pervasive

Results 1 - 25 of 112Sort Results By: Published Date | Title | Company Name
By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
     MalwareBytes EMEA
By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Automation is already pervasive in our lives—from tried-and-true mechanized assembly lines to the dawn of self-driving cars. But how can you use advanced forms of automation to improve your business processes? Download this starter guide for a detailed look at robotic process automation (RPA), a type of automation that can help you: Reduce costs Decrease errors Improve efficiency Boost productivity Also explore the definition and features of RPA, as well as the types of automation software.
Tags : 
     Automation Anywhere APAC
By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point to unclear rules, regulations, and policies around Wi-Fi use which prevent them from making informed risk decisions.
Tags : government it, modern technology, data security, risk reduction
     Hewlett Packard Enterprise
By: Cisco EMEA     Published Date: Nov 08, 2018
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Cisco Meraki offers a comprehensive portfolio of cloud-managed IT solutions designed to work together to help deliver a modern network that is powerful, reliable, and easy to manage. This whitepaper discusses modern IT trends and explores how the Cisco Meraki portfolio of IT solutions work together to help deliver reliable, pervasive connectivity for the modern business.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Nov 08, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with pervasive security.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Dec 11, 2018
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. This whitepaper discusses modern IT trends and explores how the Cisco Meraki portfolio of IT solutions work together to help deliver reliable, pervasive connectivity for the modern business.
Tags : 
     Cisco EMEA
By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365, it management, storage
     Commvault
By: Hewlett Packard Enterprise     Published Date: Feb 08, 2017
With HPE Just Right IT, you can keep your business running with pervasive network security and data protection that’s easy to implement and manage. Download now to learn more.
Tags : 
     Hewlett Packard Enterprise
By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
     Carbonite
By: Gigamon     Published Date: Oct 19, 2017
Security Delivery Platforms for Dummies introduces IT professionals to a class of technology that transforms how security and monitoring tools are deployed on the network to provide pervasive visibility. Learn how to detect threats faster by removing network blind spots, see what matters across the global enterprise and optimize your security tools’ performance and efficacy. If you’re responsible for protecting a corporate network or managing the deployment of security tools, this book is for you!
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 19, 2017
Read the IDG Tech Dossier, A Security Delivery Platform Benefits the Entire Organization to learn how a comprehensive, well-integrated security platform provides the foundation for the next generation of cybersecurity. By uniting a variety of security solutions and appliances for efficient operation through network visibility and security workflow orchestration, organizations benefit from continuous and pervasive network visibility, fault tolerance and scaling and optimal CPU utilization – thereby improving security and reducing cost. Download now!
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 19, 2017
Download the Gigamon white paper, Addressing the Threat Within: Rethinking Network Security Deployment, to learn how evolving cyber security threat conditions are changing the trust model for security and how a structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. See how the benefits of increased security and cost effectiveness are making the Security Delivery Platform a foundational building block to deploying security solutions. Read now!
Tags : 
     Gigamon
By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
     Dome9
By: Dell EMC     Published Date: May 12, 2016
Businesses face greater uncertainty than ever. Market conditions, customer desires, competitive landscapes, and regulatory constraints change by the minute. So business success is increasingly contingent on predictive intelligence and hyperagile responsiveness to relentlessly evolving demands. This uncertainty has significant implications for the data center — especially as business becomes pervasively digital. IT has to support business agility by being more agile itself. It has to be able to add services, scale capacity up and down as needed, and nimbly remap itself to changes in organizational structure.
Tags : 
     Dell EMC
By: SAP     Published Date: Sep 19, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: SAP     Published Date: Sep 28, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: Riverbed     Published Date: Jul 17, 2013
How to effectively troubleshoot your VDI deployment Virtual desktop infrastructure has come a long way since the first steps were taken a decade ago to run desktop workloads in the data center. While more pervasive today, VDI technologies are latency-sensitive, and wholly dependent on the network. Complaints of poor end-user experience persist, especially over the WAN at branch offices where bandwidth constraints and latency delays are common. But there is a way to ensure consistent and reliable VDI performance to deliver: Reduced downtime Faster troubleshooting Improved SLAs Enhanced planning and control Read this brief to learn how the Riverbed® Cascade® application-aware network performance management (NPM) solution unlocks VDI visibility.
Tags : virtual desktop, infrastructure, deployments, cascade, riverbed
     Riverbed
By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
     CA Technologies EMEA
By: IBM     Published Date: Jul 07, 2015
This white paper describes the pervasive lack of resiliency planning in most cloud implementations today and discusses how better up-front assessment and planning can help organizations realize the enormous potential cloud offers for improved, more agile resiliency.
Tags : ibm, resilience, cloud, design, sustain, enterprise applications
     IBM
By: HP - Enterprise     Published Date: Jun 05, 2013
The year 2011 ended with a staggering 5.9 billion mobile phone subscriptions, especially significant considering that the total world population is around 7.011 billion. Of course, a direct comparison is not fair since many people have multiple subscriptions, but it represents a window into the pervasiveness of these devices and how they are an integral part of people’s lives today. For enterprises, this also represents the impending end to the old computing era and the emergence of the mobile worker. Enabling mobility in the workplace is a top-of-mind goal for decision-makers within every organization. This necessity is brought about by the consumerization of IT and the requirement to develop policies to manage the “bring-your-own-device” (BYOD) trend.
Tags : mobile phones, mobility, it management
     HP - Enterprise
By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, enterprise applications
     MobileIron
By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, enterprise applications
     MobileIron
By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
Mobile, relationship intelligence, and sales coaching are necessities for today’s sales organization and are pervasive capabilities for every sales automation solution category. No vendor solely offers these capabilities without complementing them with other functions. Instead, they are embedded across the categories mentioned above. For example, sales content management providers cannot compete without extensive mobile expertise; market intelligence and customer success do not work without relationship intelligence; and sales coaching is not constrained only to the sales performance management vendors.
Tags : sales content management, customer success, market intelligence, sales acceleration, sales performance management, partner relationship, contract life cycle
     Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
What this case study reveals is that, with the right leadership, it is possible to turn a company around and make it far more responsive and relevant to its customers, and as a result deliver growth and profits. The upshot of D+M's cultural and business transformation has been a return to growth and profitability. The entire enterprise has played its part, which is why the annual Chairman's Award has recognized individuals who have lived the winning cultural values and achieved excellence in performance. Winners have included factory workers and services people. The firm also continues to innovate with HEOS WMS capabilities extending to the other brands. Customer experience continues to be an area of deep cross-functional focus, and feedback from customers provides a clear indication that the customer experience throughout their buying and ownership journeys is rated highly.
Tags : visionary leadership, adaptive enterprise architecture, simplified processes, continuous innovation, rewarding pervasive cx, acute sensing capabilities, collaborative
     Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com