visibilité complète sur vos flux et améliorer l’expérience de vos utilisateurs en sécurisant vos bureaux distants.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Découvrez notre rapport semestriel Cloud Security Insights Threat Report 2019 - une étude des menaces basées sur les protocoles SSL/TLS, qui examine le trafic chiffré sur le cloud Zscaler™ entre juillet et décembre 2018. Le rapport, compilé par notre équipe de recherche du ThreatLabZ, se penche sur une variété d’attaques exécutées via SSL et bloquées par Zscaler, parmi lesquelles les attaques de phishing, les botnets, l’exploitation du navigateur et le contenu malveillant.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Le concept de backhauling vers un data center centralisé semble judicieux lorsque les applications et les utilisateurs y résident. Mais avec des collaborateurs dans vos différents bureaux et des applications qui migrent vers le cloud, rediriger le trafic sur un réseau en étoile offre une expérience utilisateur médiocre, qui plus est onéreuse et vecteur de davantage de risques. Le réseau SD-WAN est une réponse à ce défi. Il facilite la mise en place de points d’accès locaux à Internet. Zscaler les sécurisent. Découvrez comment grâce à ce livre blanc.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Descubren gracias a este guía como redirigir de manera óptima el tráfico de sus subsidiarias, para permitir un acceso directo a Internet y a sus aplicaciones cloud. Disminuyan sus costes, obtengan una visión completa sobre sus flujos y mejoren la experiencia de sus usuarios tras securizar sus oficinas remotas.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Descubren nuestro informe semestral Cloud Security Insights Threat Report 2019 – un estudio de las amenazas basadas sobre los protocolos SSL/TLS, que analiza el trafico encriptado sobre el cloud Zscaler™ entre julio y diciembre de 2018. El informe, recopilado por nuestro equipo de desarrollo del ThreatLabZ, se interesa a la variedad de ataques ejecutados vía SSL y bloqueados por Zscaler, entre las cuales los ataques de phishing, los botnets, la explotación del navegador y el contenido malicioso.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
El concepto de backhauling hacia un centro de datos parece interesante cuando aplicaciones como usuarios residen dentro. Pero con colaboradores en sus diferentes oficinas y aplicaciones que migran hacia el cloud, redirigir el tráfico sobre una red en estrella ofrece una mala experiencia usuario, además de ser caro y de introducir mas riesgos. La red SD-WAN representa una solución a este reto, porque permite poner en marcha conexiones locales a Internet. Y Zscaler se encargar de securizarlas. Descubren como con este libro blanco.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Una solución para un entorno de TI cambiante Debido al auge de la nube y de la movilidad, el perímetro de seguridad tradicional que antes protegía a los usuarios y los servicios internos dentro de la red corporativa, en gran medida ya no existe. Ha llegado el momento de que la seguridad evolucione, trasladando las protecciones más cerca del usuario y poniendo un nuevo énfasis en la comodidad, flexibilidad y fiabilidad. Descubren más sobre la solución SDP de Zscaler en este libro blanco.
Tags : 
    
Zscaler
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.