Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

assess

Results 201 - 225 of 942Sort Results By: Published Date | Title | Company Name
Published By: BMC Software     Published Date: May 16, 2011
In this white paper learn how to identify existing assets, assess your business needs, and develop a technical and business plan for your cloud.
Tags : 
amp design, cloud computing, constraining, service design, cloud planning, bmc software, cloud operations, compliance
    
BMC Software
Published By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : 
renewable energy, customer profile, emc, risk management, best practices, storage, technology, security
    
EMC Corporation
Published By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : 
risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc
    
EMC
Published By: Polycom     Published Date: Oct 17, 2016
Some Do's include: Doing a network assessment, and doing you due diligence. Some Don't's include: Not giving up on the handset, and not waiting to get started. Download this helpful white paper to learn more.
Tags : 
    
Polycom
Published By: Polycom     Published Date: Oct 17, 2016
This IDC study uses the IDC MarketScape model to provide an assessment of the 11 top vendors in the worldwide enterprise video conferencing equipment market. The IDC MarketScape is an evaluation based on a comprehensive framework and a set of parameters that assess vendors relative to one another and to those factors expected to be most conducive to success in a given market during the short term and the long term.
Tags : 
    
Polycom
Published By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : 
mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
    
McAfee
Published By: Kaseya     Published Date: May 13, 2015
To get the most out of their computer automation initiatives, financial institutions must take a step back, assess their current IT environments, adjust as needed and make important decisions regarding the future of their IT infrastructures.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, finance
    
Kaseya
Published By: Kaseya     Published Date: May 13, 2015
To get the most out of their computer automation initiatives, healthcare organizations must take a step back, assess their current IT environments, adjust as needed and make important decisions regarding the future of their IT infrastructures.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, network management
    
Kaseya
Published By: NetApp     Published Date: Sep 21, 2017
In order to achieve the five nines (aka, 99.999%), or higher availability, it is important to take a closer look at the design of your storage architecture systems. This paper offers a comprehensive method of assessing your current infrastructure, and provides insight into ways to transform your design to drive better outcomes.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire
    
NetApp
Published By: Dell EMC     Published Date: May 15, 2015
Swiss analyst, Storage Switzerland, reports on the importance of customers assessing the right fit for a data center and workloads, specifically when evaluating an all-flash array solution.
Tags : 
emc, storage switzerland, all-flash, architectures, workload, data center, scale, storage
    
Dell EMC
Published By: Mimecast     Published Date: Aug 14, 2017
Not all email security systems perform the same. Lots of false negatives get let through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of incumbent email security systems to uncover the number, type and severity of threats getting into organizations. Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss. Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems like Symantec miss.
Tags : 
mimecast, symantec email security, esra, message labs
    
Mimecast
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"IDC's recently published report “IDC MarketScape: Worldwide Virtual Client Computing Software 2016 Vendor Assessment” (doc #256606, November 2016) named VMware as a leader. According to the IDC MarketScape report, “It would appear that the commitment made in 2013 (by VMware) is resulting in solid gains and the strategies that were employed have been effective. These elements, along with reference interviews, provide VMware with a solid rating in the IDC MarketScape. As a result, IDC has placed VMware in the Leaders category in this IDC MarketScape. VMware's position reflects the company's market position and commitment to providing resources to expand its VCC product portfolio as well as supporting software and hardware solutions.” Be the first to receive an excerpt of the IDC MarketScape: Worldwide Client Computing Software 2016 Vendor Assessment, available from VMware. Register now to access your copy.
Tags : 
    
VMware AirWatch
Published By: Puppet     Published Date: Jun 24, 2016
The fifth annual State of DevOps Report, presented by Puppet and DevOps Research & Assessment (DORA), confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns. This year’s report shows how DevOps speeds up delivery, improves quality and security, enhances employee engagement and more. Download the report to learn why: • High-performing IT organization experience 200x more frequent deployments and 24x recovery from failures. • High performers spend 22 percent less time on unplanned work and 29 percent more time on new work, such as features or code. • Taking an experimental approach to product development improves IT performance. The report also helps you understand the ROI of DevOps, and includes formulas to quantify your potential cost savings, using metrics from you own organization.
Tags : 
    
Puppet
Published By: Secureworks     Published Date: Oct 04, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organization’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
    
Secureworks
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
Regardless of the industry, your customers are digital and always on; your business should be, too. As such, today's forward-thinking business has increased its use of digital channels and ecosystems to engage with and serve its customers. To do so, a well-crafted business continuity / disaster recovery (BCDR) plan can ensure a company's ability to keep its business uninterrupted and maintain its survival, despite unforeseen disruptions. Read this Forrester technology adoption profile to learn the mission-critical nature of and how to maintain an always-on business presence.
Tags : 
    
Spectrum Enterprise
Published By: KPMG     Published Date: Oct 22, 2018
Following the U.S. Supreme Court’s landmark decision in South Dakota v. Wayfair, states may now require sellers to collect and remit indirect taxes on the basis of economic presence. In the coming months, taxpayers can expect to see a flood of additional states adopting similar standards, requiring sellers to react quickly. Now that Quill has been overturned, what is next for sellers? Download your copy of Navigating a world without Quill, to: • understand the business implications of the South Dakota v. Wayfair Supreme Court decision • consider tasks necessary to determine compliance with economic nexus standards • access a checklist for assessing how this indirect tax case impacts your organization
Tags : 
    
KPMG
Published By: PwC     Published Date: Jun 20, 2018
Digital Fitness Assessment 2.0 is here. The time to upskill is now. Let’s face it--every industry is being disrupted. To stay profitable and lead the way, it’s critical to be deliberate about making sure your employees have the skills they’ll need to take you there. The Digital Fitness Assessment will help your employees build their future through a custom experience that targets specific skills and behaviors to each employee. Get a demo here. [Please confirm link works and is tracked] What if you could give every employee a blueprint for tomorrow's most-needed skills? Your people know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here. [Please confirm link works and is
Tags : 
    
PwC
Published By: PwC     Published Date: Jul 19, 2018
What if you could give every employee a blueprint for tomorrow's most-needed skills? Your teams know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here.
Tags : 
    
PwC
Published By: Location3     Published Date: Oct 07, 2019
The Association of National Advertisers revealed in an independent study that several agency powerhouses were marking up media inventory 30-90% on top of the fees they were already charging. These practices combined with highly publicized data breaches have contributed to an increasingly contentious environment surrounding agencies and the brands they work with directly. This white paper examines how brand marketers and corporate teams can identify potentially harmful practices undertaken by their vendors, while also offering tips for brands and franchisees to make sure they’re getting the most value out of their agency partnerships. Key Takeaways Include: Identifying Non-Transparent Marketing Fees Tips for Assessing the Value of Your Marketing
Tags : 
    
Location3
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
Cisco Advanced Malware Protection (AMP) offers an integrated, comprehensive approach to endpoint security. Continuous analysis and telemetry features keep its finger on the pulse of network anomalies, and all suspicious activity is investigated. Contextual reporting highlights trends for administers, helping them reassess network architecture to close vulnerable points of entry. Also important is its flexible deployment, which makes it simple for any organization to tailor its endpoint security.
Tags : 
    
Cisco DWA Security
Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
    
Illusive Networks
Published By: Procore     Published Date: May 28, 2019
Looking for Construction Project Management Software? Ensure you don’t make an expensive mistake. Downloading this eBook will help you build a framework for evaluating and choosing the construction management software solution to fit your business. What you’ll learn: ? How to identify and define your needs ? The functionality you should assess ? Specific features to look for ? How to evaluate a software vendor Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their projects. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.