abs

Results 476 - 500 of 523Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : data, big data, security, corporate network, mobility
     Absolute Software
By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor
     McAfee
By: Symantec.cloud     Published Date: Apr 27, 2010
We surveyed 273 managers in IT & our research reveals the Top 10 Web Security Threats; And How to Solve Them.
Tags : messagelabs symantec, web security threat, malware, bandwidth
     Symantec.cloud
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.
Tags : messagelabs symantec, web threat, security safeguard, malware, web security services
     MessageLabs Ltd.
By: Juniper Networks     Published Date: Oct 20, 2015
As with sports cars, performance is a top buying criteria for firewalls. Because if you can’t keep up with the traffic—real traffic, not traffic in the labs—your apps will be unhappy, and your users even more so.
Tags : juniper, firewall, traffic, networking, security
     Juniper Networks
By: Absolute Software     Published Date: May 31, 2016
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. IT organizations and end users have been looking forward to a wide range of new features in Windows 10, with interest particularly high as users of Windows 7 and 8 can upgrade for free.
Tags : data, security, mobility, mobile computing, best practices
     Absolute Software
By: Symantec.cloud     Published Date: Aug 10, 2010
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department.
Tags : messagelabs, security safeguard, symantec hosted services, web threat, malware, employee monitoring, productivity
     Symantec.cloud
By: Workforce Software     Published Date: Nov 17, 2011
During the past several years, challenges such as increased regulatory pressures, employee fatigue and the ever-present need to reduce costs have all weighed heavily on most human resource organizations. As a result, HR and payroll professionals are playing an increasingly strategic role in the day-to-day operation of the business.
Tags : workforce management software, labor laws, california labor laws, change management, labor law compliance, time and attendance, time and attendance software, labor scheduling
     Workforce Software
By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: Trend Micro Inc.     Published Date: Jun 06, 2012
Includes "Top 5 Reasons Why Companies Allow Employees to Use Personal Devices for Work," and "3 Steps Toward Consumerization"
Tags : trendmicro, trend micro, trend, threat, security, security challenges, mobility, spectrum
     Trend Micro Inc.
By: Absorb     Published Date: May 10, 2018
In a business environment where being able to build and maintain a solid brand reputation and lasting relationships with your customers is essential for ongoing success, effective compliance training for team members is critical. Assembling quality course content, either through purchasing off-the-shelf compliance courseware or developing training material in-house or in partnership with an external developer, and delivering that material in a consistent manner, can help protect your organization and minimize the damage from compliance transgressions.
Tags : elearning, training, business, brand, reputation, relationship, building
     Absorb
By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: MobileIron     Published Date: Nov 16, 2017
Der Wechsel zu modernen, mobilen Cloud-Technologien zwingt Unternehmen, ihr Endgeräte-Sicherheitskonzept komplett zu überdenken. Eine Absicherung mit Benutzerdaten reicht beispielsweise aus, um den Zugriff in einer von der IT kontrollierten Desktop-Umgebung abzusichern. Dies gilt jedoch nicht für die mobile Cloud. Identitätsabhängige Sicherheitsmaßnahmen, die lediglich Benutzernamen und Passwörter abfragen, komplizieren das Benutzererlebnis mit Mobilgeräten und fördern unsichere Sicherheitspraktiken, welche die Unternehmensdaten gefährden
Tags : 
     MobileIron
By: LogMeIn EMEA     Published Date: Nov 01, 2019
The IT landscape has evolved drastically over the last few years, and one of the biggest challenges is staying ahead of ever-changing security threats. IT teams are constantly being asked to do more with less, so implementing solutions that embrace automation, enhance security and provide a single pane of glass view are absolute necessities. Remote Monitoring and Management (RMM), defined as the process of supervising and controlling IT systems (laptops, desktops, servers), enable automation, security, and control, and have thus become a crucial component in every IT professional’s toolkit.
Tags : 
     LogMeIn EMEA
By: AlienVault     Published Date: Oct 05, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
     AlienVault
By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
     AlienVault
By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
     AlienVault
By: HERE Technologies     Published Date: Aug 12, 2019
More sophisticated cameras and vehicle sensors are enabling new ADAS features and the deployment of highly autonomous vehicles. However, reactive decisions and camera-based systems struggle when lane markings fade, snow or dirt covers the road, and the environment changes. Map-based Lane Keeping with HERE HD Live Map from VSI Labs examines how HD map assets can improve the safety and performance of automated vehicle features. Download this free report to learn: • How map data improves the performance and safety of ADAS features • How map-based systems outperform computer vision only system • The architecture of VSI’s map-based lane keeping system
Tags : 
     HERE Technologies
By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: Absolute Software     Published Date: Feb 10, 2012
The story of val Verde will help schools innovate better, streamline purchasing, increase cost-efficiencies, and ultimately, provide staff and students with a fleet of optimally running devices.
Tags : 
     Absolute Software
By: Infor     Published Date: Mar 07, 2017
Bei der Verwaltung der Lagerbestände – also dem Ausgleich zwischen dem in Inventar gebundenen Kapital und dem Kundenservicegrad – geht es nicht um die Suche nach einem Idealzustand. Vielmehr gilt es zu erkennen, dass eine erfolgreiche Bestandsverwaltung die Abstimmung von Angebots- und Nachfragedaten in der globalen Lieferkette voraussetzt.
Tags : 
     Infor
By: Symantec     Published Date: May 02, 2014
Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.
Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
     Symantec
By: HP - Enterprise     Published Date: Oct 23, 2008
Fortify's report summarizes electronic as well as traditional methods of voting including absentee ballots.  This voting guide will provide recommendations for voters who want to make sure their vote counts and for federal and state governments on how to devise efficient and accurate voting processes and systems.
Tags : fortify, application security, security risks, voting, fortify, fortify software, election process, local government
     HP - Enterprise
By: Tely     Published Date: Apr 07, 2016
In this report, Ira M. Weinstein and Saar Litman are explaining features and benefits of the Tely solution.
Tags : telyhd 200, video conference cloud, tely labs telyhd, vidyo pricing, equipment for video conferencing, tely 200, video conferencing hd, 11 telyhd 01 01
     Tely
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
“Does Cisco Umbrella block ransomware?” This is one of the most common questions that we hear from customers. In reality, the answer for any security provider — including Cisco — is seldom an absolute “yes” or “no.” It really depends on how each variant arrives onto your systems, as well as its order of operations for encrypting data for ransom. However, with Cisco you can significantly reduce the number of ransomware infections across your organization.
Tags : 
     Cisco Umbrella EMEA
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com