risks

Results 1 - 25 of 897Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
     Akamai Technologies
By: Gigamon EMEA     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
     Gigamon EMEA
By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
     Rackspace
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
     Group M_IBM Q2'19
By: Motorola Solutions     Published Date: Apr 26, 2019
The Transportation and Logistics industry is the backbone of the global supply chain. But as Transportation and Logistics companies work to ensure timely delivery, they also face a variety of security risks and challenges.
Tags : 
     Motorola Solutions
By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Feb 14, 2019
"Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: - Increase IT efficiency - Reduce security risks - Free IT staff to focus on more strategic initiatives"
Tags : 
     Citrix Systems
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
     Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Jul 13, 2009
Enterprise content is growing at an average rate of 200% per year-and the risks of noncompliance are growing even faster. This paper examines the business and technical difficulties of managing content from disparate systems and presents the most viable alternatives for addressing these challenges.
Tags : asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
     ASG Software Solutions
By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP Business Objects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to provide the conclusions of this cost and benefit analysis.
Tags : 
     SAP
By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP BusinessObjects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to report cost and benefit findings
Tags : 
     SAP
By: ServiceNow     Published Date: Oct 29, 2015
Top Challenges and Risks Associated with Legacy ITSM Systems
Tags : 
     ServiceNow
By: SAP     Published Date: Jul 23, 2018
Forrester Consulting conducted a Total Economic Impact (TEI) study to provide readers with a framework to evaluate the potential financial impact of SAP S/4HANA on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed several customers with experience using SAP S/4HANA. Read the study to learn how Forrester concluded that SAP S/4HANA provides an ROI of 349%.
Tags : 
     SAP
By: Lenovo UK     Published Date: Nov 07, 2018
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity, mobility, lenovo x1, workforce mobility
     Lenovo UK
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
     Hewlett Packard Enterprise
By: Cisco EMEA     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : hyperflex, systems, data platform, storage efficiency, business, cisco
     Cisco EMEA
By: Cisco EMEA     Published Date: Nov 13, 2017
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the internet. As a global market leader in our industry, we help our customers connect, digitize, and thrive. Together, we change the way the world works, lives, plays and learns.
Tags : ransomware, threat landscape, operations, risks, enforcement, defend, firewalls, network
     Cisco EMEA
By: Coupa     Published Date: Dec 14, 2018
Many procurement departments are still using traditional manual processes or outdated technology. The result? Rogue spending, missed discounts from supplier contract pricing, reconciliation headaches, and the list goes on. These business risks are driving more organizations towards the cloud-based, secure, and workflow-friendly world of eProcurement solutions. These solutions are saving money and resources, improving use of budgets and personnel, enabling centralization, and using data to improve and streamline end-to-end purchasing processes. Download this report to learn about: Procurement trends from 400 organizations surveyed Operational and cost-savings benefits of eProcurement Leading features and functionality in eProcurement Adoption best practices and how to get started
Tags : 
     Coupa
By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
An optimized hybrid IT infrastructure enables innovative business outcomes—but rapid IT transformation also creates new risks, threats and vulnerabilities. Coupled with increasingly sophisticated cyberattacks and complex regulatory pressures, managing risk in today’s digital environment becomes even more critical to the enterprise. Download now to learn more.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Hybrid cloud drives innovation—but digital transformation introduces more potential threats and vulnerabilities. Build security in and address risks upfront with proven capabilities from HPE, a global authority in IT security.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
"Now there’s an innovative new way to move enterprise applications to the public cloud while actually reducing risks and trade?offs. It’s called multicloud storage, and it’s an insanely simple, reliable, secure way to deploy your enterprise apps in the cloud and also move them between clouds and on? premises infrastructure, with no vendor lock?in. Multicloud storage allows you to simplify your infrastructure, meet your service?level agreements, and save a bundle."
Tags : 
     Hewlett Packard Enterprise
By: Oracle     Published Date: Nov 28, 2017
Today’s leading-edge organizations differentiate themselves through analytics to further their competitive advantage by extracting value from all their data sources. Other companies are looking to become data-driven through the modernization of their data management deployments. These strategies do include challenges, such as the management of large growing volumes of data. Today’s digital world is already creating data at an explosive rate, and the next wave is on the horizon, driven by the emergence of IoT data sources. The physical data warehouses of the past were great for collecting data from across the enterprise for analysis, but the storage and compute resources needed to support them are not able to keep pace with the explosive growth. In addition, the manual cumbersome task of patch, update, upgrade poses risks to data due to human errors. To reduce risks, costs, complexity, and time to value, many organizations are taking their data warehouses to the cloud. Whether hosted lo
Tags : 
     Oracle
By: Cisco     Published Date: Jun 22, 2015
Read this paper to find out how the Cisco and Microsoft data center solutions provide your IT infrastructure with the flexibility and agility needed to address your changing business needs and achieve your business goals.
Tags : cisco and microsoft data center, it infrastructure, security risks, data center, data center solutions
     Cisco
By: Spectrum Enterprise     Published Date: Mar 01, 2019
To support business continuity, many organizations eagerly avoid putting all their eggs in one basket. Understanding the critical role of last-mile connectivity and always-available Internet access, savvy firms utilize redundant wide area network (WAN) and Internet connections from multiple service providers to ensure network availability in addition to load balancing. Despite the good intentions, their Internet connectivity risks may still be in a single basket. That is because internet service providers (ISPs) and competitive local exchange carriers (CLECs) may operate using leased network infrastructure from the same incumbent local exchange carrier (ILEC).
Tags : 
     Spectrum Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com