tech target

Results 101 - 125 of 147Sort Results By: Published Date | Title | Company Name
By: LookingGlass Cyber Solutions     Published Date: Apr 26, 2016
The Internet of Things (IoT) is expanding in a dramatic way, bringing to question the issue of availability versus security, as security measures are having a difficult time keeping pace with the development of IoT devices. The introduction of more efficient semiconductors, coupled with revolutionary technology that allows semiconductors to store as well as process complex instructions, means that the IoT may be a more attractive target for hackers. IoT devices from healthcare and industrial systems (i.e., SCADA) could be the most at risk for significant service interruptions and may have secondary and/or tertiary effects on other industries.
Tags : cyber threats, security breaches, malware and vulnerabilities, internet security, security
     LookingGlass Cyber Solutions
By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : cyber threats, threat intelligence, cyber attack, cyber attack prevention
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : cyber threats, threat intelligence, cyber attack, cyber attack prevention
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : cyber threats, threat intelligence, cyber attack, cyber attack prevention
     McAfee
By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
     Mimecast
By: Mimecast     Published Date: May 31, 2018
Protect Your Office 365 Investment - Choose The Right Third-Party Email Security Solution Why should you consider additional security protection around Microsoft Office 365TM email? And, what should you look for in a third-party solution? TechTarget has the answers in this brief, Remedying the Email Security Gaps in Microsoft Office 365. Learn about the key features and functions that you need to protect your investment, how to choose the right email security solution, and how one organization successfully navigated its way to highly satisfactory, reliable third-party solutions for enhancing Office 365 email security.
Tags : 
     Mimecast
By: Mimecast     Published Date: Nov 26, 2018
If you are among the IT professionals feeling a little uneasy about relying solely on the email security provided by Microsoft in Office 365™, you are not alone. Here’s the good news, you can regain the same sense of security that you had when you were managing email servers on-premises with the right third-party solution. TechTarget summarizes how you can easily and effectively realize the benefits of Office 365 with a complementary third-party solution that can not only mirror the kind of layered security built for on-premises solutions, but also ensure uninterrupted access to Office 365 email, even if it crashes.
Tags : 
     Mimecast
By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
     Mimecast
By: Mirror Image Internet     Published Date: Jun 07, 2012
This white paper discusses 5 sure-fire ways you can make your advertising technologies perform better to deliver significant business value.
Tags : advertising, ad ops, ad tech, display advertising, online advertising, targeting, data, mobile advertising
     Mirror Image Internet
By: Modis     Published Date: Mar 09, 2015
In the wake of the recent Sony data breach, customer and company privacy issues have become a hot topic in the media and the tech sector. The Sony incident and other widely covered consumer-facing data breaches experienced by Target, Home Depot, JPMorgan Chase and others have had a significant financial impact on these companies. Experts are projecting that both the number of incidents and the cost of dealing with data breaches will increase in 2015. To combat these attacks, businesses must respond with a heightened awareness of cybersecurity as well as increased spending on enterprise security as needed. Designating high level executives to lead security and hiring certified security experts are among the best practices for stronger IT security in 2015 and beyond. Download to learn more!
Tags : modis, security challenges, it spending, privacy concerns, cybersecurity, security experts, data breaches, consumer facing breaches
     Modis
By: NetIQ     Published Date: Nov 05, 2012
The broad adoption of SIEM technology is driven by security and compliance needs. Targeted attack discovery requires effective user activity, data access and application activity monitoring. Vendors are testing demand for broader-scope solutions.
Tags : siem technology, threat management, security management, enterprise security, compliance, security
     NetIQ
By: Oracle     Published Date: Nov 21, 2013
More marketers are implementing marketing automation to maximize the value of their data, improve engagements, and effectively measure effectiveness. While automation technology also helps companies become more data-driven to improve accountability, it can be challenging to understand how to make the most of its functionality. The Marketing Automation Simplified Guide offers an introduction to the 5 Tenets of Modern Marketing, and breaks down the tips marketers need to automate and optimize: -Data and targeting -Email marketing -Lead nurturing -Lead scoring -Content marketing -Sales enablement
Tags : marketing automation, crm, customer relationship management, big data, marketing, digital marketing, targeting, segmentation
     Oracle
By: Oracle     Published Date: Jan 22, 2014
More marketers are implementing marketing automation to maximize the value of their data, improve engagements, and effectively measure effectiveness. While automation technology also helps companies become more data-driven to improve accountability, it can be challenging to understand how to make the most of its functionality. The Marketing Automation Simplified Guide offers an introduction to the 5 Tenets of Modern Marketing, and breaks down the tips marketers need to automate and optimize: -Data and targeting -Email marketing -Lead nurturing -Lead scoring -Content marketing -Sales enablement
Tags : marketing automation, crm, customer relationship management, big data, marketing, digital marketing, targeting, segmentation
     Oracle
By: Oracle     Published Date: Jan 22, 2014
More marketers are implementing marketing automation to maximize the value of their data, improve engagements, and effectively measure effectiveness. While automation technology also helps companies become more data-driven to improve accountability, it can be challenging to understand how to make the most of its functionality. The Marketing Automation Simplified Guide offers an introduction to the 5 Tenets of Modern Marketing, and breaks down the tips marketers need to automate and optimize: -Data and targeting -Email marketing -Lead nurturing -Lead scoring -Content marketing -Sales enablement
Tags : marketing automation, crm, customer relationship management, big data, marketing, digital marketing, targeting, segmentation
     Oracle
By: Oracle     Published Date: Jan 15, 2014
The latest IT tools and techniques can bring benefit to policy implementation in Government, as well as to administration and operations. This new role for IT can not only speed up the implementation of policy changes, but enable more effective targeting of those policies. This paper explains how. Oracle provides standard COTS software that can do this, and how such solutions have already been proven in Government Ministries.
Tags : oracle, government, cots software, smarter policy implementation, government ministries
     Oracle
By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
     Palo Alto Networks
By: Polycom     Published Date: Jul 24, 2014
Manufacturing is on the move. Leading companies are relocating near supply and demand, as well as the best talent. They’re digitizing operations to automate critical processes and enable crowdsharing. Manufacturers are building innovation hubs to accelerate R&D. They’re wooing – and retaining – talent with continuous knowledge sharing and professional development opportunities. And they’re using an array of technologies to capture and leverage the insights and skills of their best thinkers: industry visionaries, emerging technology experts, and process reengineers. Manufacturers are doing this quietly and consistently. To take aim at the target of market leadership, it pays to draw closer – and then closer still. Are you ready?
Tags : 
     Polycom
By: Pure Storage     Published Date: Apr 10, 2019
Pure Storage, a pioneer in block-based flash arrays, has developed a technology called FlashBlade, designed specifically for file and object storage environments. With FlashBlade, IT teams now have a simple-to-manage shared storage solution that delivers the performance and capacity needed to bring Spark deployments on premise. To help gain a deeper understanding of the storage challenges related to Spark and how FlashBlade addresses them, Brian Gold of Pure Storage sat down with veteran technology journalist Al Perlman of TechTarget for a far-reaching discussion on Spark trends and opportunities.
Tags : 
     Pure Storage
By: Quova     Published Date: Oct 27, 2008
Learn what real-time geolocation technology can do for online businesses. Discover how companies like yours are achieving cost-per-click improvements of up to 30 percent, while lowering home page drop-off rates by as much as 70 percent—and how you can do the same. Also, discover how knowing a Web visitor’s location can help you sell more product; increase customer loyalty; comply with state and country regulations; and track campaign effectiveness. Download your copy now.
Tags : quova, geolocation technology, quova, geolocation data, geographically targeted advertisement
     Quova
By: Radius Intelligence     Published Date: Jun 15, 2015
Marketing technology is the fuel on which modern marketing organizations run. As the marketing technology landscape rapidly expands, CMOs are desperately trying to keep up with an evolving stack. Technology is taking over marketing. Rather than detailing an exhaustive list of available technologies, this will present an overview of the current marketing technology landscape. It will include trends, challenges, and advice to marketing leaders navigating the turbulent and dynamic space.
Tags : predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition
     Radius Intelligence
By: Radius Intelligence     Published Date: Jun 15, 2015
Over the past few decades, marketing has evolved from a hunch-based and immeasurable practice to one driven by data, analytics, and software. Marketers now work with advanced software and myriad channels to identify new prospects. However, today’s marketers face new challenges. This guide will dive deep into those challenges, identify key trends, and introduce the concept of marketing intelligence.
Tags : predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition
     Radius Intelligence
By: Radius Intelligence     Published Date: Jun 15, 2015
Market expansions are a viable strategy when a company’s growth in an existing market has stalled. However, marketers often rely on intuition and qualitative data to inform decisions around market fit and size. In this whitepaper, marketing technology expert, David Raab, explores how the shift in data and predictive solutions streamlines the market expansion process. The paper will reveal 4 keys to a successful market expansion, common mistakes to avoid, and show marketers how to win customers in new market segments.
Tags : predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition
     Radius Intelligence
By: Revana     Published Date: Jul 13, 2016
Paid search marketing has come a long way from keyword searches. Thanks to advances in technology, brands are shifting from targeting keywords to targeting people at key moments. Additionally, Google recently made significant changes to its search engine results pages. Right-rail ads have vanished and Google Shopping ad units are displayed more prominently on mobile. Other innovative changes are also on the horizon. In this e-book, we identify six key areas of paid search advertising that are positioned to upend the marketing landscape and offer suggestions for how to take advantage of those trends.
Tags : revana, seo, search, integration, data, digital marketing, paid seach
     Revana
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com