Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dos

Results 326 - 350 of 490Sort Results By: Published Date | Title | Company Name
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security, security
    
Panda Security
Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware, network security
    
Panda Security
Published By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : 
webroot, email security, threats, spam, data security policy, knowledge management, performance management, encrytion, anti virus, data loss prevention, integrate email, web security, pace framework, ddos
    
Webroot UK
Published By: Webroot UK     Published Date: Nov 11, 2009
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration, compliance, remote work, network security, remote access, remote network management
    
Webroot UK
Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection, it management
    
Webroot UK
Published By: SAS     Published Date: Apr 14, 2016
Todo individuo, todo ejecutivo y toda organización – y ahora, con el Internet de las Cosas (IoT), todos los objetos de su organización – son un viaje digital. Esto está obligando a las organizaciones de TI a no sólo manejar más responsabilidades sino también a sumar más a las que ya tiene. Al mismo tiempo, los profesionales empresariales adquieren mayores conocimientos técnicos y, mediante el uso de herramientas basadas en la nube, tienen ya la capacidad de iniciar proyectos tecnológicos por su propia cuenta.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 14, 2016
Como resultado de un mayor acceso a datos útiles, las compañías están usando con mayor frecuencia métodos analíticos sofisticados. Eso significa que a menudo hay una brecha entre la capacidad de una organización de producir resultados analíticos y su capacidad de aplicarlos efectivamente a su negocio.
Tags : 
    
SAS
Published By: Dell     Published Date: Sep 07, 2011
Take a dose of this Windows 7 desktop migration strategy. You'll have happy healthcare systems and improve patient care!
Tags : 
windows 7, microsoft deployment, desktop, inventory applications, windows xp, healthcare management, healthcare, public health
    
Dell
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
Hewlett-Packard's ProLiant DL360p and DL380p Gen8 rack-optimized servers are the flagship products carrying new tech-nologies and capabilities to market.
Tags : 
intel, tech dossier, proliant, dl360p, dl380p, gen8, severs
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
When Hewlett-Packard set out to develop the next generation of its popular ProLiant server family, a key objective was to dramatically reduce the burden of manag-ing the servers-both individually and in aggregate across the data center.
Tags : 
intel, proliant, gen8, mgmt, efficiency
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
As IT platforms have grown more sophis-ticated and complex, and as ITenviron-ments have become more converged and virtualized, enterprises' service and support requirements have changed dramatically.
Tags : 
intel, gen8, servers, hp insight online, xeon, tech dossier, proliant, hp proliant
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
DATA CENTER INEFFICIENCIES RAISE IT COSTS AND RISKS.
Tags : 
intel, tech dossier, idg quick pulse, data center
    
Sponsored by HP and Intel® Xeon® processors
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo and Intel®
Published By: Citrix     Published Date: Oct 26, 2017
Explore los beneficios del mundo real realizados por las compañías que utilizan SD-WAN y cómo la sucursal redefinida tiene impacto en una amplia gama de sectores.
Tags : 
    
Citrix
Published By: EverString     Published Date: Jun 27, 2018
Programs and campaigns can be tough to plan; and more often than not, too many marketers rely on guesswork to get it done. Your numbers need to head in the right direction, so your team must match its resources and spending with your most critical priorities. This ebook will walk you through the 4 must-dos of marketing budget planning so that your team can be more tactical with spending.
Tags : 
    
EverString
Published By: Nutanix     Published Date: Apr 24, 2017
Conviértase en un experto en Infraestructura Hiperconvergente Descargué el libro. La infraestructura tradicional (legacy), con sus componentes aislados como almacenamiento, redes y servidores, ya no es adecuada para cubrir las demandas cada vez mayores de las aplicaciones empresariales actuales ni el ritmo acelerado de las empresas modernas. Hoy, los expertos y líderes de TI están utilizando infraestructura Hiperconvergente para eliminar las barreras y complejidad de las plataformas tradicionales y brindar servicios de infraestructura en sus propias instalaciones (on-premise) pero con la velocidad, agilidad y eficiencia operativa de una nube pública. Descarga gratis el libro
Tags : 
infraestructura hiperconvergente, hiperconvergencia, cómo funciona nutanix, nutanix, hiperconvergencia de nutanix, ¿qué es un sistema convergente?, hci, almacenamiento empresarial, nube pública, nube empresarial, centro de datos, data center, definido por software
    
Nutanix
Published By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : 
content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: Adobe     Published Date: Jul 09, 2015
Com o crescimento explosivo no uso de smartphones e tablets nos últimos cinco anos, a maioria dos profissionais de marketing desenvolveu estratégias para atrair clientes através de canais mobile. Nessa pesquisa, descobrimos que esses profissionais aprenderam a atingir os clientes por meio de dispositivos e plataformas, além de adaptar seus investimentos mobile à medida que eles se desenvolvem. Também analisamos e avaliamos as melhores práticas desses profissionais, de setores como: mídia e entretenimento, varejo e comércio, serviços financeiros, B2B e alta tecnologia. A pesquisa oferece uma visão geral dos investimentos em mobilidade pelos principais pro ssionais de marketing e o que é preciso para manter a liderança.
Tags : 
adobe, líderes, mobilidade, estratégia, web, tecnologia
    
Adobe
Published By: Adobe     Published Date: Feb 22, 2017
Today’s customers expect personal experiences no matter where they are, on every device. And it’s on your team to keep pace with every digital demand. That’s part of the unique challenge facing by creative studios. But with the right stock solution, you can save time for the big ideas, not the little to-dos. Read Put Time Back on Your Side: How Adobe Stock Can Jumpstart Your Creative Process to learn how to: • Integrate Adobe Stock for business with your existing Creative Cloud solutions • License stock images without toggling between platforms or reapplying edits • Work up to 10x faster with stock images
Tags : 
time management, pfeiffer, stock images, adobe, adobe stock, creative cloud
    
Adobe
Published By: Adobe     Published Date: Apr 13, 2017
Today’s customers expect personal experiences no matter where they are, on every device. And it’s on your team to keep pace with every digital demand. That’s part of the unique challenge facing by creative studios. But with the right stock solution, you can save time for the big ideas, not the little to-dos. Read Put Time Back on Your Side: How Adobe Stock Can Jumpstart Your Creative Process to learn how to: • Integrate Adobe Stock for business with your existing Creative Cloud solutions • License stock images without toggling between platforms or reapplying edits • Work up to 10x faster with stock images
Tags : 
creative assistance, graphic design, photo editing, creative cloud, design, creative design, photoshop, stock photography
    
Adobe
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security, it management
    
Cyveillance
Published By: Singlehop     Published Date: Oct 01, 2014
DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.
Tags : 
ddos attacks, it security, data breaches, security, it management
    
Singlehop
Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Tags : 
thousandeyes, ddos, migration, network migration, network security
    
ThousandEyes
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security, trust zones, new access layer, high value targets, inspection offload, virtual ips, security management, threat coverage, ips platfrom, r&d servers, virtualized data centers, denial of service (dos), intrusion prevention system
    
HP
Published By: Sponsored by HP and Intel®     Published Date: Aug 16, 2012
Server virtualization has transformed corporate IT -- companies have enjoyed major cost savings and have gained flexibility and efficiency. But this has also led to a proliferation of virtual machines and servers that threaten to overwhelm data movement and storage technologies. In this IDG Tech Dossier, learn how utility storage makes for massive consolidation, flexibility and scalability, so IT departments can reduce storage infrastructure and lower costs while improving their ability to respond to fast-changing needs of business units.
Tags : 
utility storage, cloud computing, virtualization, data storage, data center
    
Sponsored by HP and Intel®
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.