arbor

Results 1 - 25 of 58Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Mar 26, 2018
It’s iconic. Concrete sails riding gentle waves. A million subtly textured tiles reflecting “the mood of the harbor.”1 The Sydney Opera House is recognizable by nearly everyone, a structure so loved and venerated it stands “alongside the Taj Mahal, the Acropolis, and the Great Pyramids” as a World Heritage site, “a cultural site having outstanding universal value.
Tags : 
     Adobe
By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
     CA Technologies EMEA
By: Adobe     Published Date: Jun 22, 2017
Like the renowned Sydney Opera House, your brand has the potential to become an icon. Read our guide, Vision from the Harbor, to find out how. You’ll discover strategies for standing together with customers. So your business can stand out from the crowd. Read our guide now to learn how you can: • Create unforgettable experiences across the entire customer journey • Test those experiences and improve them to lift conversion • Overcome organizational barriers to create a true culture of optimization
Tags : data, marketing, customer journey, customer experience, strategy
     Adobe
By: Adobe     Published Date: Mar 03, 2017
Like the renowned Sydney Opera House, your brand has the potential to become an icon. Read our guide, Vision from the Harbor, to find out how. You’ll discover strategies for standing together with customers. So your business can stand out from the crowd. Read our guide now to learn how you can: • Create unforgettable experiences across the entire customer journey • Test those experiences and improve them to lift conversion • Overcome organizational barriers to create a true culture of optimization
Tags : customer experience, optimization, branding, brand strategy
     Adobe
By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
     Ciena
By: ArborNetworks     Published Date: Mar 29, 2016
Are you able to confidently identify attacks within minutes of looking at an alert?
Tags : arbor, security, information, attack, alert, investigative, it management, data management
     ArborNetworks
By: ArborNetworks     Published Date: Feb 12, 2016
DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. This report covers actuals for 4Q14 and 1Q15.
Tags : arbor network, ddos, service provider, biannual report, security
     ArborNetworks
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: ArborNetworks     Published Date: Feb 12, 2016
Security Analytics is one of the two fastest growing product categories in security.
Tags : arbor networks, insegment, security analytics, data protection, cyber defense, cyber security, security, data management
     ArborNetworks
By: ArborNetworks     Published Date: Feb 12, 2016
Today’s DDoS attacks are an easy way to interrupt businesses.
Tags : ddos protection, arbor networks, insegment, best practices, policies, data
     ArborNetworks
By: ArborNetworks     Published Date: Feb 12, 2016
The modern enterprise is dependent upon connectivity at every level. Every business initiative, whether driven by sales, marketing, manufacturing, finance, R&D or HR, is dependent upon reliable network availability and continuity. Disrupting that continuity is what Distributed Denial of Service (DDoS) attacks are all about.
Tags : arbor network, ddos, enterprise, attack, network
     ArborNetworks
By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : arbor, ddos, protection, enterprise, data security, security
     ArborNetworks
By: ArborNetworks     Published Date: Nov 30, 2015
This white paper will walk you through four steps essential to building a business case for better DDoS protection— one that’s compelling to your business as a whole.
Tags : arbor, ddos, threat, protection, security
     ArborNetworks
By: ArborNetworks     Published Date: Sep 16, 2015
Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.
Tags : networking, security, it management
     ArborNetworks
By: ArborNetworks     Published Date: Sep 16, 2015
This paper examines the four stages of evolution as security organizations move from reactively responding to incidents to proactively identifying and hunting for threats.
Tags : networking, security, it management, data management, data center
     ArborNetworks
By: ArborNetworks     Published Date: Sep 16, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : security, it management, data management
     ArborNetworks
By: TriNet     Published Date: Jul 28, 2015
6 considerations from a serial entrepreneur and investor.
Tags : startup management, infrastructure, employee performance management, hr infrastructure, compliance, hr functions, safe harbors, tax benefits, property rights
     TriNet
By: Iron Mountain     Published Date: Jun 01, 2015
Deze stap is belangrijk, niet alleen om compliance te verzekeren maar ook om de kosten in de hand te houden. Ook waarborgt u dat uw informatie op het juiste moment beschikbaar is, onafhankelijk van waar deze zich bevindt.
Tags : 
     Iron Mountain
By: Teradata     Published Date: Jan 28, 2015
Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.
Tags : teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce, warehouse
     Teradata
By: Exablox     Published Date: Jan 27, 2015
Infrastructure simplification is a concept popping up very often lately with IT managers across all kinds of organizations. But it’s nothing new for small, and budget constrained IT shops that have always looked at ways of keeping their infrastructure simple, very manageable and highly serviceable. Unalaska City School District (UCSD) is no exception; in fact, its needs are even more constrained due to its particular position on the map. Located on the Aleutian Chain, approximately 800 air miles southwest of Anchorage, Alaska, Unalaska is home to 4,000 permanent residents and boasts the U.S’s most productive commercial fishing port of Dutch Harbor, which is also well-known as the home of successful TV show “The Deadliest Catch”. Accessible only by airplane or boat, there are no roads to Unalaska. The deep water and ice-free International Port of Dutch Harbor serves cargo ships and large container vessels throughout the year, making this port one of the busiest transportation hubs in t
Tags : storage infrastructure, nas solution, legacy storage, storage management, exablox, onesystem, oneblox, storage capacity, tape-based storage, data management
     Exablox
By: Arbor     Published Date: Sep 17, 2014
Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables
Tags : firewall, firewall protection, it security, cyber defense, security, it management
     Arbor
By: Arbor     Published Date: Sep 15, 2014
This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.
Tags : ddos attacks, it security, ddos mitigation, security, it management
     Arbor
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com