Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

evident

Results 26 - 40 of 40Sort Results By: Published Date | Title | Company Name
Published By: Evident.io     Published Date: Nov 19, 2015
Collaboration services, email, managed services, and backups and disaster recovery are the most common current use cases for cloud services, according to the results of a new SANS survey on cloud security. The 485 IT professionals who participated in the survey reported using a variety of cloud providers and service models, including software-as-aservice (SaaS) cloud offerings, along with a fairly even mix of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) implementations. Most respondents said they are investing in both public and private clouds as needs dictate.
Tags : 
evident, cloud security, collaboration services, 485 it, disaster recovery, cloud services, saas, networking, it management, wireless
    
Evident.io
Published By: Cisco EMEA     Published Date: May 15, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco è imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che più necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 05, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco è imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che più necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
    
Cisco EMEA
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IDC strongly believes that the days of homogenous compute, in which a single architecture dominates all compute in the datacenter, are over. This truth has become increasingly evident as more and more businesses have started to launch artificial intelligence (AI) initiatives. Many of them are in an experimental stage with AI and a few have reached production readiness, but all of them are cycling unusually fast through infrastructure options to run their newly developed AI applications and services on.
Tags : 
    
Group M_IBM Q2'19
Published By: HP Inc.     Published Date: Jun 15, 2018
Durante mucho tiempo, las estaciones de trabajo se veían principalmente como plataformas adecuadas solo para científicos e ingenieros que necesitaban ejecutar aplicaciones, como por ejemplo de CAD/CAM. Pero en los últimos años ha surgido una amplia gama de aplicaciones que involucran, por ejemplo, distintas formas de medios digitales. La mayoría de esas aplicaciones se han implementado en PC tradicionales, principalmente porque eran de fácil acceso. Pero a medida que las diferencias de precios entre las PC y las estaciones de trabajo se han ido reduciendo, se ha hecho evidente que muchas de estas aplicaciones de medios digitales tienen mucho en común con las aplicaciones de ciencia e ingeniería. En pocas palabras, las aplicaciones de medios digitales funcionan mucho mejor y más rápido en estaciones de trabajo basadas en la última generación de x86 y unidades de procesamiento gráfico (GPU) que funcionan con Windows que en cualquier otro equipo.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Jun 15, 2018
Durante mucho tiempo, las estacionesde trabajo se veían principalmente como plataformas adecuadas solo para científicos e ingenieros que necesitaban ejecutar aplicaciones, como por ejemplo de CAD/ CAM. Pero en los últimos años ha surgido una amplia gama de aplicaciones que involucran, por ejemplo, distintas formas de medios digitales. La mayoría de esas aplicaciones se han implementado en PC tradicionales, principalmente porque eran de fácil acceso. Pero a medida que las diferencias de precios entre las PC y las estaciones de trabajo se han ido reduciendo, se ha hecho evidente que muchas de estas aplicaciones de medios digitales tienen mucho en común con las aplicaciones de ciencia e ingeniería. En pocas palabras, las aplicaciones de medios digitales funcionan mucho mejor y más rápido en estaciones de trabajo basadas en la última generación de x86 y unidades de procesamiento gráfico (GPU) que funcionan con Windows que en cualquier otro equipo.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Dec 21, 2018
Durante mucho tiempo, las estaciones de trabajo se veían principalmente como plataformas adecuadas solo para científicos e ingenieros que necesitaban ejecutar aplicaciones, como por ejemplo de CAD/CAM. Pero en los últimos años ha surgido una amplia gama de aplicaciones que involucran, por ejemplo, distintas formas de medios digitales. La mayoría de esas aplicaciones se han implementado en PC tradicionales, principalmente porque eran de fácil acceso. Pero a medida que las diferencias de precios entre las PC y las estaciones de trabajo se han ido reduciendo, se ha hecho evidente que muchas de estas aplicaciones de medios digitales tienen mucho en común con las aplicaciones de ciencia e ingeniería. En pocas palabras, las aplicaciones de medios digitales funcionan mucho mejor y más rápido en estaciones de trabajo basadas en la última generación de x86 y unidades de procesamiento gráfico (GPU) que funcionan con Windows que en cualquier otro equipo.
Tags : 
    
HP Inc.
Published By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : 
mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
    
McAfee
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: Pros, Inc     Published Date: Apr 24, 2019
The world of selling is evolving, and the advent of digital platforms has changed the way in which buyers interact with sellers. Sales teams are struggling to sell in this fast and competitive environment and this is evident by the fact that the number of sales people that hit their quota has dropped over time. As a sales leader, it’s time to rethink your sales strategy. In this webinar, we’ll discuss sales strategies and practical insights you can implement to develop sales teams which can outperform in any dynamic market environment. We’ll walk through sales enablement practices and coaching tactics which will help to optimize your sales methodologies. We’ll also discuss sales tools with great ROI which can help increase your sales productivity and accelerate your sales velocity. During this segment, we’ll specifically focus on quote-to-cash technologies and discuss the rising importance of AI-based pricing optimization to streamline and accelerate your sales process.
Tags : 
    
Pros, Inc
Published By: Pros, Inc     Published Date: May 03, 2019
The world of selling is evolving, and the advent of digital platforms has changed the way in which buyers interact with sellers. Sales teams are struggling to sell in this fast and competitive environment and this is evident by the fact that the number of sales people that hit their quota has dropped over time. As a sales leader, it’s time to rethink your sales strategy. In this webinar, we’ll discuss sales strategies and practical insights you can implement to develop sales teams which can outperform in any dynamic market environment. We’ll walk through sales enablement practices and coaching tactics which will help to optimize your sales methodologies. We’ll also discuss sales tools with great ROI which can help increase your sales productivity and accelerate your sales velocity. During this segment, we’ll specifically focus on quote-to-cash technologies and discuss the rising importance of AI-based pricing optimization to streamline and accelerate your sales process.
Tags : 
    
Pros, Inc
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: Evident.io     Published Date: Sep 13, 2017
Letting security slip for even a moment can be detrimental to your enterprise. Unfortunately, fast-moving and changing cloud environments don’t make things easier. To avoid making costly mistakes in the first place, everyone must do their part. With "The Six Essentials for DevOps Team Excellence," learn how DevOps teams can incorporate security and development and maintain agility.
Tags : 
    
Evident.io
Published By: Evident.io     Published Date: Sep 13, 2017
Evident Security Platform (ESP) captures over 10 billion AWS cloud events each month. These events affect organizations of all types- from large to small, to seasoned and beginner cloud AWS users. Using our risk engine, we analyze, prioritize, and categorize these events to discover what is going unchecked. The ebook “Top 10 AWS Security Risks,” explores the most common security mistakes that users make and discusses how to remediate these threats
Tags : 
    
Evident.io
Previous    1 2     Next   
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.