Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ber

Results 326 - 350 of 3394Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Nov 25, 2013
For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.
Tags : 
mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets, growing mobile workforce, document productivity, content management, hybrid model, networking, it management, wireless, enterprise applications
    
Adobe
Published By: Red Hat     Published Date: Jan 01, 2009
The number 1 independent tire retailer tried, unsuccessfully, to build an online platform based on Windows. Ultimately, the company succeeded instead with a solution built with Red Hat Enterprise Linux, Red Hat Network Satellite, Apache, WebLogic, and IBM Lotus Domino Server.
Tags : 
e-commerce business, red hat, satellite
    
Red Hat
Published By: Teradata     Published Date: Jul 07, 2015
As cyber security challenges continue to grow, new threats are expanding exponentially and with greater sophistication—rendering conventional cyber security defense tactics insufficient. Today’s cyber threats require predictive, multifaceted strategies for analyzing and gaining powerful insights into solutions for mitigating, and putting an end to, the havoc they wreak.
Tags : 
    
Teradata
Published By: VMware     Published Date: Oct 05, 2015
Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a “Zero Trust” network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower — until now, that is. Download this use case from VMware and Carahsoft® now to learn why.
Tags : 
vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft, security
    
VMware
Published By: Exact Online     Published Date: Jun 22, 2016
Modernisieren Sie Ihr Produktionsunternehmen, indem Sie Produktion und Buchhaltung mit der Auftragsverwaltung, Bestandsmanagement und dem Kundenmanagement integrieren. So ist alles einheitlich und Sie erhalten eine nie dagewesene Übersicht über Ihre Produktion. Konzentrieren Sie sich auf gewinnbringende Produkte und seien Sie der Konkurrenz einen Schritt voraus.
Tags : 
production, order management, inventory management, customer management, production management, application integration, application performance management, business integration, business management, business metrics, business process management, customer relationship management
    
Exact Online
Published By: Atlantic Broadband Business     Published Date: Jul 30, 2018
From professional services and hospitality to healthcare and retail, businesses thrive when they have fast, reliable Internet connections. You need reliable connections to send sales transactions, upload files, transmit payroll data, and take advantage of cloud-based applications for sales, finance, and shipping. Then remember all of the different devices in your office – like mobile phones, wearables, tablets, and even desktop phones – and the need becomes even greater.
Tags : 
atlantic broadband, transmit, data, payroll, cloud, data
    
Atlantic Broadband Business
Published By: Akamai Technologies     Published Date: Dec 07, 2016
Many industry experts advise financial services institutions (FSIs) to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. While it’s important to harness the digital technologies today’s customers turn to — especially when it comes to engaging the millennial generation — FSIs need to optimize web and mobile performance to deliver exceptional end-user experiences. Here are eight considerations. Get started on your journey – download the whitepaper today
Tags : 
online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions, digital transformation, digital disruption, infrastructure, cloud security, ddos, security breaches, web application security, cyber threats, cyber security, cloud applications
    
Akamai Technologies
Published By: Oracle     Published Date: Feb 15, 2018
Pour réussir dans le contexte concurrentiel actuel, les entreprises doivent se liberer des limites inhérentes à leurs infrastructures informatiques existantes. L’époque de l’achat de matériel et de la gestion d’énormes centres de données pour faire fonctionner les systèmes informatiques est en train de prendre fin. La gestion et la maintenance des infrastructures sont tout simplement trop coûteuses. Une étude Gartner récente a révélé que plus de 80 % des directeurs informatiques considèrent le IaaS (Infrastructure as a Service) comme une option viable et que 10 % d’entre eux la considèrent déjà comme le choix par défaut en matière d’infrastructure. L’utilisation d’une infrastructure avec un modèle de services souple de paiement à l’utilisation ne réduit pas seulement les coûts et les problèmes mais elle permet aussi aux services informatiques d’innover de différentes façons, ce qui contribue à stimuler la croissance de l’entreprise.
Tags : 
iaas, les, nuls, concurrentiel, entreprises, oracle
    
Oracle
Published By: Oracle     Published Date: Feb 28, 2018
Le divisioni IT hanno utilizzato IaaS per liberare il personale da compiti ripetitivi quali la manutenzione dell’hardware e l’aggiornamento del software. Ma non sempre sono stati sfruttati i possibili vantaggi correlati al processo di adozione. Quasi un quarto delle aziende (il 22%) sostiene che se dovesse ripetere l’implementazione di IaaS, utilizzerebbe strumenti per la migrazione automatica. Oracle Ravello, ad esempio, permette alle aziende di trasferire automaticamente i carichi di lavoro dai data center esistenti alle piattaforme cloud senza costose o rischiose modifiche.
Tags : 
sfruttare, vantaggio, competitivo, sviluppare, innovazione
    
Oracle
Published By: Websense     Published Date: Oct 06, 2014
This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain
Tags : 
apts, understanding apts, apt security strategy, stages of advanced threats
    
Websense
Published By: Oracle     Published Date: Mar 01, 2018
Le divisioni IT hanno utilizzato IaaS per liberare il personale da compiti ripetitivi quali la manutenzione dell’hardware e l’aggiornamento del software. Ma non sempre sono stati sfruttati i possibili vantaggi correlati al processo di adozione. Quasi un quarto delle aziende (il 22%) sostiene che se dovesse ripetere l’implementazione di IaaS, utilizzerebbe strumenti per la migrazione automatica. Oracle Ravello, ad esempio, permette alle aziende di trasferire automaticamente i carichi di lavoro dai data center esistenti alle piattaforme cloud senza costose o rischiose modifiche.
Tags : 
sfruttare, vantaggio, competitivo, sviluppare, innovazione
    
Oracle
Published By: Akamai Technologies     Published Date: Apr 13, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Oracle     Published Date: Nov 08, 2017
Pour réussir dans le contexte concurrentiel actuel, les entreprises doivent se liberer des limites inhérentes à leurs infrastructures informatiques existantes. L’époque de l’achat de matériel et de la gestion d’énormes centres de données pour faire fonctionner les systèmes informatiques est en train de prendre fin. La gestion et la maintenance des infrastructures sont tout simplement trop coûteuses.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Cisco     Published Date: Mar 17, 2017
The Cisco 2017 Annual Cybersecurity Report presents research, insights, and perspectives from Cisco Security Research. This research can help your organisation respond effectively to today’s rapidly evolving and sophisticated threats.
Tags : 
cyber security, threat and vulnerability management, security, attacks, threat detection
    
Cisco
Published By: Cisco     Published Date: Mar 17, 2017
There’s a war being waged on all our networks, and security researchers around the world are on the front lines. Here’s the inside story of how our elite security-research team neutralized one of the biggest threats in years.
Tags : 
cyersecurity, security, treat and vulnerability management, networks, cybercriminals, attacks
    
Cisco
Published By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 20, 2017
Positioneringstjänster för inomhusbruk har funnits tillgängliga under många år, men det är först på senare tid som affärsnyttan i dessa system har blivit uppenbar. Peter Jerhamre berättar mer om dessa tjänster och den bakomliggande tekniken som nyttjar Cisco trådlösa wifi nät och BLE.
Tags : 
bakomiliggande, dessa system, manga, funnits, tillgangliga
    
Cisco
Published By: Cisco     Published Date: Sep 20, 2017
Våra två säkerhetsexperter Chung-wai Lee och Håkan Nohre diskuterar aktuella hot som Ransomware och mer avancerade attacker, och vad man bör tänka på för att skydda sig. Vi berättar om en kund från fastighetsbranschen som blev attackerad och hur de hanterade IT-incidenten.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.