Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

hie

Results 1826 - 1850 of 2381Sort Results By: Published Date | Title | Company Name
Published By: Qualys     Published Date: Jul 19, 2012
Updated for PCI DSS Version 2.0 where internal scanning is now required! With the recent updates to PCI DSS, get all the facts and learn how to comply with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI DSS. It arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. Discover: . What the Payment Card Industry Data Security Standard (PCI DSS) is all about . The 12 Requirements of the PCI Standard . How to comply with PCI . 10 Best-Practices for PCI Compliance . How QualysGuard PCI simplifies PCI compliance
Tags : 
pci, technology, security, firewall, email, virus protection
    
Qualys
Published By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : 
continuous monitoring, network security, vulnerability, best practices, security
    
Qualys
Published By: Qualys     Published Date: Jun 02, 2015
This guide describes the need for continuous monitoring and offers a blueprint for creating a continuous security practice. As a result, continuous monitoring will give your organization the most comprehensive view of its global perimeter, and empower you to proactively identify and address potential threats enabled by vulnerabilities in software or weak system configurations.
Tags : 
continuous monitoring, continuous security, potential threat identification, system configurations, security
    
Qualys
Published By: Quantcast     Published Date: Oct 28, 2013
In an industry that is constantly innovating, we know the challenge to achieve higher performance goals becomes more and more difficult. If you're new to online advertising or want to improve your display performance,read our game plan for a winning display strategy.
Tags : 
display advertising, display ad spend, ad spend, rtb, real time bidding, click data, conversions, display performance
    
Quantcast
Published By: Quantcast     Published Date: Feb 13, 2015
Over the past few years, we've seen advertisers increase their display ad spend to reach more customers online where they spend the majority of their time. In an industry that is constantly innovating, we know the challenge to achieve higher performance goals becomes more and more difficult. Whether you’re new to online advertising or a seasoned pro, read our game plan to evaluate and improve your display performance.
Tags : 
display advertising, quantcast, rtb, advertiser solutions
    
Quantcast
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This white paper shows how upgrading to LTO-5 technology and consolidating storage onto fewer tapes enables organizations to achieve a 5yr ROI and a 17-month payback period.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: Quantum Metric     Published Date: Oct 18, 2019
At Quantum Metric, helping companies improve digital customer experience is our passion. We’ve harnessed the learnings and observations we’ve had across dozens of Fortune 500 organizations to develop a methodology that companies can use to achieve meaningful results quickly - helping leadership and teams highlight the lowest hanging fruit in their organizations. The principles for our guide are: Be Easy to Understand. Five clear steps with specific goals and outcomes. Provide Value from Day One. No month-long assessments required. Deliver Quantifiable Outcomes. Clear, objective, and measurable improvements. Be Consistent. Produce repeatable results. Be Universal. Applicable to a wide-variety of businesses and situations. Using the concepts illustrated within this methodology, digital teams from every industry have been able to consistently deliver stellar customer experiences that encourage and maintain long term brand loyalty.
Tags : 
    
Quantum Metric
Published By: Quocirca     Published Date: Feb 05, 2007
Service-Oriented Architecture (SOA) provides a foundation to achieve software reuse. A key part of the SOA value proposition is the benefits realized from software reuse. Learn more in this new white paper from Quocirca.
Tags : 
best practices, enterprise software, return on investment, roi, service oriented architecture, service-oriented architecture, soa, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management
    
Quocirca
Published By: Quocirca     Published Date: Sep 13, 2007
A sound IT infrastructure is fundamental to today’s businesses and when that infrastructure fails the consequences can be far reaching. Whether it is business-to-business, business-to-consumer or public sector organizations serving citizens, applications and the services they drive increasingly need to be available all day, every day. Many organizations find it hard to achieve such service levels. This briefing looks at some possible solutions.
Tags : 
data center, datacenter, data centers, datacenters, data centre, data centres, infrastructure, mission critical
    
Quocirca
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management, remote network management
    
Quocirca
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations
    
Quocirca
Published By: Quova     Published Date: Oct 27, 2008
Learn what real-time geolocation technology can do for online businesses. Discover how companies like yours are achieving cost-per-click improvements of up to 30 percent, while lowering home page drop-off rates by as much as 70 percent—and how you can do the same. Also, discover how knowing a Web visitor’s location can help you sell more product; increase customer loyalty; comply with state and country regulations; and track campaign effectiveness. Download your copy now.
Tags : 
quova, geolocation technology, quova, geolocation data, geographically targeted advertisement
    
Quova
Published By: Qwest Business.     Published Date: Jan 27, 2010
Today's organizations must embrace innovation, achieve a high level of responsiveness and transform customer information and feedback into actionable results.
Tags : 
qwest business, customer service, feedback, voice and data network infrastructure, telecommunication, crm) and sales force automation, converged ip network infrastructure, infrastructure
    
Qwest Business.
Published By: Rackspace     Published Date: Mar 28, 2018
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an affordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: Mar 08, 2016
Watch as industry experts discuss strategies for overcoming design, deployment, and monitoring challenges in a Microsoft Cloud Platform environment. They examine real-life situations in which Rackspace architected and deployed Microsoft Private Cloud at scale, across multiple geographies. You’ll get first-hand what Red Hat has learned along the way, such as how to approach the integration of Database-as-a-Service (DBaaS) functionality, designing resilient architectures and failover, as well as building for scale.
Tags : 
microsoft private cloud, microsoft server, hyper-v, windows azure, microsoft cloud platform, rackspace, red hat, it management
    
Rackspace
Published By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: Mar 07, 2019
SapientRazorfish is a global company that helps organizations in digital business transformation. For these enterprises, cloud migration is a mandate, and SapientRazorfish ensures the desired outcomes are achieved with Rackspace Fanatical Support for AWS services – to provide clients with expertise in planning, architecture services and counseling, migration, deployment, infrastructure maintenance and solution optimization.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: May 06, 2019
The retail sector is increasingly difficult and volatile. Enterprises must adopt easily available technology to liberate themselves from the daily grind and better focus on achieving their core business objectives. To be cost-effective in doing this, retailers turn to Google Cloud Platform, the most affordable, reliable, innovative and intuitive cloud platform in the world, to drive operational agility and optimization of application performance. As the first managed services partner for Google Cloud Platform, and Google Cloud’s 2018 Global Migration Partner of the Year, Rackspace is helping retailers everywhere to accelerate innovation and cost savings, by taking over their intensive, day-to-day operations of the cloud. This e-book looks at how different retail brands work with Rackspace to ensure smooth and easy migration and operation on Google Cloud, as well as to gain added value from Rackspace’s depth of knowledge and best practices to effectively tap Google Cloud Platform too
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: Sep 04, 2019
In this hands-on guide, our AWS Amazing Minds share advice on how to navigate and optimise your cloud journey on AWS, tackling the 9 most common questions around upskilling on AWS, automation, DevSecOps, customised cloud and more. Our customers were the catalyst for creating the Amazing Minds series. Independent research combined with insights from our day-to-day business interactions, told us unequivocally that they wanted to be part of the journey. We also know that a secure and high-performing cloud journey is at its best when it’s a shared experience. Download the guide to see how you can achieve how performance outcomes on AWS, and save time and money whilst doing so.
Tags : 
    
Rackspace
Published By: Rackspace - Google Cloud     Published Date: Jul 26, 2019
As the first managed services partner for Google Cloud Platform, Rackspace can help you accelerate innovation and cost savings within your retail organisation. With over 2.5 million hours of experience managing over 8000+ ecommerce websites, let us look after the intensive day-to-day operations of the cloud, so that you can focus on achieving your core business objectives. This paper explores: • Customer Voices: a look at three customers experiences working and thriving with GCP cloud • Shopping trends and forecasts for 2019 • What’s on offer with Rackspace and our Fanatical Experience™
Tags : 
    
Rackspace - Google Cloud
Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion
    
Rapid7
Published By: Rapid7     Published Date: Nov 27, 2012
What's your security protection factor (SPF)? In this on demand webcast for IT and security professionals, Rapid7's CSO and Chief Architect of Metasploit, HD Moore, shows how you can reduce your remediation workload by testing which vulnerabilities really matter.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing
    
Rapid7
Published By: Red Condor     Published Date: Mar 17, 2008
Your network is defenseless against image-based spam attacks. Red Condor reveals how a simple approach can result in a less than 0.01% false-positive rate while achieving long term spam block rates greater than 98%. Get this white paper to arm yourself against the latest malicious email threats. Follow the instructions below and you'll learn the secret to living in a spam-free world.
Tags : 
image-based, image based spam, spam, image spam, red condor, redcondor, security
    
Red Condor
Start   Previous    67 68 69 70 71 72 73 74 75 76 77 78 79 80 81    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.