dam

Results 351 - 375 of 842Sort Results By: Published Date | Title | Company Name
By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security
     Splunk
By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, next gen firewall, security, it management
     McAfee
By: McAfee     Published Date: Nov 07, 2014
Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).
Tags : siem, big security data, segurança do big data, informações de segurança, ameaças avançadas, ameaças persistentes avançadas, apt, inteligência de segurança, segurança, security
     McAfee
By: dynatrace     Published Date: Feb 01, 2013
Studies have shown that poor performance of e-commerce web sites can directly result in loss of revenue, poor customer satisfaction and damaged reputation. This white paper provides an overview to application performance management for e-commerce.
Tags : 
     dynatrace
By: Frontrange     Published Date: Mar 13, 2013
Recent new technology introductions are fundamentally changing the way we utilize and manage IT resources. This whitepaper shows how these new processes and automation solutions deliver the agility and extensibility to maintain performance and relia
Tags : it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
     Frontrange
By: Emulex Corporation     Published Date: Nov 07, 2013
Organizations don’t know what’s going on inside their networks, and that’s costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target. The impact of network performance problems on worker productivity has become a serious business risk. To mitigate it, organizations need to strategically embrace a network recording infrastructure that provides them with accurate, network-wide visibility. Only accurate visibility will empower them to slash maximum and mean response and repair times and keep network-reliant business applications and processes running. Download this Whitepaper for more information.
Tags : network monitoring, network visibility, technology, endace, best practices, networking
     Emulex Corporation
By: Palo Alto Networks     Published Date: Dec 11, 2013
Oferecido por um Tempo Limitado. Obtenha Sua Cópia Hoje. Tome uma decisão informada sobre o firewall correto para sua empresa com O Guia do Comprador para Firewall. Esse guia oferece: - Os fundamentos da tecnologia de firewall moderno - Os dez requisitos críticos de negócios que seu próximo firewall precisa atender - Informações sobre como criar uma solicitação para proposta (SPP) de vendedor - Um plano de teste funcional para auxiliar no processo de seleção de firewall
Tags : firewalls, tecnologia, palo alto
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Dec 11, 2013
Ofrecida durante un tiempo limitado. Consiga su copia hoy.Tome la decisión correcta sobre qué firewall es necesario para su negocio con La Guía para compradores de firewalls. Esta guía le da: - Los fundamentos de la tecnología moderna del firewall - Los 10 requisitos de negocios críticos que su nuevo firewall debería tener en cuenta - Información sobre cómo crear un (RFP) - Un plan de pruebas funcional para ayudar en su proceso de selección de firewall
Tags : firewall, palo alto, tecnologia
     Palo Alto Networks
By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management
     FireEye
By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
     FireEye
By: Infomatica     Published Date: May 19, 2015
In this eBook, best-selling author Brian Underdahl explores the fundamentals of data integration and how the latest tools can simplify today’s (and tomorrow’s) data landscape. “Data Integration for Dummies” provides valuable reference if you need to explain data integration to the business, are looking for an alternative to hand-coding data mappings, or simply interested in expanding your knowledge.
Tags : data integration, it infrastructure, data sources, data landscape, data mappings, it management
     Infomatica
By: Adobe     Published Date: Nov 02, 2018
Digital asset management is the foundation for orchestrating unique customer experiences across channels. It’s time to rethink the strategic value for marketing.
Tags : 
     Adobe
By: AlienVault     Published Date: Aug 14, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
     AlienVault
By: Epicor     Published Date: Jun 06, 2018
Accounts Payable is a fundamental activity for nearly all businesses. Pick any enterprise and you can bet there is an AP function at the heart of financial operations. The obligation to pay off short-term debt is one that every company must satisfy. But more than that, the process to do it must be efficient and productive. If you get behind on your obligations you risk missing important financial discounts, defaulting with creditors, and damaging your reputation with suppliers and stakeholders. CFOs face the challenges associated with Accounts Payable…and it’s easy to lose sleep. As other areas of business and commerce have become more and more paperless, the accounts payable process in most organizations remains mired in paper copies and manual workflow. The result is an often costly and people-intensive process that leaves companies vulnerable to competitors and financial executives with a growing unease over the inherent inefficiencies.
Tags : 
     Epicor
By: ForgeRock     Published Date: Mar 10, 2015
L'identité est une composante essentielle de la croissance numérique. Les entreprises et les organisations ne peuvent tirer pleinement parti des technologies mobiles, du cloud ou de l'Internet des objets (IdO, ou IoT en anglais) sans une stratégie d'identités évolutive et reproductible. Sans une telle stratégie, elles ne disposent d'aucun moyen d'identifier leurs clients et d'interagir avec eux de quelque manière que ce soit, par le biais d'un ordinateur portable, d'un mobile, d'une tablette, d'une voiture connectée, d'un objet connecté à porter (« wearable »), d'un appareil domotique ou de la toute dernière innovation en termes de connectivité. Ce guide a été conçu pour vous aider à comprendre les éléments fondamentaux de l'identité client et la manière dont elle peut vous aider à communiquer avec vos clients.
Tags : software development
     ForgeRock
By: CA Technologies     Published Date: Feb 13, 2015
Over the past 15 years, we’ve seen generations of service management platforms come and go—but many critical limitations persist. Consequently, IT organizations, and the businesses they serve, suffer from a lack of agility, poor service levels and high costs. This paper offers a look at the obstacles of prior generations of service management platforms, and it reveals how a new generation of solutions addresses some of these fundamental limitations.
Tags : service desk, management platforms, it organizations, limitations, solutions addresses, poor service levels
     CA Technologies
By: CA Technologies     Published Date: Feb 13, 2015
The need to speed innovation is a fundamental business reality today—but so is the need to contend with finite budgets and resources. Project and portfolio management (PPM) delivers the key capabilities organizations need to straddle these competing demands, but for many businesses, the time and money required to implement on-premises PPM platforms has kept these initiatives on the back burner. With CA Project & Portfolio Management SaaS (CA PPM SaaS) your organization can leverage a comprehensive, SaaS-based PPM solution. As a result, you can harness the capabilities you need to innovate more quickly and optimize your resource investments—without having to incur the time and effort of deploying and maintaining a PPM platform on premises.
Tags : portfolio management, saas, project management, ppm, optimization, resource investments, ppm platform, saas
     CA Technologies
By: STANLEY Healthcare     Published Date: Mar 24, 2015
Patient falls were the largest category of adverse events reported at Barnes- Jewish Hospital. Progress in meeting targets for reducing falls and fall injury rates had been static despite multiple efforts. One component of the hospital’s Fall Reduction Program was a portable bed exit alarm system—a Bed-Check Classic-Check® control unit (CU) with Sensormat® pressure sensitive mat— widely used throughout the hospital. Due to high demand by staff, the CU was often not available, resulting in delayed care delivery and staff dissatisfaction. Loss or damage due to handoff between staff and the central service department resulted in additional resources and costs. Read this case study to learn how Barnes-Jewish Hospital implemented Bed-Check® Fall Management Solution as a part of their Fall Reduction Program, resulting in decreased fall injury rates and improved staff satisfaction.
Tags : patient falls, fall reduction, fall injury, healthcare, hospital
     STANLEY Healthcare
By: Cherwell Software     Published Date: Jun 21, 2018
Digital innovation has fundamentally changed how the world operates. As modern technology permeates every area of our lives, our expectations around the availability of information and the speed with which we can obtain it are higher than ever before. This applies to how we shop, as well as how we make business and major life decisions.
Tags : service, management, technology
     Cherwell Software
By: BMC Software     Published Date: Jul 22, 2015
Integrieren Sie Ihrer Big Data Initiativen in Ihre Unternehmensweiten Geschäftsprozesse. Gerne machen wir Sie damit vertraut, wie sie mit Control-M für Hadoop die Anwendungsentwicklung beschleunigen und die Unternehmensintegration vereinfachen können. Besprochene Themen schließen folgende Punkte ein: * Wie können Sie mit einem Enterprise Scheduler für Hadoop, weitere Automationsinseln vermeiden. * Wie kann sichergestellt werden, dass Sie aus ihren Big Data Initiativen den gewünschten Mehrwert erhalten. * Wie können Sie mit Ihren Big Data initiativen sich den administrativen Herausforderungen & Bedürfnissen stellen und mögliche Konfrontationen erfolgreich meistern.
Tags : 
     BMC Software
By: Mitel     Published Date: May 18, 2017
The ways teams collaborate has fundamentally changed in the last few years. There are seemingly endless tools, apps and software that claim to transform the collaboration experience. Some do more to make good on that promise than others—and you can’t forget to account for the context for how they fit into your organization’s overall IT mix and processes. Given all this change, here are a few important things to know about team collaboration and the tools associated with it to help you get the most of collaboration for your company.
Tags : byod, cloud-based, applications, collaboration software
     Mitel
By: OpenText     Published Date: Sep 27, 2017
The world we work in today has fundamentally changed towards a digital world. The digital highways that service businesses are creating greater and great amounts of data. In fact, manufacturing generates more data than any other sector of the economy.
Tags : frontier, manufacturing, opentext, economy
     OpenText
By: Genesys     Published Date: Jun 13, 2018
Routing is a fundamental component of your customer experience strategy. True omnichannel routing breaks down channel silos and gathers intelligence upfront through context and data to deliver the personalized, seamless engagement your customers now expect. Learn how you can move beyond single interactions with true omnichannel routing: • Dynamically match customers from any touchpoint, over any channel, to the agent with the optimal insights, skill set and proficiency • Enable seamless transitions between digital self-service and live employee contact • Replace single, random interactions with thoughtfully designed and optimized customer journeys
Tags : routing, customer experience, transitions, self-service
     Genesys
By: Genesys     Published Date: Feb 12, 2019
Abbiamo chiesto a una serie di analisti e figure di riferimento del settore di indicarci quali saranno secondo loro le tendenze chiave relative all’engagement del cliente a partire dal 2017. Da tecnologie all’avanguardia come l’IoT e i Bot fino a nuove interpretazioni di idee del passato, i temi caldi indicati hanno fatto emergere cinque trend fondamentali destinati a ridefinire il futuro della Customer Experience. In questo ebook, scoprirai: I cinque trend che avranno il maggiore impatto sulla Customer Experience Come usare il machine learning per identificare tendenze e modelli utili a offrire un’eccezionale Customer Experience di nuova generazione Come avere un contact center all’avanguardia e adattarlo alle esigenze in rapida evoluzione dei clienti
Tags : 
     Genesys
By: Genesys     Published Date: Feb 12, 2019
I tuoi clienti sono ultra connessi. Fai in modo di esserlo anche tu. Trovare nuovi clienti e mantenere relazioni con quelli esistenti è un’attività impegnativa che porta via tempo. Quando i tuoi clienti sono pronti a interagire, li incontri proprio lì dove si trovano? In un mondo dai contorni sempre più digitali è fondamentale per tutte le aziende essere in grado di comunicare quando e dovunque il cliente desideri, che si tratti di una chiamata telefonica, SMS, chat online o social media. Scarica subito questo eBook per scoprire: Come coinvolgere e interagire con i tuoi clienti in un mondo ultra-connesso Come rendere semplici ed efficienti le tue attività di engagement del cliente Perché è arrivato il momento di adottare una soluzione di cloud contact center all-in-one
Tags : 
     Genesys
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com