Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it education

Results 151 - 175 of 206Sort Results By: Published Date | Title | Company Name
Published By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : 
online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings, webinars, hipaa compliance, ensure compliance, system rollout, community education, community programs, webex, remote access
    
WebEx Communications
Published By: WinMagic Inc.     Published Date: Apr 23, 2013
In this eBook, you’ll discover the basics of data encryption; how it addresses the unique data security challenges facing educational institutions, and key points to consider when building the business case for data encryption. You’ll also learn about some common “data encryption myths” and the risks they pose.
Tags : 
protecting, student, institutional, privacy, data, encryption, education
    
WinMagic Inc.
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Get the latest mobile devices and apps in the handsof learners and educators quickly and securely with mobile device and app management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, education, migration, network architecture
    
IBM MaaS360
Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications
    
IBM
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, security
    
Utimaco
Published By: BlackBerry     Published Date: Dec 22, 2009
University of Waterloo conducted a six-week pilot project with several of its students in the Project Leadership Program, a distance learning program. Their goal was to see if mobile learning using BlackBerry smartphones would enhance their educational experience.
Tags : 
blackberry, mobile applications, waterloo, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Safari Books Online     Published Date: Feb 12, 2009
This white paper explores how this 'always on' eLearning resource can facilitate technology professionals' ability to increase productivity, pursue professional certifications, and improve collaborations and communication.
Tags : 
safari books online, digital libraries, elearning resources, professional certifications, e-reference evangelists, education, it management
    
Safari Books Online
Published By: InMage     Published Date: Feb 24, 2009
Utah State University is nationally and internationally recognized for its intellectual and technological leadership in land, water, space and life enhancement. Providing education for more than 23,000 undergraduate and graduate students, Utah State relies on technology to support its innovative initiatives including campus-wide wireless networking, a recent partnership with Google, and a unified email system.
Tags : 
inmage, data recovery, disaster recovery, business continuity, dr scout, security
    
InMage
Published By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
    
Oracle
Published By: Kaspersky     Published Date: Jan 07, 2015
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.
Tags : 
kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach, security, virtualization
    
Kaspersky
Published By: Altiscale     Published Date: Aug 25, 2015
Weren't able to attend Hadoop Summit 2015? No sweat. Learn more about the latest Big Data technologies in these technical presentations at this recent leading industry event. The Big Data experts at Altiscale - the leader in Big Data as a Service - have been busy at conferences. To see all four presentations (in slides and youtube video), click here. https://www.altiscale.com/educational-slide-kit-2015-big-data-conferences-nf/ • Managing Growth in Production Hadoop Deployments • Running Spark & MapReduce Together in Production • YARN and the Docker Ecosystem • 5 Tips for Building a Data Science Platform
Tags : 
hadoop, hadoop technologies, hadoop information
    
Altiscale
Published By: Northeastern University     Published Date: Dec 14, 2015
Looking for a career change or considering the ways to maximize your career? Giving your resume a facelift could help you get there. This resume guide brought to you by Northeastern University can help you refresh your skills, education, experience and references to boost your marketability. Experience Northeastern.
Tags : 
grad school, northeastern university, graduate studies, masters, mba, career growth, career change
    
Northeastern University
Published By: Northeastern University     Published Date: Dec 14, 2015
Looking for a career change or considering the ways to maximize your career? Giving your resume a facelift could help you get there. This resume guide brought to you by Northeastern University can help you refresh your skills, education, experience and references to boost your marketability. Experience Northeastern.
Tags : 
grad school, northeastern university, graduate studies, masters, mba, career growth, career change
    
Northeastern University
Published By: Lenovo and Intel®     Published Date: Nov 03, 2017
Internet of Things. Cloud. Augmented reality. Virtual reality. Technologies like these are changing the face of all industries, across manufacturing, financial services, healthcare, education, agriculture, logistics, and more. These transformative technologies define new paradigms of business productivity, customer centricity, and quality & compliance management. This infographic features the opportunities these technologies can o er as they begin incorporating them into their business models. Download the infographic now.
Tags : 
    
Lenovo and Intel®
Published By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"A learning management system (LMS) is designed to do more than “check the box” on training. It’s also a powerful platform ready to deliver meaningful, targeted education and engage workers with career development opportunities. Importantly, an LMS can help your company increase the ROI of employee training and learning. Download our quick-read guide on how an LMS can: 1. reduce costs and inefficiencies by streamlining the delivery of learning 2. reduce hiring and turnover costs by retaining high performers 3. increase new hire engagement and productivity by integrating ongoing learning with onboarding 4. drive unified success by aligning employee and organizational goals 5. reduce cost of administering compliance training"
Tags : 
    
Cornerstone OnDemand
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 12, 2011
With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to release their details, even if that means abandoning a sale.
Tags : 
verisign, extended validation ssl, verisign, papercheck.com, carinsurance.com, flagstarbank.com, creditkarma.comphishing, identity theft, fraud, ssl certificate, online retailers, insurance brokers, online pharmacy, financial services, travel, education, banking, verisign ev ssl certificates, www.verisign.c
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Astaro     Published Date: Aug 10, 2009
The Fowlerville Community Schools, a K-12 institution, has all the regular security needs of an educational institution.
Tags : 
inappropriate web content, internet usage, download, music, movies, content filtering, astaro, filter, security gateway, internet security, internet, firewall, proxy, security, vpn
    
Astaro
Published By: Astaro     Published Date: Aug 10, 2009
Frontier Nursing Services (FNS, Inc.) of Hyden, Kentucky provides health care to the underserved population in rural areas of southeast Kentucky and is committed to advancing nursing through education.
Tags : 
frontier nursing, astaro, cisco, barracuda, pix, fns, network, it department, management, reporting, all-in-one security, vpn, firewall, email, antivirus, gateway, report manager, security
    
Astaro
Published By: Oracle     Published Date: Nov 01, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
    
Oracle
Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
    
CareerSaver
Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
    
CareerSaver
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.