Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

resilience

Results 76 - 100 of 129Sort Results By: Published Date | Title | Company Name
Published By: HPE APAC     Published Date: Jun 16, 2017
This white paper examines the various threats faced by mid-sized businesses and explains why a comprehensive approach to protection and resilience makes good business sense, and helps IT managers benchmark their companyís security posture against their peersí.
Tags : 
    
HPE APAC
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Fugue     Published Date: Mar 27, 2017
Directed at cloud architecting concerns, this paper covers streamlining complexity at scale, knowing infrastructure state, and using easily repeatable patterns that bolster security, compliance, and disaster recovery. Get this white paper now.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration
    
Fugue
Published By: Rizepoint     Published Date: Feb 13, 2017
Consumers and other stakeholders increasingly want to know where their products come from and how they are produced. A successful Responsible Sourcing program strengthens the corporate brand by making it more predictive and adaptive to changing market needs and helping the company develop resilience, mitigate risk, improve efficiency, and better manage supplier relationships. Download this complimentary guide to read about key concepts and principles that apply to virtually any organization when managing Corporate's Responsible Sourcing guidelines, and ensuring franchisee compliance for protection of your brand and commitment.
Tags : 
    
Rizepoint
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
This eBook provides an overview of the science behind mindfulness meditation and highlights why itís captured the attention of top executives across the globe. Itís intended for people who are not only interested in the health and performance benefits of mindfulness, but also want the proof points... just like us.
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep
    
Whil Concepts, Inc.
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
This Best Practices Guide shares how to successfully add mindfulness training to your current wellness program to make employees happier, more focused and more productive. It also provides insights from survey results compiled over 6 months in conversations with 56 companies, including 30 Fortune 500 brands.
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep
    
Whil Concepts, Inc.
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
Download these case studies to learn how Whil was able to increase employee satisfaction and decrease employee turnover by introducing mindfulness in the below organizations: Global fashion retailer City government Technology University Leading non-profit Production company Global advertising agency
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep
    
Whil Concepts, Inc.
Published By: Kaminario     Published Date: Aug 23, 2016
Your three essential tips for building a smarter, more resilient storage strategy.
Tags : 
kaminario, flash, performance, storage, application performance, resilient, networking, enterprise applications
    
Kaminario
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: IBM     Published Date: Feb 26, 2016
Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.
Tags : 
cloud hosting, ibm, integration, cloud computing, data centers
    
IBM
Published By: IBM     Published Date: Jan 26, 2016
Read this white paper to learn why forward-thinking business and technology leaders are turning to B2B integration and collaboration solutions to get the speed, agility, high-availability and resilience they need.
Tags : 
ibm, b2b, collaboration, integration, agility, solutions, enterprise applications
    
IBM
Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, itís no longer a question of Ďifí but Ďwhení theyíll be attacked.. If youíre like most financial institutions, you have controls that identify breaches, but need proper procedures thatíll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systemsí VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIECís cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack
    
BAE Systems
Published By: Resilient Systems, Inc.     Published Date: Nov 25, 2015
How does your businessís cyber resilience compare to other European organisations?
Tags : 
resilient, incident response, enterprise, security, enterprise applications, networking, it management
    
Resilient Systems, Inc.
Published By: Riverbed     Published Date: Jul 21, 2015
IT organizations have been evolving their WAN connectivity strategies to align with new IT cost, resilience, and performance objectives. Hybrid WAN is a growing trend with many organizations and enterprises, enabling them to augment traditional private leased lines or MPLS-based WAN circuits with secured public Internet services to achieve their goals. Riverbed takes a holistic, application-centric approach to solving the challenges of hybrid architectures. Read how SteelHead's hybrid architecture simplifies the laborious aspect of operating in a hybrid WAN environment.
Tags : 
hybrid enterprise, app performance, wan connectivity, hybrid wan, application-centric, it management
    
Riverbed
Published By: IBM     Published Date: Jul 07, 2015
This white paper describes the pervasive lack of resiliency planning in most cloud implementations today and discusses how better up-front assessment and planning can help organizations realize the enormous potential cloud offers for improved, more agile resiliency.
Tags : 
ibm, resilience, cloud, design, sustain, enterprise applications
    
IBM
Published By: IBM     Published Date: Jun 16, 2015
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools
    
IBM
Published By: IBM     Published Date: Jun 16, 2015
Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.
Tags : 
cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security
    
IBM
Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security
    
Cisco
Published By: IBM     Published Date: Jan 09, 2015
Every organization must put a plan in place for recoverability after an outage, but testing your enterprise resilience without full business and IT validation is ineffective. Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery ďsimulationsĒ are inadequate and misleading; understand why validating resilience demands involvement from IT and the business; and get details on the checks and balances you need to maintain and validate business resilience.
Tags : 
resiliency testing, it validation, business resilience, small-scale recovery simulations, it management, enterprise applications
    
IBM
Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
The top ten tips on how to secure your business against cyber risk and threats.
Tags : 
tips for cyber resilience
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.