Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

event

Results 1 - 25 of 1584Sort Results By: Published Date | Title | Company Name
Published By: DatacenterDynamics     Published Date: Mar 08, 2016
Your Guide to the BIG discussions that will happen at DCD events around the world this year. Download now.
Tags : 
data centers, power, pdus, dcim, convergence, network security, cloud computing, power and cooling, data center design and management, colocation and web hosting, content management
    
DatacenterDynamics
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Gigamon     Published Date: Jun 10, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper. 
Tags : 
    
Gigamon
Published By: Dassault Systèmes     Published Date: Jun 11, 2019
Electro Mobility in the Cloud Era: Watch the replay Discover presentations & demos from industry-leading speakers. Learn how startups and OEMs are leveraging a single, unified platform on the Cloud for the speed and flexibility necessary to accelerate EV innovation. The one-hour event covered: Learn about new technology addressing the challenges in the mobility industry illustrated by a demo of 3DEXPERIENCE on the Cloud by T&M Expert, Olivier SAPPIN, VP Transportation & Mobility Industry, Dassault Systèmes. Discover how EV startup, XYT, harnessed speed, agility and flexibility with Cloud solutions to ramp up your business and shorten time to market with Simon MENCARELLI, Co-founder & CEO, XYT. Explore how Cloud solutions provide a cost-effective and scalable way for startups to differentiate and succeed with Vincent FREREBEAU, WW Cloud Sales Director, Dassault Systèmes.
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 11, 2019
Q&A from Electro Mobility in the Cloud Era Event. Deep dive with industry-leading speakers to discover in depth answers to compelling questions from the event which was hosted on May 28th.
Tags : 
    
Dassault Systèmes
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: May 28, 2019
The Ohio State University Health Plan manages healthcare insurance benefits and wellness resources for the university’s 29,000 employees, as well as their spouses and dependents. The Ohio State University is one of the nation’s top 20 public universities, and its Wexner Medical Center ranked #3 among 104 academic medical centers that were included in the 2014 University Health System Consortium Quality and Accountability Study. The health plan, medical center and university work together to help deliver safe, efficient, patient centered care to its members.
Tags : 
    
Group M_IBM Q2'19
Published By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more. Read the report to learn more.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more.
Tags : 
    
Forcepoint
Published By: DataCore     Published Date: Jun 06, 2019
More than 54% of companies have experienced a downtime event that lasted more than 8 hours – one full work day – in the past 5 years. And the risk of major disruptions to business continuity practices looms ever larger – primarily due to the troubling dependencies on the location, topology and suppliers of data storage. Download this infographic and see how you can preserve proven Business Continuity practices despite inevitable changes to your data storage infrastructure.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure
    
DataCore
Published By: DataCore     Published Date: Jun 06, 2019
With so many moving pieces involved in business continuity and disaster recovery planning, anticipating the downstream impact of new SAN arrays, hyperconverged systems, and disaster recovery site relocation is increasingly more difficult. Learn how DataCore™ SDS services help you adapt your safeguards accordingly in the face of these common initiatives and business challenges: - Storage Array Replacement - Mergers and Acquisitions - Cloud Replication - Hyperconverged Infrastructure - Multi-Site Metro Cluster
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure, cloud, hyperconverged
    
DataCore
Published By: Coyote Point Systems     Published Date: Aug 25, 2010
Application Delivery Controllers understand applications and optimize server performance - offloading compute-intensive tasks that prevent servers from quickly delivering applications. Learn how ADCs have taken over where load balancers left off.
Tags : 
coyote point, systems, slbs, server load balancers, adc, adcs, ssl, load balancing, load balancer, application delivery, application delivery controller, application delivery network, ssl acceleration, ssl offloading, server offload, server offloading, server acceleration, content switch, content switching., infrastructure
    
Coyote Point Systems
Published By: Infosys     Published Date: Jun 14, 2019
The basic promise of blockchain is that it works as a global distributed ledger or database of things we value - everything from money, to creative work and votes - so these can then be managed and transacted in a trusted and secure manner. Yes, blockchain is a young technology, but well past its infancy. Today, the somewhat inflated expectations around the technology have been brought to a more realistic level and we are beginning to see practical applications across the enterprise. Although these are typically in the realm of reducing cost and/or time for transactions, improving product and system security, finding and preventing fraud and counterfeiting and increasing transparency, there are also instances of businesses relying on blockchain to create new revenue streams. Infosys recently commissioned an independent survey of senior executives worldwide. Download the report to read about their findings.
Tags : 
    
Infosys
Published By: FICO EMEA     Published Date: May 31, 2019
The telecommunications market is highly saturated. In most of the developed world, nearly everyone who wants a mobile phone has one. There are opportunities for carriers to increase service usage or upsell customers on higher-value devices or services, but each new account generally comes at a competitor’s expense—so customer retention is crucial. Telecom service providers need to reduce losses, prevent churn and maximise revenue on their offerings. FICO’s Best Next Action™ technology can be an important tool to achieve all of these objectives, either by presenting new offer terms or cross-selling other products and accessories to enhance the customer’s telecommunications experience—the handset upgrade, better financing terms, insurance on the handset or a subscription service for content. o Prevent account churn o Optimise service utilisation o Segment accounts o Tailor the contact method to the account
Tags : 
telecommunications, advanced analytics, telco, customer retention
    
FICO EMEA
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.