profile

Results 201 - 225 of 307Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Dec 05, 2016
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: SnowFlake     Published Date: Jul 08, 2016
This EMA case study profiles the implementation of the Snowflake Elastic Data Warehouse, a new generation of cloud-based data warehouses, by Accordant Media. This document details significant tangible and intangible improvements and opportunities the Snowflake solution created for the Accordant Media infrastructure and analytical teams.
Tags : snowflake, media, data, technology, cloud-based data, best practices
     SnowFlake
By: Profiles International     Published Date: Apr 08, 2011
Employee assessments can give organizations and managers consistent, in-depth, and objective information about their people. This Information helps leaders and managers rely less on gut instinct and make smarter people decisions.
Tags : employee assessment, job performance, hard skills, soft skills, job matching, employment lifecycle, productivity, roi
     Profiles International
By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics incorporates many governed discovery features, with which business users can easily expose the underlying data modelling of existing reports and modify it to an individual or departmental requirements
Tags : ibm, ibm cognos analytics, analytics, business intelligence, business analytics
     IBM
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Mar 12, 2019
Enhance cybersecurity by reducing your attack surface CISOs understand that the smaller a company’s attack surface, the fewer areas need to be protected. Keeping a low profile lets you make better use of your resources. Esther Shein reports.
Tags : 
     BlackBerry Cylance
By: Appistry     Published Date: Oct 11, 2007
Organizations serving the intelligence & defense community rely on the performance of their applications for more than revenue - national security depends upon those applications for mission-critical operations. This industry profile details how Appistry provides the reliability and performance demanded by intelligence & defense organizations.
Tags : application fabric, performance computing, application performance, grid computing, infrastructure, appistry, enterprise applications
     Appistry
By: Neolane, Inc.     Published Date: Dec 30, 2008
The Hager Group is a $1.5-billion electronics manufacturer. With a distributed global workforce of more than 10,000 employees, Hager has 40 sales subsidiaries and 25 industrial sites worldwide.  Today, with a centralized marketing database and software, Hager can ensure data quality and deliver personalized, targeted communications according to customer and prospect profiles and behavior.  This program allows Hager to capture 1,000 new prospects each month, and achieve a 10 percent conversion rate - resulting in an incremental revenue increase of $42 million per year.
Tags : neolane, the hager group, e-marketing program, centralized marketing database, central repository customer data, crm software, custom content, deliverability
     Neolane, Inc.
By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
     McAfee Inc
By: Iovation     Published Date: Sep 25, 2009
After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.
Tags : iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading
     Iovation
By: ZoomInfo     Published Date: Sep 07, 2010
Generate highly-qualified candidate lists effortlessly and instantly connect with direct contact information. The ZoomInfoT Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation candidate sourcing tool, ZoomInfoT Pro, featuring robust search criteria, in-depth candidate profiles, and automated alerts on profile updates and changes. Start your free trial today.
Tags : zoominfo, candidate, search, database, sourcing, pipeline, conversion rates
     ZoomInfo
By: iCims     Published Date: Oct 02, 2015
Did you know that 88% of all job seekers have at least one social networking profile? Because of this, 92% of companies have used or plan to use social media to recruit. If businesses aren't using social media for recruiting, they can potentially miss candidates that wouldn't be found elsewhere. Don't let your competition find these great candidates first, and even worse, your competition can find these great candidates.
Tags : social and mobile, social, mobile, icims, enganging candidates, reaching candidates, talent platform, social mobile recruiting
     iCims
By: IBM     Published Date: Nov 09, 2011
Learn how Unica provides a MAP with a high level of customizable business rules and processes!
Tags : marketing, map, marketing automation, sirius assesments, unica
     IBM
By: SPAN Systems     Published Date: Aug 30, 2013
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags : securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes
     SPAN Systems
By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : managing vulnerability, security breaches, security threats, hack prevention, third party software, security
     Secunia
By: Polycom     Published Date: Sep 15, 2015
Polycom voice solutions for Microsoft Lync helped the Organization profiled achieve the following benefits (risk and present value [PV] adjusted) over three years: Improved productivity and collaboration: $12,341,123. Employee relocation cost savings: $452,351. Phone purchase and installation savings: $1,988,182. Managed services cost savings: $582,269. Total cost savings and benefits: $15,363,925.
Tags : collaboration, communications, conferencing, lync, microsoft, phone, polycom, skype
     Polycom
By: IBM     Published Date: Dec 04, 2015
Join us as we discuss how to leverage network and subscriber data to create unique customer profiles, personalize engagement, and improve marketing offers.
Tags : ibm, engagement, marketing, customer profiles, customer insight, telecommunication
     IBM
By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : cloud application, cloud app adoption, cloud security, cloud protection, shadow it
     Symantec
By: IBM     Published Date: Sep 15, 2014
This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.
Tags : global banking, banking solutions, fis outsourcing, banking information technology, flash technology
     IBM
By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : data security, ibm, converged network security, security risk, networking, security, it management, data management
     IBM
By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty, networking
     IBM
By: Intel     Published Date: Apr 16, 2012
Get help evaluating your next purchases and accelerate the business value of IT as your datacenter continues to evolve. Download this Technical Adoption Profile on How Blade Servers Impact Datacenter Management and Agility from Forrester Research.
Tags : cloud, cloud computing, myths, infrastructure, services, it executives, data, intel
     Intel
By: IBM     Published Date: Jul 26, 2017
Security incidents have been on the rise for the past few years, and most experts in cybersecurity believe the trend will only continue to intensify. Here, though, our subject is not the high-profile, headline-grabbing attacks we all know about but the everyday struggle of organizations everywhere, in every industry, to protect their data in a world of thieves.
Tags : security, cyber crime, trends, cyber security, data protection
     IBM
By: Pardot     Published Date: Apr 29, 2009
How much time is your sales team wasting on unqualified leads? With automated scoring and grading your best prospects rise to the top, making it easy for sales representatives to prioritize prospects and take action with targeted follow-up.   
Tags : pardot, b2b lead generation, roi, lead gen, leads, unqualified leads, sales, sales team
     Pardot
By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
     Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com