Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ber

Results 326 - 350 of 3479Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Feb 15, 2018
Pour réussir dans le contexte concurrentiel actuel, les entreprises doivent se liberer des limites inhérentes à leurs infrastructures informatiques existantes. L’époque de l’achat de matériel et de la gestion d’énormes centres de données pour faire fonctionner les systèmes informatiques est en train de prendre fin. La gestion et la maintenance des infrastructures sont tout simplement trop coûteuses. Une étude Gartner récente a révélé que plus de 80 % des directeurs informatiques considèrent le IaaS (Infrastructure as a Service) comme une option viable et que 10 % d’entre eux la considèrent déjà comme le choix par défaut en matière d’infrastructure. L’utilisation d’une infrastructure avec un modèle de services souple de paiement à l’utilisation ne réduit pas seulement les coûts et les problèmes mais elle permet aussi aux services informatiques d’innover de différentes façons, ce qui contribue à stimuler la croissance de l’entreprise.
Tags : 
iaas, les, nuls, concurrentiel, entreprises, oracle
    
Oracle
Published By: Oracle     Published Date: Feb 28, 2018
Le divisioni IT hanno utilizzato IaaS per liberare il personale da compiti ripetitivi quali la manutenzione dell’hardware e l’aggiornamento del software. Ma non sempre sono stati sfruttati i possibili vantaggi correlati al processo di adozione. Quasi un quarto delle aziende (il 22%) sostiene che se dovesse ripetere l’implementazione di IaaS, utilizzerebbe strumenti per la migrazione automatica. Oracle Ravello, ad esempio, permette alle aziende di trasferire automaticamente i carichi di lavoro dai data center esistenti alle piattaforme cloud senza costose o rischiose modifiche.
Tags : 
sfruttare, vantaggio, competitivo, sviluppare, innovazione
    
Oracle
Published By: Websense     Published Date: Oct 06, 2014
This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain
Tags : 
apts, understanding apts, apt security strategy, stages of advanced threats
    
Websense
Published By: Oracle     Published Date: Mar 01, 2018
Le divisioni IT hanno utilizzato IaaS per liberare il personale da compiti ripetitivi quali la manutenzione dell’hardware e l’aggiornamento del software. Ma non sempre sono stati sfruttati i possibili vantaggi correlati al processo di adozione. Quasi un quarto delle aziende (il 22%) sostiene che se dovesse ripetere l’implementazione di IaaS, utilizzerebbe strumenti per la migrazione automatica. Oracle Ravello, ad esempio, permette alle aziende di trasferire automaticamente i carichi di lavoro dai data center esistenti alle piattaforme cloud senza costose o rischiose modifiche.
Tags : 
sfruttare, vantaggio, competitivo, sviluppare, innovazione
    
Oracle
Published By: Akamai Technologies     Published Date: Apr 13, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Oracle     Published Date: Nov 08, 2017
Pour réussir dans le contexte concurrentiel actuel, les entreprises doivent se liberer des limites inhérentes à leurs infrastructures informatiques existantes. L’époque de l’achat de matériel et de la gestion d’énormes centres de données pour faire fonctionner les systèmes informatiques est en train de prendre fin. La gestion et la maintenance des infrastructures sont tout simplement trop coûteuses.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Cisco     Published Date: Mar 17, 2017
The Cisco 2017 Annual Cybersecurity Report presents research, insights, and perspectives from Cisco Security Research. This research can help your organisation respond effectively to today’s rapidly evolving and sophisticated threats.
Tags : 
cyber security, threat and vulnerability management, security, attacks, threat detection
    
Cisco
Published By: Cisco     Published Date: Mar 17, 2017
There’s a war being waged on all our networks, and security researchers around the world are on the front lines. Here’s the inside story of how our elite security-research team neutralized one of the biggest threats in years.
Tags : 
cyersecurity, security, treat and vulnerability management, networks, cybercriminals, attacks
    
Cisco
Published By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 20, 2017
Positioneringstjänster för inomhusbruk har funnits tillgängliga under många år, men det är först på senare tid som affärsnyttan i dessa system har blivit uppenbar. Peter Jerhamre berättar mer om dessa tjänster och den bakomliggande tekniken som nyttjar Cisco trådlösa wifi nät och BLE.
Tags : 
bakomiliggande, dessa system, manga, funnits, tillgangliga
    
Cisco
Published By: Cisco     Published Date: Sep 20, 2017
Våra två säkerhetsexperter Chung-wai Lee och Håkan Nohre diskuterar aktuella hot som Ransomware och mer avancerade attacker, och vad man bör tänka på för att skydda sig. Vi berättar om en kund från fastighetsbranschen som blev attackerad och hur de hanterade IT-incidenten.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
Published By: DellEMC and Intel® Xeon® processor     Published Date: Apr 13, 2017
AEW Energie in Svizzera utilizza l'hyper-converged infrastructure per ridurre i tempi di gestione e liberare personale da dedicare ad attività specializzate.
Tags : 
case study, hyper-converged infrastructure, hyperconvergence, cut costs, time management
    
DellEMC and  Intel® Xeon® processor
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
Positioneringstjänster för inomhusbruk har funnits tillgängliga under många år, men det är först på senare tid som affärsnyttan i dessa system har blivit uppenbar. Peter Jerhamre berättar mer om dessa tjänster och den bakomliggande tekniken som nyttjar Cisco trådlösa wifi nät och BLE.
Tags : 
bakomiliggande, dessa system, manga, funnits, tillgangliga
    
Cisco
Published By: Webroot     Published Date: Nov 02, 2012
This report presents our results and findings as a result of performance benchmark testing conducted for eight security software products, on Windows 7 Ultimate Edition from December 2011 to January 2012.
Tags : 
it security, endpoint security, endpoint protection, security
    
Webroot
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : 
security, business, cyber security
    
Blue Coat Systems
Published By: FireEye     Published Date: Nov 27, 2012
Combating the Attack of Choice for Cybercriminals
Tags : 
cybercriminals, fireeye, phishing attacks, apt, advanced persistent threat, security
    
FireEye
Published By: FireEye     Published Date: Nov 27, 2012
How to Protect Against the Next Generation of Cyber Attacks
Tags : 
fireeye, cyber attacks, firewalls, ips, protect, security
    
FireEye
Published By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : 
fireeye, spear phishing attacks, cybercriminals, malware, malicious activities, security
    
FireEye
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.