Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

paper based

Results 251 - 275 of 423Sort Results By: Published Date | Title | Company Name
Published By: Avaya     Published Date: Jan 04, 2017
This whitepaper looks at four key ways any growing business can benefit from today's new IP-based communications solutions, including taking advantage of built-in cost savings.
Tags : 
avaya, ip-based communications, communications solutions, unified communications, contact center, collaboration, midsize business solutions, telecom
    
Avaya
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? This white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn: • How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware • Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML • How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-gene
Tags : 
    
CrowdStrike
Published By: Epson     Published Date: Feb 27, 2019
By the end of 2019, the National Archives and Records Administration (NARA) will require all U.S. federal agencies to meet stringent new standards for electronic records management. This includes a requirement that all agencies manage their records electronically to the fullest extent possible, with long-term plans to stop accepting paper-based records and archives completely by 2022
Tags : 
    
Epson
Published By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : 
qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
Qualys
Published By: EMC Backup & Recovery Solutions     Published Date: Apr 29, 2010
This white paper describes components of the VMware vSphere and VMware View solutions and discusses options for protecting these environments using EMC Avamar with global source-based data deduplication.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup
    
EMC Backup & Recovery Solutions
Published By: Skillsoft     Published Date: Mar 03, 2015
This white paper will provide an actionable plan to follow to make certain they are ready to support video-based learning initiatives within their own organization.
Tags : 
skillsoft, development, programs, processes, business management, video learning, corporate education, courses
    
Skillsoft
Published By: Cornerstone OnDemand     Published Date: Oct 17, 2014
Whether you're just getting started or taking your business to the next level, paper-based performance reviews are not the way to go. When you have limited HR resources it probably seems easier to print off forms than sign up for software, but that pile of paper will cost you more in the long run… Get smart with your performance management, embrace technology you'll be able to: • Easily track progress and make sure everyone completes their reviews • Collect up to date, reliable information • Review teams as teams • Collect feedback via self-assessments, 360 degree and manager reviews
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand
Published By: NetShelter - YouSendIt     Published Date: Dec 02, 2011
In this white paper, find out how to improve mail server performance and boost user productivity by integrating a secure, cloud-based solution
Tags : 
issues, exchange, migrating, mail server, performance, productivity, integration, cloud
    
NetShelter - YouSendIt
Published By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008
As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.
Tags : 
digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki
    
ARX (Algorithmic Research)
Published By: YouSendIt     Published Date: Oct 26, 2011
Mail server management is a balancing act between server performance and user satisfaction. In this white paper from Osterman Research, find out how to improve mail server performance and boost user productivity by integrating a secure, cloud-based file sharing solution into your Microsoft Exchange migration. In addition, learn why integration plays a key role, and how choosing a solution that works seamlessly with Outlook can support how users want to communicate, while reducing the burden on IT. The Osterman white paper is offered courtesy of YouSendIt, the first business content collaboration service to offer an integrated approach for sending, sharing and signing documents online. Download the white paper.
Tags : 
yousendit, technology, email, exchange, windows. osterman research
    
YouSendIt
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
    
Trend Micro, Inc.
Published By: Citrix Online     Published Date: Jun 09, 2010
This white paper explores the benefits and ROI of online training and takes an in-depth look at how two innovative companies successfully implemented Web-based training.
Tags : 
citrix gototraining, web-based training, roi, elearning, customer training
    
Citrix Online
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: IBM     Published Date: Oct 01, 2012
Despite advances in technology, paper forms abound. But paper-based forms are time intensive and error prone. As a result, customers become frustrated with the increased cycle times and drained administrative resources.
Tags : 
e-forms, electronic forms, process automation, content management, data collection
    
IBM
Published By: McAfee     Published Date: Nov 12, 2014
This white paper describes a wide range of Internet-based attack methods and explains how Web Protection technology protects against them.
Tags : 
secure web gateway, web protection, gateway anti-malware engine, advanced threat defense, application control, security, it management
    
McAfee
Published By: RingCentral     Published Date: May 14, 2013
There has never been a better time to shop for a new phone system, due to the growing number of service and equipment options. In today's competitive environment, businsses are looking for ways to lower expenses, eliminate multiple vendors and communication providers, refocus IT staff on other areas of business, and allow employees to easily connect regardless of location and device. Read this white paper to learn what the benefits of cloud based telephony are.
Tags : 
benefits of cloud based telephony, cloud based telephony, benefits of cloud telephony, it staff, ringcentral
    
RingCentral
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing, enterprise applications, data center
    
Intralinks
Published By: IBM     Published Date: Apr 29, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, ibm security services, cyber security, cyber security intelligence index, financial services, threat landscape, security, it management
    
IBM
Published By: IBM     Published Date: Nov 05, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.