Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it best practices

Results 51 - 75 of 1278Sort Results By: Published Date | Title | Company Name
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9
Published By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Limelight Network     Published Date: Aug 12, 2019
Many companies that need to deliver content online at scale use Content Delivery Networks (CDNs) to improve performance. However, even with a reliable CDN, there can be issues with service quality in different regions, insufficient capacity during peak periods, and lack of resiliency and diversification. To address these concerns, some companies distribute their delivery load across more than one CDN, a concept often called a multi-CDN implementation. In this paper, we’ll explore frequently-asked questions and best practices for implementing multi-CDN workflows based on extensive experience.
Tags : 
    
Limelight Network
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: Dell     Published Date: Nov 20, 2014
In extreme conditions, you need reliable technology. Whether you are a first responder, work in dangerous locations, wild weather, or just need your equipment to be able to withstand the same harsh conditions you do, Dell allows you to access information quickly - in extreme environments where traditional notebooks simply cannot live up to your expectations. How do you work in such harsh environments and keep information secure and long-lasting without the fear of losing critical information? And how do you keep the information secure, yet utilize a manageable system? Download this interactive infographic today to become informed on Dell's best practices.
Tags : 
mobility, real-world systems, extreme environments
    
Dell
Published By: TriNet     Published Date: Nov 26, 2012
In this report, leading entrepreneurs, recruiters, and investors share the best practices they use to win the talent wars.
Tags : 
startups, recruiting, best practices, hiring, hiring technology, enterprise applications
    
TriNet
Published By: TriNet     Published Date: Nov 26, 2012
Download this white paper for best practices on how to better understand and effectively manage a multi-generational workforce.
Tags : 
workforce management, human resources, best practices, diverse workforce, enterprise applications, human resource technology
    
TriNet
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors, it management
    
Websense
Published By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : 
mobile security, solutions, websense, mobile security, solutions, major it security strategy, security, it management
    
Websense
Published By: Caristix     Published Date: May 03, 2013
The costs and risks associated with the entire interfacing lifecycle are no longer acceptable in a world that requires fast turnarounds and go-live dates. Those implementing HL7 interfaces can tap into new – and proven – best practices for more effective scoping and overall project success.
Tags : 
hl7, integration, interface, midical, heathcare, costs, risks, interfacing project
    
Caristix
Published By: IBM APAC     Published Date: Jun 21, 2019
Understanding cloud environments and making decisions about multiloucd management can be complex. Questions arise, such as how organizations need to change in this multicloud world. Working with enterprise customers, IBM has identified ten key pain points and related best practices that help organizations successfully navigate these transformations. This covers the following key pain points: • Cost transparency and visibility • Dynamic, up-to-date Catalog • IT to operate in two, connected models • Standardized consumption • Aggregated services for added value • Integration remains a necessity • Control without obstruction • Challenges of user management • Primary consumption: Machine-to-machine purchase • Internal and external IT role changes
Tags : 
    
IBM APAC
Published By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv — an OTT service provider — covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : 
content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 25, 2019
In der heutigen Datenschutzlandschaft steht für Verbrauchermarken viel auf dem Spiel. Ausgeklügelte Cyberangriffe und aufsehenerregende Datenschutzverletzungen können Kundendaten gefährden und das Vertrauen in Ihre Marken schädigen. Um heute erfolgreich zu sein, müssen Ihre Marken eine Strategie für Datensicherheit und Datenschutz implementieren, bei der das Vertrauen der Kunden priorisiert wird. Sind Sie dieser Herausforderung gewachsen? Nutzen Sie die „Datensicherheits- und Datenschutzreifebewertung“ von Forrester Research, um die Kompetenzen Ihrer Marke zu beurteilen und verbesserungswürdige Bereiche zu ermitteln. Dabei erfahren Sie Folgendes: Die vier wichtigsten Kompetenzen für B2C-Marken im Bereich Datensicherheit und Datenschutz ? Ob Sie die empfohlenen Best Practices von Forrester Research erfüllen ? Tipps, wie Sie Ihre Datensicherheitskultur und Ihre Datenschutzkultur zu einem Wettbewerbsvorteil machen können
Tags : 
    
Akamai Technologies
Published By: Quantum     Published Date: Jan 24, 2017
Is your organization ready to take the plunge into in-house video production? The benefits can be substantial, but making the move requires some preparation. The IT infrastructure you use for enterprise applications might not be able to meet the rigorous requirements of video production. And you might not want video production teams to use resources from your existing infrastructure, since doing so could affect the performance of other applications. Whether you’re just getting started with in-house video or ramping up production, consider these five best practices for building an IT environment optimized for video work. The right approach to IT is essential for developing efficient collaborative workflows and maximizing the value of your video content.
Tags : 
corporate video, corporate communications, video storage, enterprise video, enterprise storage, media production, video production, video marketing
    
Quantum
Published By: Amazon Web Services     Published Date: Jul 25, 2018
Organizations are collecting and analyzing increasing amounts of data making it difficult for traditional on-premises solutions for data storage, data management, and analytics to keep pace. Amazon S3 and Amazon Glacier provide an ideal storage solution for data lakes. They provide options such as a breadth and depth of integration with traditional big data analytics tools as well as innovative query-in-place analytics tools that help you eliminate costly and complex extract, transform, and load processes. This guide explains each of these options and provides best practices for building your Amazon S3-based data lake.
Tags : 
    
Amazon Web Services
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration, network architecture, network management, network performance
    
Cisco
Published By: Schneider Electric     Published Date: Mar 03, 2017
Don't risk unplanned downtime at your facility. Discover 10 best practices that will help you maximize the life and reliability of your switchgear. Read our free white paper.
Tags : 
switchgear modernization, mv circuit breakers, lv circuit breakers, switchgear upgrades, electrical distribution equipment, schneider electric
    
Schneider Electric
Published By: ShoreTel     Published Date: Oct 26, 2012
Back in the days of wireline telephony, when all phone calls went over the Public Switched Telephony Network (PSTN), businesses would purchase "trunks" -dedicated lines or a bundle of circuits - from their service provider.
Tags : 
shoretel, sip trunking, best practices, pstn, public switched telephony network, trunks, circuits, roi
    
ShoreTel
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Bazaarvoice     Published Date: Jan 09, 2013
Charles Schwab understands that customers make their best marketers, acquiring 40% of its new business through customer referrals. Charles Schwab shares best practices for financial services organizations to use in their decision to invest in social.
Tags : 
charles schwab, customer acquisition, customer referrals, customer recommendations, client ratings, customer experience
    
Bazaarvoice
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.