dam

Results 776 - 800 of 915Sort Results By: Published Date | Title | Company Name
By: iNetU Managed Hosting     Published Date: Mar 06, 2014
Putting together an effective post-breach response plan can greatly reduce the costs and damage to the business inflicted by a breach. The following guide can help organizations get started.
Tags : managed hosting, cloud hosting, inetu, inet manahed hosting, data centers, blades, racks, rack, storage, data storage, cloud hosting, cloud, hybrid cloud
     iNetU Managed Hosting
By: Riverbed     Published Date: Aug 15, 2013
In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Download now to find the results!
Tags : apm, riverbed, network performance, application performance, infrastrucure, forrester report, business performance, it survey, network management, customer service
     Riverbed
By: Riverbed     Published Date: Aug 22, 2014
The world’s largest organizations are adopting cloudbased infrastructure and services at a dizzying pace. Software as a service (SaaS) offerings such as Salesforce.com and Microsoft Office 365 are among the more popular cloud-based services. When moving services to the cloud, data centers are no longer local, so the end user experience can suffer. A poor or congested Internet connection between the user and the cloud service will mean sluggish application delivery that puts a damper on user productivity and ultimately threatens application usage.
Tags : acceleration, delivery, cloudbased infrastructure, productivity
     Riverbed
By: HP     Published Date: Aug 08, 2014
Enterprise IT organizations are challenged by accelerating data growth and increasing reliance on the data. This requires a fundamental rethinking of how data is protected and accessed. HP StoreOnce backup and CommVault Simpana deliver an integrated, end-to-end data protection and rapid recoverability solution to enhance business continuity and resiliency.
Tags : it organizations, storage, commvault simpana, data protection, recoverability, enterprise, data, storeonce
     HP
By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : alienvault, security, siem, hacking, threat detection
     AlienVault
By: Polycom     Published Date: Dec 18, 2014
In the next few years we shall see explosive growth in the use of video conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers. The technology has developed considerably from early adopters to its current form of mass market roll-out. It’s anticipated that nearly half of information workers will have some type of personal video solution in 2016, up from just 15% today. With video conferencing becoming a core component of IT infrastructure that enables communication and collaboration, businesses will be looking to providers of telephony, business applications and network infrastructure services to include this capability as part of their offering. This report will examine the basic components of the technology, considerations for deploying video conferencing solutions, and will introduce the Polycom® RealPresence® Platform to readers
Tags : business, video, conference, multicultural, meetings, communication, cio, digital, information, marketplace, infographic, global, trends, it management, enterprise applications, data management
     Polycom
By: Riverbed     Published Date: Sep 05, 2014
In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services.
Tags : application, performance, management, tool set, enterprises, fundamental issues
     Riverbed
By: HP     Published Date: Oct 15, 2014
Just “keeping the lights on” in the server room is highly complex and largely inefficient. Maintaining IT infrastructure, system interdependencies, and application interoperability tie up valuable personnel and resources. The old way of simply throwing more hardware capacity at a problem can only serve to increase the complexity and further dampen productivity. In a perfect world, the infrastructure—hardware and software—would have been built as an integrated but scalable unit from the ground up. In our world, though, the best new systems combine independent pieces of IT infrastructure to form simplified computing platforms, freeing up IT to focus on business innovation rather than infrastructure management. Welcome to the new world of IT.
Tags : virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, storage, data management
     HP
By: Thawte     Published Date: Oct 06, 2015
The cost of cybercrime in the UK has reached a staggering £27bn – but what’s the actual threat to your business? From data breaches, phishing and spam, to identity theft, malware and vulnerabilities - learn how they can damage your business and the steps you can take to protect yourself.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: IBM     Published Date: Apr 15, 2014
Confused by all the agile advice? Relax! With Agile for Dummies by your side you'll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.
Tags : ibm, agile, software, software development, scale, agile teams, solutions, productivity, agile adoption, agile planning, it solutions
     IBM
By: Eaton     Published Date: Feb 08, 2017
From plug and receptacle charts and facts about power problems to an overview of various UPS topologies and factors affecting battery life, you’ll find a wealth of pertinent resources designed to help you develop the optimum solution.
Tags : 
     Eaton
By: Eaton     Published Date: Feb 08, 2017
Not so many years ago, network closets, server rooms and data centers were designed from a “room to rack” standpoint. Deciding specifically where to store your technology typically came later in the design process. However, rapid technology refresh cycles, the need to rackmount more equipment and the desire for increased cooling capacities in an enclosed rack (known as an enclosure), have all begun to reverse that trend. Today, IT professionals are designing these critical workspaces with more of a “rack to room” methodology.
Tags : 
     Eaton
By: Symantec     Published Date: Nov 30, 2015
en 1994 se llevó a cabo la primera compra en línea de la historia: una pizza de pepperoni con champiñones y extra de queso en Pizza Hut. un año más tarde, amazon vendió su primer libro, Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought, de douglas Hofstadter2. dos décadas después, se calcula que las ventas mundiales de los comercios electró-nicos ascienden a más de 1,2 billones de dólares. ¿Qué ha hecho posible un cambio tan espectacular en nuestros hábitos de compra? la confianza.
Tags : 
     Symantec
By: Symantec     Published Date: Nov 30, 2015
Désormais, acheter sur Internet est devenu une seconde nature pour la plupart d’entre nous. Mais à quel moment ce phénomène a-t-il débuté, et sous quelle im-pulsion a-t-il atteint le niveau que nous connaissons aujourd’hui ? Selon plusieurs sources1, il faut remonter à 1994, date du premier achat sur Internet d’une pizza aux peppéroni et champignons avec supplément fromage chez Pizza Hut. Lorsque cette pizza a été commandée et qu’un an plus tard, Amazon vendait son premier livre (« Concepts & Fluid Analogies Creative : Computer Models of the Fundamental Mechanisms of Thought » de Douglas Hofstadter2), nous assistions sans le savoir aux prémices d’une déferlante qui a submergé le réseau. Presque vingt ans plus tard, en 2013, les ventes mondiales sur Internet dépassaient 1,2 trillion de dollars3. Au centre de cette révolution dans nos habitudes de consommation : la confiance
Tags : 
     Symantec
By: Symantec     Published Date: Nov 30, 2015
Gli acquisti online fanno ormai parte della nostra quotidianità, ma come è cominciato tutto questo e cosa ha fatto sì che sia cresciuto fino ai livelli odierni? Secondo le cronache1 iniziò tutto nel 1994, quando venne effettuato il primo acquisto sul Web: una pizza con funghi, peperoni e aggiunta di formaggio nella catena Pizza Hut. Con quella prima pizza e con la vendita, un anno dopo, del primo libro da parte del gigante del commercio online Amazon (‘Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought’, di Douglas Hofstadter2), ebbe inizio un’attività inarrestabile. Vent’anni dopo, nel 2013, le vendite mondiali di e-commerce sono state stimate in oltre 1.200 miliardi di dollari3. Cosa ha reso possibile questo cambiamento epocale delle nostre abitudini di acquisto? La fiducia.La fiducia nei siti presso i quali acquistiamo, nonché la fiducia che le informazioni di acquisto da noi fornite siano al sicuro. Perché, come sempre, dove ci sono soldi
Tags : 
     Symantec
By: Marketo     Published Date: Jul 25, 2016
Download this ebook to learn more about the fundamentals of digital marketing and how you can be successful in today's modern, complex business landscape: - What is digital marketing and why is it important - How to apply digital elements to engagement marketing - How to implement a pay-per-click (PPC) strategy - Why retargeting is a powerful approach - Why digital marketing and SEO go hand-in-hand - What the future of digital marketing looks like
Tags : marketo, marketing, engagement marketing, digital marketing, pay-per-click, seo, retargeting
     Marketo
By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Carefully protecting and managing the storage that holds a company’s data has become one of the most important missions of today’s Information Technology (IT) organizations. With data being a company’s most valuable asset, many are turning to Storage Area Networks (SANs) as a way to meet a number of challenges.  This White Paper looks at how a well built SAN can provide real benefits to your organization and improve overall efficiency within you network.
Tags : lefthand networks, san, storage area networks, simplification of storage, central data storage
     LeftHand Networks, Inc.
By: Thawte     Published Date: Oct 31, 2011
Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : ssl, ssl certificate, ssl certificates, web security, ssl security, ssl provider, ssl encryption, ev ssl, geo trust, geotrust
     Thawte
By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
     GeoTrust
By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility, security
     GeoTrust
By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
     Symantec Corporation
By: Symantec Corporation     Published Date: Oct 08, 2014
"SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services. The risks of hiccups and problems increases with the number of certificates, including lost sales when customers see security warnings about expired certificates on your site, damage to your brand and consumer trust because of problems with certificates and more. With these risks in mind, this guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle."
Tags : 
     Symantec Corporation
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com