abs

Results 251 - 275 of 514Sort Results By: Published Date | Title | Company Name
By: Apple Corporation     Published Date: Nov 15, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free
Tags : ipad, apple, business solutions, seminar, apps, ipad apps, it security, security, security solutions, it infrastructure, mobile workforce
     Apple Corporation
By: Apple Corporation     Published Date: Nov 14, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free.
Tags : ipad, apple, mobile, deployment, mission-critical apps
     Apple Corporation
By: Group M_IBM Q3'19     Published Date: Aug 26, 2019
Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives. Read this report to gain a better understanding of: ? Who is most accountable to external parties following a data breach ? The importance for business executives to have visibility into data security metrics ? How to overcome challenges to equip business executives with data security information ? When executive level security tools can improve business executives ability to proactively manage data risk
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Aug 26, 2019
Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives. Read this report to gain a better understanding of: ? Who is most accountable to external parties following a data breach ? The importance for business executives to have visibility into data security metrics ? How to overcome challenges to equip business executives with data security information ? When executive level security tools can improve business executives ability to proactively manage data risk
Tags : 
     Group M_IBM Q3'19
By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : threats, applications, cybercriminals
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
     F5 Networks Inc
By: 3D Systems     Published Date: Mar 07, 2019
Qualität und Zuverlässigkeit sind wichtiger denn je. Angesichts der allgegenwärtigen Konkurrenzsituation können es sich Unternehmen nicht leisten, bei der Qualität ihrer Produkte Abstriche zu machen. Und das Management darf nicht zögern, stets die neuesten Werkzeuge und Technologien einzusetzen, um jederzeit höchste Qualität sicherzustellen. Das vorliegende E-Book hilft Ihnen dabei, festzustellen, ob 3D-Scannen für Ihre Prüfanforderungen geeignet ist. Außerdem erfahren Sie, wie Sie die Technologie in Ihrem Unternehmen optimal einsetzen können.
Tags : 
     3D Systems
By: Absolute Software     Published Date: Dec 20, 2012
In the last four years, the number of Mac computers at Under Armour has quadrupled.
Tags : apple, asset management, end users, security
     Absolute Software
By: Absolute Software     Published Date: Nov 21, 2011
Learn about best practices in the management and security of IT assets and the sensitive information they contain.
Tags : security, strategy, healthcare, absolute, it assets, sensitive information, phi, ehr, asset security strategy, patients, employees, best practices, reportable incidents
     Absolute Software
By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
     LogLogic
By: OneNeck IT Services     Published Date: Aug 24, 2007
In 2004, J.W. Childs had the opportunity to acquire the Sunny Delight Beverage Co. (SDBC) through a unique carve-out of brands by Procter & Gamble. An accurate and in-depth assessment of the infrastructure required to support SunnyD’s business going forward would be absolutely essential to Childs’ decision to purchase the company.
Tags : oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, jw childs, j.w. childs, sunny d, sunny delight, acquisition, buyout, enterprise resource planning, outsourcing, governance, outsource, it management
     OneNeck IT Services
By: Symantec.cloud     Published Date: Apr 27, 2010
Create a step-by-step approach to IT security that will work for your business.
Tags : messagelabs hosted symantec, it security, smb, malware
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : messagelabs us, it security, smb, risk management, protection, malware, anti-spam, anti-virus, back-ups, firewalls, user authentication
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability, encryption
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the third part of a three-part white paper series. Part 3 describes how to move on from the basic controls and how each organization should decide which, of all the extra security controls available, are right to be brought in next.
Tags : messagelabs us, it security, smb, activity logging, vulnerability check
     Symantec.cloud
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest whitepaper & create a step-by-step approach to IT security that will work for your business.
Tags : messagelabs symantec, it security, malware, security management
     MessageLabs Ltd.
By: Lenovo UK     Published Date: Sep 10, 2019
Weet je wanneer je het meeste risico loopt? In de race om je concurrenten voor te blijven bij de digitale bedrijfstransformatie doemen nieuwe gevaren op. Met ThinkShield van Lenovo beschik je over een totaaloplossing die je geheel kunt aanpassen aan de beveiligingsvereisten van jouw bedrijf. Het herstellen van een ransomware-aanval1 duurt gemiddeld 23 dagen. Lees hier waarom IT-beveiliging absolute topprioriteit heeft. Download onze oplossingengids > 1 IBM: 2017 Global CODB Report Final (
Tags : 
     Lenovo UK
By: Adobe     Published Date: Oct 05, 2016
They’ve broken free from the customer relationship management (CRM) and clickstream-tracking systems you’ve used to keep tabs on them.
Tags : crm, customer experience, client experience
     Adobe
By: Dell EMC     Published Date: Feb 23, 2017
During the course of research efforts in the all-flash array (AFA) space, IDC is still encountering IT executives, particularly CIOs and CFOs, who have an outdated perspective on relevant cost metrics for comparing all-flash solutions with legacy hard disk drive (HDD)–based systems. In IDC's view, flash is an absolute requirement for performance reasons in any 3rd Platform computing environment. While most understand the need for flash performance, there is still a subset that does not view the broader use of flash in the enterprise as cost effective
Tags : 
     Dell EMC
By: Absolute Software     Published Date: Feb 14, 2012
Kansas City, Kansas Public Schools looked to establish a 1:1 computing program that would provide 6,000 Apple computers to its students and teachers. Find out more in this case study!
Tags : kansas, kansas city, education, public schools, computrace, 1:1, education, absolute
     Absolute Software
By: Acronis EMEA     Published Date: May 18, 2015
Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.
Tags : backup, data protection, database backup application solution, data security, unified data, recovery, backup data
     Acronis EMEA
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
     Ounce Labs, an IBM Company
By: BMC Control M     Published Date: Jul 16, 2009
Workload Automation (WLA) ist eine moderne Entwicklungsstufe des Job-Scheduling und dient zum Automatisieren von komplexen Verarbeitungsabläufen in der IT. Es unterstützt ereignisgesteuerte Workloads, unterschiedliche Plattformen, Webservices, komponentenbasierte Anwendungen (Composite Applications), SOAs, virtuelle Systeme, System- und Anwendungsintegration, Business Alignment (Abstimmung mit den Geschäftsprozessen) und vieles mehr.
Tags : workload, automation, smart, bmc, wla, ema, itil, soa, bmc conrol-m
     BMC Control M
By: BMC Control M     Published Date: Jul 22, 2009
Workload Automation (WLA) ist eine moderne Entwicklungsstufe des Job-Scheduling und dient zum Automatisieren von komplexen Verarbeitungsabläufen in der IT. Es unterstützt ereignisgesteuerte Workloads, unterschiedliche Plattformen, Webservices, komponentenbasierte Anwendungen (Composite Applications), SOAs, virtuelle Systeme, System- und Anwendungsintegration, Business Alignment (Abstimmung mit den Geschäftsprozessen) und vieles mehr.
Tags : workload, automation, smart, bmc, wla, ema, itil, soa, bmc conrol-m
     BMC Control M
By: Siteimprove     Published Date: Sep 03, 2019
Sind Sie bereit, zu erfahren, wie Siteimprove Ihnen helfen kann, Ihre grobten Website-Herausforderungen zu priorisieren und zu bewältigen? Bei einer kurzen kostenlosen Analyse wird Ihnen ein Mitglied des Siteimprove-Teams helfen, Probleme auf Ihrer Website zu identifizieren und Möglichkeiten zum Steigern des Traffics zu finden. Auch werden mit Ihnen die Preisoptionen durchgesprochen. Sie erhalten darüber hinaus einen kurzen Einblick in Ihren DCI™ Score, um zu sehen, wie Ihre Website im Vergleich zu anderen in Ihrer Branche abschneidet. Ganz gleich, was herauskommt – Sie werden ein paar mehr Informationen über die Performance Ihrer Website erhalten. Füllen Sie einfach das Formular aus!
Tags : 
     Siteimprove
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com