Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

post it

Results 51 - 75 of 245Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirés, utilisent des outils automatisés pour puiser des informations sur leurs cibles dans les profils — souvent publics — disponibles sur les médias sociaux. Ils savent donc où vous travaillez. De même, le poste que vous occupez, vos centres d'intérêt, vos loisirs, votre situation matrimoniale ou encore vos précédents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour élaborer des messages convaincants qui vous incitent à cliquer sur une pièce jointe ou une URL malveillante. Si vous tombez dans le piège, une charge active malveillante est injectée dans votre système.
Tags : 
phishing, malware, des individus pris pour cible
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Tomber dans le piège tendu par un imposteur est plus facile qu'il n'y paraît. Imaginez le scénario suivant : vous travaillez pour une importante société qui a récemment procédé à plusieurs acquisitions. Votre travail consiste à régler les factures. Un matin, vous recevez un message de votre PDG actuellement en déplacement. Il vous demande de virer des fonds afin de pouvoir entamer les négociations de rachat d'une nouvelle entreprise et vous exhorte de garder l'information pour vous jusqu'à la conclusion de l'accord.
Tags : 
directeur opérationnel, directeur financier, ressources humaines, service financier, gestion des salaires
    
Proofpoint
Published By: Gigamon     Published Date: Feb 20, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies
Published By: Skillsoft     Published Date: Aug 26, 2016
What changes are coming as the next generation emerges? Gen Z is the post-Millennial generation and brings a new level of social connectedness, more opportunities for education, and increased economic engagement. What does this mean for businesses, markets and educational institutions? Disruptive invention and reinvention will become the norm. Learn why it’s time to eliminate generational rifts and embrace the changes that Gen Z will bring to business. The Gen Z Effect will help your organization stay current, competitive and relevant to thrive in a world of accelerating change. Download the book summary.
Tags : 
gen z, generation z, millennials, generation, baby boomer, enterprise applications
    
Skillsoft
Published By: ServiceNow     Published Date: Mar 13, 2019
The move to multicloud and DevOps comes complexity and accelerated development cycles. IT operations is being hindered by the lack of visibility between clouds and on-premise resources. Multicloud capabilities need to enable operations to move to a proactive posture, have end to end visibility, and operation at scale. Get the IDC brief to learn more.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: May 14, 2019
The move to multicloud and DevOps comes complexity and accelerated development cycles. IT operations is being hindered by the lack of visibility between clouds and on-premise resources. Multicloud capabilities need to enable operations to move to a proactive posture, have end to end visibility, and operation at scale. Get the IDC brief to learn more.
Tags : 
    
ServiceNow
Published By: Gigamon     Published Date: Dec 13, 2018
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 28, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Download complete case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Fujitsu     Published Date: Feb 26, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
public, safety, mobile, solutions, police, fujitsu
    
Fujitsu
Published By: RelayHealth     Published Date: Apr 01, 2013
Statements can be a great opportunity to improve the patient experience and expedite collections, or they can lead to frustrated patients, lower self-pay revenue and increased bad debt. As pioneers of the healthcare industry’s patient-friendly initiative nearly 10 years ago, RelayHealth continues to research and innovate. Its most recent patient focus group provided input on how statement design impacts their satisfaction with the hospital, post-discharge experience and willingness to pay. Learn the critical components to creating patient statements that get results and help compel patients to pay: Download the 10 Keys to Creating Engaging Patient Statements today.
Tags : 
statements, patient statements, healthcare, collection, patient experience
    
RelayHealth
Published By: RelayHealth     Published Date: Apr 01, 2013
Many hospitals are implementing patient engagement strategies to help improve care outcomes and engaging financially with patients can also yield significant benefits for patients and providers. Financial patient engagement includes educating and communicating with patients at every point in the revenue cycle – pre-service, point of service and post-service – to facilitate higher collections and help improve patient satisfaction. Because these points in the revenue cycle stretch across many departments such as patient access, financial services, call centers and third-party collection agencies, a single, integrated solution that connects all parties involved and provides comprehensive data is critical.
Tags : 
healthcare, patient engagement, financial, collection, revenue, revenue cycle management, patient satisfaction
    
RelayHealth
Published By: MarkLogic     Published Date: May 16, 2017
Getting data from today’s television and film production and post-production workflows may seem like you’re moving through molasses. Mired in manual processes, attempting to manage and automate data during the creation stage of your content’s lifecycle can sometimes feel like a losing battle as the demands of creatives constantly move forward. Hear Lulu Zezza, Physical Production Executive for New Regency Productions, Matt Turner, Media & Entertainment CTO, MarkLogic, and Guy Finley, Executive Director, Media & Entertainment Strategic Alliance (MESA) as they discuss: o Metadata’s value and its evolution, beyond delivery and experiences, to harnessing critical production data o Results of taking a new approach to bring this data together with context and meaning that impacts other business unit roles o How the New Regency team created a software driven production data hub that is enabling creatives to work seamlessly on the project, in a comfortable UI/UX driven environment, with e
Tags : 
    
MarkLogic
Published By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : 
post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management, best practices, advanced persistent threat, apt, ids, ips, malware, security insight, threat landscape
    
Vectra Networks
Published By: Oracle Oracle Marketing Cloud     Published Date: Oct 20, 2015
Lesen Sie diesen kleinen Guide über was Sie tun können, damit Ihre Webseiten und Whitepaper, Social Posts und Suchmaschinenoptimierung vorbereitet sind Ihrem Publikum den Weg zu zeigen, den es sucht.
Tags : 
targeting, clear targeting, customer engagement, gain audience, customer relationship, modern marketers
    
Oracle Oracle Marketing Cloud
Published By: Rackspace     Published Date: Apr 17, 2018
Controlling cloud costs is a leading challenge for enterprises at each stage of their cloud journey. Fortunately, companies utilizing a public cloud can benefit from the strategic partnership between Google and Rackspace. Google Cloud Platform is a state-of-the-art, cost-friendly public cloud, and Google has selected Rackspace as its first managed services provider for GCP, based on Rackspace’s vast cloud expertise and dedication to a fanatical customer experience. With Managed GCP by Rackspace, companies can maximize their cost savings on Google Cloud while also saving on hiring, training and retaining top talent to operate their cloud operations. In this post we will focus on the ten most significant cost-saving opportunities.
Tags : 
    
Rackspace
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
Something odd happened during Selectica’s roll-up strategy. Usually when a technology vendor acquires a number of providers at relatively low valuations, its focus tends to be on financially engineering the various SaaS, maintenance, upsell and other income schemes from the assets. But in Selectica’s case, the acquired became the basis of the company, in a manner in which the sum of the assets became an entirely different equation that it likely even bargained for before getting into the activity in the first place. But sometimes the uncertainty of post-merger integrations can lead to an outcome that benefits all parties involved (including customers) in ways that would be difficult to have imagined going into the process.
Tags : 
    
Determine (Selectica)
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organization’s security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
    
Carbon Black
Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to analyzing and mitigating the risks of migrating to PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. A key decision criteria for adopting any technology is whether it can support requirements for existing applications while also fitting into longer term strategies and needs. The first section of this eBook provides a detailed analysis of all aspects of migrating from legacy and commercial solutions to PostgreSQL: ? Schema and code migration ? Data migration ? Application code migration ? Testing and evaluation
Tags : 
    
Stratoscale
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to “Day One” challenges of deploying, managing and monitoring PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. An effective monitoring and logging strategy is critical for maintaining the reliability, availability, and performance of database environments. The second section of this eBook provides a detailed analysis of all aspects of monitoring and logging PostgreSQL: ? Monitoring KPIs ? Metrics and stats ? Monitoring tools ? Passive monitoring versus active notifications
Tags : 
    
Stratoscale
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.