reports

Results 1 - 25 of 352Sort Results By: Published Date | Title | Company Name
By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
     Gigamon
By: Workday APAC     Published Date: Oct 07, 2019
"Considering switching to a single system for finance, planning, and analytics? These leading insurance companies did just that—and they achieved amazing results. This infographic shows how Workday helped them stay competitive, deliver a customer experience like no other, and ensure compliance as well as: Save $400,000 annually with better transactional control Reduce time spent on manual processes, such as quarterly reports Spend more time analyzing data than gathering it "
Tags : 
     Workday APAC
By: Jamf     Published Date: Aug 06, 2019
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
     Jamf
By: ttec     Published Date: Sep 13, 2019
According to the annual report on fraud and internet crime published by the FBI’s Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brand’s website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters’ schemes appear authentic or trustworthy. To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Tags : 
     ttec
By: PatSnap     Published Date: Sep 27, 2019
IP professionals require the utmost precision, flexibility, and speed in their workflows. However numerous challenges around disparate sources and tools can delay the IP process. This eBook lays out IP best practices online that will streamline various workflows to drive accurate and effective results, effortlessly. These are: 1. Performing more efficient patent searches 2. Unlocking value from patent portfolios 3. Structuring effective patent landscapes 4. Building more revealing reports 5. Mitigating bottlenecks via collaboration
Tags : research and development, intellectual property, innovation
     PatSnap
By: Mindfire     Published Date: May 07, 2010
In this report, results from well over 650 real-life cross-media marketing campaigns across 27 vertical markets are analyzed and compared to industry benchmarks for response rates of static direct mail campaigns, to provide a solid base of actual performance data and information.
Tags : mindfire, response rates, personalized cross-media, marketing campaign, personalization, personalized urls, purls, performance data
     Mindfire
By: Cisco EMEA     Published Date: Nov 08, 2018
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third party perspective is based on our own hands on testing as well as on interviews with customers who use these products in production environments.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
     Cisco EMEA
By: SAS     Published Date: Jan 17, 2018
It’s a social world and the majority of organizations today use Microsoft Office as their chosen office productivity suite. So it’s important to deliver insights where people are working most. This paper shows how you can use results produced by SAS Visual Analytics with Microsoft Office applications – Outlook, Excel, Word, PowerPoint and SharePoint. With plenty of how-to specifics, you’ll see how easy it is to combine analytic visualizations and reports with Microsoft products to share insights, improve collaboration and drive further adoption of analytics across your organization.
Tags : 
     SAS
By: Pentaho     Published Date: Nov 04, 2015
Although the phrase “next-generation platforms and analytics” can evoke images of machine learning, big data, Hadoop, and the Internet of things, most organizations are somewhere in between the technology vision and today’s reality of BI and dashboards. Next-generation platforms and analytics often mean simply pushing past reports and dashboards to more advanced forms of analytics, such as predictive analytics. Next-generation analytics might move your organization from visualization to big data visualization; from slicing and dicing data to predictive analytics; or to using more than just structured data for analysis.
Tags : pentaho, analytics, platforms, hadoop, big data, predictive analytics, networking, it management
     Pentaho
By: Domo     Published Date: Dec 18, 2015
Domo brings data from any system, spreadsheet or application into a single real-time platform. Decision makers can access the data they need, when they need it, without having to wait on any reports. And it completely transforms the way you manage business.
Tags : domo, spreadsheet, system, application, platform, data, software development
     Domo
By: Microsoft     Published Date: Jun 19, 2017
Gartner reports that 75% to 80% of organizations are using some form of agile project management process. Although agile project management has been around for many years, the way we adapt it has changed significantly, especially as project portfolio management (PPM) practices have evolved. In today’s businesses, technology plays a crucial role in our success, but technology can also make things more uncertain. This uncertainty has given us the motive to be more flexible and requires a “think on your feet” mentality. For this reason, we've seen a big spike in Agile PPM over the last few years. So how do we continue to deliver stability and efficiency, the result of traditional style PPM, while also giving in to necessary risks that lead to innovation and competitive edge? It’s simple: accept the value in each method, avoid the inevitable pains that may develop with segregation, and opt for a unified agile and traditional PPM model.
Tags : 
     Microsoft
By: Gigamon     Published Date: Oct 19, 2017
Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a platform-based approach to visibility in which data, analytics and reports from multiple tools are aggregated and consumed in one control panel. Download to learn more.
Tags : 
     Gigamon
By: Infosys     Published Date: May 30, 2018
Enterprises often accord the lowest priority for modernizing systems running business-critical applications, for fear of disruption of business as well as the time it would take for the new system to stabilize and come up to speed. A large telecom company had the same fears when they decided to modernize the reporting data warehouse which produced reports critical for making business decisions. See how Infosys helped and the five key takeaways from the project.
Tags : data, fortress, modernize, business, applications, telecom
     Infosys
By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
     Fortinet EMEA
By: Akamai Technologies     Published Date: Dec 11, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
     Akamai Technologies
By: TIBCO Software     Published Date: Jan 17, 2019
Cloetta is a leading confectionary company in the Nordic region of Europe and The Netherlands. Cloetta manufactures and markets confectionary, chocolate products, nuts, pastilles, chewing gum, and pick and mix concepts. Its products are in more than 40 markets worldwide, with Sweden, Finland, Denmark, Norway, the Netherlands, Germany, and the UK as the main markets.
Tags : data, virtualization, solution, tool, reporting, server, reports, software
     TIBCO Software
By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : detecting unknown threats, websense, next-generation firewall
     Websense
By: Websense     Published Date: Jul 08, 2014
This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.
Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects
     Websense
By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : dns< security breach, cyber security
     Akamai Technologies
By: Dell EMC     Published Date: Aug 06, 2018
Download this whitepaper for 4 reasons shorter server resfresh cycles are better for business. Analyst firm IDC reports that organizations can increase agility, improve efficiency and reduce operational costs by refreshing their servers every three years.
Tags : 
     Dell EMC
By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: HP     Published Date: Jun 24, 2014
This ESG paper reports on the results of a series of in-depth interviews with senior IT professionals from different industries.
Tags : intel, storage capabilities, storage infrastructure, storage capacity, storage requirements, backup, recovery, archive
     HP
By: HP     Published Date: Jul 03, 2014
This ESG paper reports on the results of a series of in-depth interviews with senior IT professionals from different industries
Tags : 
     HP
By: Adobe     Published Date: Aug 22, 2013
Web Content Management is becoming the focal point for companies who wish to deliver a truly seamless multichannel customer experience. The strategic importance of WCM is increasingly referenced in analysts' reports such as Forrester, which stress the importance for companies to move beyond using a CMS as a means to simply manage content and strategically utilise it to create digital experiences. With that said, it is concerning that just 38% of this survey's respondents agree that their CMS facilitates a 'brand enhancing digital presence.' Download this report to learn more.
Tags : content management, customer experience management, web content management
     Adobe
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com