abs

Results 326 - 350 of 504Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise forenterprise IT. Within the SDDC, the benefits of server virtualization areextended to storage and networking, so the entire infrastructure can beabstracted and centrally managed under a unified platform. IT teams areable to leverage unprecedented levels of virtualization, orchestration, andautomation to achieve the services-based delivery model that enables truedigital transformation.
Tags : data center, networking
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise for enterprise IT. Within the SDDC, the benefits of server virtualization are extended to storage and networking, so the entire infrastructure can be abstracted and centrally managed under a unified platform. IT teams are able to leverage unprecedented levels of virtualization, orchestration, and automation to achieve the services-based delivery model that enables true digital transformation.
Tags : data center, networking
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics from diagnostic and descriptive to prescriptive and proactive, leading to faster and more accurate detection.
Tags : machine learning, advanced analytics, advanced threats, sandbox, zero-day, malware, mcafee labs, dynamic endpoint
     McAfee
By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
     HP
By: Sponsored by HP and Intel®     Published Date: Nov 05, 2012
Evaluator Group worked with HP to assess the features, performance and enterprise capabilities of the HP StoreOnce B6200 Backup system. HP labs and equipment were utilized with testing under the direction of on-site evaluator group personnel.
Tags : hp storeonce, application integration, testing, b6200, data management, data center
     Sponsored by HP and Intel®
By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Dec 17, 2008
All businesses face a daily bombardment of email spam that consumes valuable IT staff time as well as end-user productivity. In addition, email is an attack vector for many types of security threats to businesses, including phishing, viruses, spyware, and malicious URLs. Given that all businesses are experiencing the financial pressures of a tightening world economy, coupled with the uncertainty of any near-term recovery, small and medium-sized business (SMB) managers are searching for ways to cut costs while continuing to maintain a consistent level of service and protection for their businesses.
Tags : saas, trend, trend micro, software as a service, smb, spyware, hacker, trendlabs
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Mar 17, 2009
West Coast Labs performed an anti-spam comparative test on various email solutions related to spam detection rate over a series of at least 100,000 emails per solution.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service
     Trend Micro SaaS
By: BlackBerry Cylance     Published Date: Sep 13, 2017
NSS Labs Names Cylance a "Recommended" Leader in 2017 Advanced Endpoint Testing. See how 14 anti-malware products performed in NSS Labs tests.
Tags : 
     BlackBerry Cylance
By: Puppet Labs     Published Date: Apr 05, 2011
This whitepaper articulates why Puppet is a superior choice compared to today's most common alternatives for server management.
Tags : puppetlabs, puppet labs, server management, virtualization, compliance, security, data center automation
     Puppet Labs
By: Puppet Labs     Published Date: Apr 05, 2011
This paper explores the move away from Web Operations 1.0 - mired in legacy tools, outdated approaches, and low expectations - and into Web Operations 2.0 where tools and procedures are built from the ground up for highly efficient, reliable, and agile operations.
Tags : puppetlabs, puppet labs, web ops 2.0, automated provisioning, legacy tool, virtualization, cloud computing
     Puppet Labs
By: Trend Micro Inc.     Published Date: Sep 21, 2011
Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.
Tags : trendlabs, trend micro, data storage, small business, technology, security solution
     Trend Micro Inc.
By: Epicor     Published Date: Jul 01, 2014
HR professionals face an absolute requirement for change: creating a compelling business case for HRIS implementations and upgrades
Tags : epicor, hris, human resources, hr executives, saas, software as a service
     Epicor
By: IBM     Published Date: Jan 06, 2016
Working for the government is no longer an absolute guarantee of stability and a pension.
Tags : workforce, government, talent, ibm, stability
     IBM
By: LifeLock     Published Date: Feb 24, 2017
ID Theft impacts presenteeism, absenteeism, and productivity. Improve employee retention and engagement and help drive greater employee value through a high-touch benefit.
Tags : 
     LifeLock
By: BlackBerry Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : endpoint protection, cylance, security
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : predictive, advantage, cylance, protect, cloud, connect
     BlackBerry Cylance
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com