dam

Results 601 - 625 of 878Sort Results By: Published Date | Title | Company Name
By: CrowdStrike     Published Date: Nov 28, 2018
Damaging widespread attacks such as WannaCry provide grim reminders of how prevalent Ransomware attacks have become. Adversaries are not only launching Ransomware attacks against a wide range of industries, they are consistently evolving their tools, tactics and procedures (TTPs) to foil your organization’s best cybersecurity strategies. A white paper, “Ransomware, a Growing Enterprise Threat,” offers in-depth analysis of Ransomware and explains why organizations can’t afford to ignore this increasingly challenging cyber threat. Download this white paper to learn • The evolution of Ransomware and why businesses are being targeted more frequently • How perpetrators tactics and targets are evolving to maximize profits • Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Guidance for taking any organization to the highest level of endpoint protection regardless of internal resources Organizations today have a wealth of security tools available to them but many struggle to take full advantage of the technology they have. Too often, this results in a damaging breach that could have been avoided if their solutions had been configured and updated properly or if detections had been noticed and acted on. How well your organization is doing at fully implementing its security solutions, particularly endpoint protection technology, is a reflection of your cybersecurity maturity. This white paper, “CrowdStrike Falcon Complete: How to Achieve Instant Cybersecurity Maturity for Organizations of all Sizes,” explores the challenges organizations face in getting the most out of a security solution. It also offers insights on how CrowdStrike Falcon Complete can raise you to the highest level of endpoint protection with speed and efficiency, regardless of your size an
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
     CrowdStrike
By: Epson     Published Date: Jun 22, 2018
Despite the digitization of business today, most organizations continue to rely on paper hard copies to get the job done. A great deal of printed information drives the fundamental workflow and success of nearly any business, especially in highimpact, high-touch areas like Marketing and Sales; Planning, Engineering and Design; and Human Resources. As a result, companies continue to look for ways to manage the ongoing cost, workflow and efficiency of using printed documents.
Tags : 
     Epson
By: Commscope     Published Date: Jun 25, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up.
Tags : 
     Commscope
By: Symantec.cloud     Published Date: Oct 11, 2012
The emergence of mobile applications has fundamentally changed the way that millions of people around the world work, play, and communicate. Meanwhile, cybercriminals want to infect and exploit as many mobile devices as they can to steal information.
Tags : symantec, phishing, malware, security, internet security, mobile security, mobile
     Symantec.cloud
By: Internap     Published Date: Dec 29, 2011
Performance plays a vital role in the success of your online applications and web-based content - whether you are processing millions of transactions, delivering business-critical software or servicing a massive gaming community. Research shows that even one second of delay on a typical website can result in 7% fewer customer conversions. For many businesses, that means lost revenue and damage to their brand. As cloud is becoming an increasingly viable infrastructure choice for enterprise applications, it is essential to select a high-performance cloud service that will support the best possible experience for your end users. Determining the right cloud solution for your needs also necessitates thorough analysis of the level of security, control, customization and support your business requires. In this webcast, thought leaders from Gartner and Internap outline the performance factors that affect your cloud decision-making process and discuss how to optimize your IT Infrastructure to create satisfied end users.
Tags : enterprise cloud, cloud computing, technology, cloud solution
     Internap
By: VMware AirWatch     Published Date: Nov 12, 2015
Con tecnología de VMware® Hoy, a pesar de la adopción masiva de plataformas móviles, teléfonos móviles y tabletas, los escritorios y aplicaciones de Windows son fundamentales para las empresas. Sin embargo, las arquitecturas de escritorio no han evolucionado con los años como lo hicieron las arquitecturas móviles. Ha llegado la hora de transformar los escritorios.
Tags : byod, emm, mobility, airwatch, enterprise applications, platforms
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
Una de las preguntas más frecuentes de los clientes es ¿cuánto soporte le provee AirWatch a Office 365? Muchos preguntan si AirWatch controla el acceso a Office 365 (O365) en los dispositivos móviles de la misma forma que lo controla en los sistemas de escritorio corporativos. Afortunadamente, AirWatch® by VMware® proporciona todo el soporte que las organizaciones necesitan para aprovechar O365 en los dispositivos móviles, y nuestra reciente integración con VMware® Identity Manager provee el primer marco de control de acceso adaptable en la industria para asegurar que todas las aplicaciones del trabajo, incluyendo O365, estén accesibles solamente en los dispositivos administrados y conformes.
Tags : airwatch, emm, office365, cloud, software development, it management, platforms, data management
     VMware AirWatch
By: Cornerstone OnDemand     Published Date: May 15, 2015
Leveraging econometric analysis of a dataset of approximately 63,000 hired employees spanning approximately 250,000 observations, this report looks not only at the measurable costs of toxic behavior such as sexual harassment, theft and fraud, but also other, equally damaging and harder-to-measure costs. The report examines these indirect costs closely, looking particularly at the toll toxic employees take on co-workers, and concludes that these costs create an even larger financial burden on businesses than the direct impact of an employee’s misbehavior
Tags : hidden costs, sexual harassment, toxic employees, employee behavior
     Cornerstone OnDemand
By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
     Centrify Corporation
By: Centrify Corporation     Published Date: May 03, 2018
"Watch the On-Demand webinar to hear Centrify's Chief Product Officer, Bill Mann and Forrester Principal Analyst, Chase Cunningham in a lively discussion how Zero Trust concepts can be applied to Identity and Access Management. "
Tags : 
     Centrify Corporation
By: Ring Central     Published Date: Aug 28, 2013
Business of all sizes have a fundamental reliance on their communications infrastructure. We use it to interact with our colleagues, our customers, partners and suppliers and for them to communicate with us. Our ability to effectively communicate defines our capacity to conduct our business successfully. This guide is designed to help you with the considerations you should be taking when looking to implement a new communications solution. It will provide you with the tools you will need to start.
Tags : phone solution, advice and considerations, ring central, communication, business communication, corporate communication, business decisions, communications infrastructure
     Ring Central
By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by Target Marketing in April 2008, examines principles and practices associated with acquisition e-mail, which also apply to CRM programs, that are often overlooked by marketers when building their e-mail strategies. These fundamentals serve as strategies to consider and employ to yield higher response rates and a more effective e-mail marketing effort.
Tags : acquireweb, acquisition email, email marketing, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
     AcquireWeb
By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing, mobile device access management, network management, wlan policy, network access layer, wireless mobility, iphone, smart phones, wlan, layer 2 roaming, vpn, byod
     Aerohive
By: ThreatMetrix     Published Date: Jan 21, 2009
In this new white paper, learn how it’s possible to block fraud without damaging the customer experience and causing dropoff.
Tags : threatmetrix, device identification, dropoff, security token, fraud prevention solutions
     ThreatMetrix
By: ThreatMetrix.     Published Date: Jan 30, 2009
In this new white paper, learn how it’s possible to block fraud without damaging the customer experience and causing dropoff.
Tags : threatmetrix, device identification, dropoff, security token, fraud prevention solutions, security
     ThreatMetrix.
By: WebEx     Published Date: Apr 02, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended. To harness the benefits of the new work order, organizations are looking to achieve true collaboration with customers, partners, suppliers and employees. Simply put, the mantra is to "improve productivity while lowering costs." Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles, it infrastructure, virtual enterprise, metrics, industry benchmarks, sfa, crm, erp, synchronous meeting environment, webex mediatone network, return on investment, travel costs, labor costs
     WebEx
By: WebEx.     Published Date: Apr 03, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended.  Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles, it infrastructure, virtual enterprise, metrics, industry benchmarks, sfa, crm, erp, synchronous meeting environment, webex mediatone network, return on investment, travel costs, labor costs
     WebEx.
By: Cornerstone OnDemand     Published Date: Sep 12, 2016
It’s a fact: when companies employ newer talent management tools, they see reduced hiring times and higher retention rates. But what features, tool, and apps should you look for when shopping for a next-gen talent management system? Download “How to Conquer Your First Talent Management Purchase” and learn: • The fundamentals of talent management software (and why you need it!) • How to make the talent management business case to key business units • What to look for in a talent management software provider • Why a "unified" system drives tangible workforce growth Check out this brief on how to conquer your first talent management purchase today!
Tags : 
     Cornerstone OnDemand
By: Webtrends     Published Date: Jan 21, 2010
This is a must-see webinar if you want to understand the fundamentals of multivariate testing (MVT), segmentation, and content targeting. Join Bob Garcia, Director of Product Marketing Optimize and Frans Keylard, Director of Optimization as they use real-life examples to explain multivariate testing and teach you where and how to start optimizing.
Tags : webtrends, mobile strategy, app downloads, apps, performance indicators, mvt, segmentation, optimization
     Webtrends
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Managing people is really very simple: hire people who can do the job, and let them do it. If they do something good, tell them they did done good; if they mess up, sort it out pronto. This e-book covers off a bunch of that stuff. It shouldn't contain anything new or groundbreaking, but it does feature zombies, impractical footwear, terrible ideas for thank you cards and one really creepy monkey. And it's anice reminder that keeping things simple is usually the best way to start.
Tags : management fundamentals, hiring best practices
     CSB by Cornerstone on Demand
By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : database, security, mcafee, data breach
     McAfee
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com