Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ssm

Results 451 - 475 of 555Sort Results By: Published Date | Title | Company Name
Published By: Rapid7     Published Date: Oct 09, 2013
Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.
Tags : 
gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection, network security
    
Rapid7
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
McAfee
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
    
McAfee
Published By: EMC Corporation     Published Date: Oct 16, 2013
How effective is your backup? Think you have got it all covered – think again! Answering 3 questions just might reveal what you don’t know you are missing… Put your backup to the test now!
Tags : 
backup environment, emc. transformation, customer profiling, best practices, technology, assessment tool
    
EMC Corporation
Published By: SugarCRM     Published Date: Jan 17, 2014
The latest release of SugarCRM’s flagship product gives users new tools to build extraordinary customer relationships. Read an in-depth analysis of SugarCRM’s enhanced ability to help companies execute their customer-facing initiatives from Ovum, a leading technology research firm.
Tags : 
swot assessment, sugarcrm, catalyst, software, crm, sugarcrm v7, relationship management, customer relationship
    
SugarCRM
Published By: SpectorSoft     Published Date: Apr 03, 2015
You just got news of yet another issue that just happened in your business that now you need to deal with – it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. Especially in cases of data theft, fraud, embezzlement, etc., having detail on everything the employee did leading up to the purported “bad deed” will be critical in determining whether something improper occurred or not.
Tags : 
sexual harrassment, embezzlement, employee investigations, human resource technology
    
SpectorSoft
Published By: Symantec     Published Date: Aug 09, 2013
PassMark Software conducted objective performance testing on six Enterprise Endpoint Security products. Benchmarking was performed using sixteen performance metrics to assess product performance and system impact on the endpoint or client machine. Download the report to find out results from these performance tests. Download Now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Citrix     Published Date: Sep 10, 2013
This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of many client virtualization software vendors.
Tags : 
citrix, xendesktop, virtualization, virtual desktop, idc study, virtualization software, independent research
    
Citrix
Published By: AvePoint     Published Date: Mar 07, 2013
This assessment helps organizations identify sensitive or regulated content and develop a best practices approach to separate that content or workloads, and subsequently migrate appropriate content to the cloud.
Tags : 
cloud readiness, cloud, avepoint, sharepoint, cloud implementation, cloud migration, moving to the cloud, it management
    
AvePoint
Published By: Viavi Solutions     Published Date: Sep 30, 2016
Organizations planning to migrate all or a portion of their applications or services to a public cloud environment will benefit from the experiences of early adopters. As a leader in hybrid IT monitoring, Viavi Solutions® has been involved at all stages of the cloud-migration life cycle: during assessment, implementation, and after deployment. Based on Viavi’s and our technology partners’ experience and many conversations with customers, prospects, and others in the industry, this white paper offers insight into 6 key questions regarding cloud adoptions: 1. Why Migrate 2. What to Migrate 3. What are the Steps to Cloud Migration 4. When to Migrate 5. Where to Migrate 6. Who to Ask for More Help
Tags : 
    
Viavi Solutions
Published By: IBM     Published Date: Aug 21, 2013
Have you ever found yourself in this untenable position? Your web team and email program owners are targeting the same customers, with different offers, or worse, competing offers. Siloed systems and teams limit marketers’ ability to make sound assessments about performance and spending. Marketers around the world spend over one trillion USD each year. Yet, most of them still manage their marketing programs with a hodgepodge of spreadsheets and disconnected applications. Unnecessary costs, delays and poor collaboration plague marketers. Under increasing pressure to connect with customers while doing more with less, marketers who strive to optimize marketing performance through a single integrated software platform can make the best use of people, programs and resources. Today, you need a return on every dollar spent and a platform that aligns technology, people and processes to help create effective, efficient marketing programs that support customers for life.
Tags : 
enterprise marketing management, marketing management, marketing roi, marketing connections, marketing performance, return on investment, marketing optimization
    
IBM
Published By: NetProspex     Published Date: Nov 04, 2013
How clean & actionable your B2B marketing database is today? Analyze your data with this free, secure cloud based assessment of your email deliverability, phone connectability, record completeness, duplication, target profile breakdown and more.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database list, marketing database services
    
NetProspex
Published By: HP     Published Date: Apr 13, 2014
Learn how Isbank, Turkey’s largest bank, dramatically reduced testing times for Functional Testing automation from 6 man-days to a few hours. Read about the benefits of adopting an Application Lifecycle Management approach to improve software quality, automate testing processes and safeguard mission-critical applications while supporting growth.
Tags : 
application lifecycle management, application development, application testing, enterprise release management, financial services, functional testing, hp application, hp loadrunner
    
HP
Published By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : 
fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack
    
Fireblade
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : 
alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
Palo Alto Networks
Published By: HubSpot, Inc.     Published Date: Jan 31, 2012
Receive a free marketing assessment from HubSpot today and learn how you can drive more leads and more sales!
Tags : 
seo, email marketing, blogging, ppc, marketing software, social media, lead management, email automation
    
HubSpot, Inc.
Published By: Dex     Published Date: Jul 09, 2013
Keep Marketing Simple. Get Found and be Chosen in 2013: In today’s complicated marketing landscape, you need to ensure that your business name appears when and where local customers are looking.
Tags : 
dex, free assesment, marketing, marketing landscape, free and easy assessment, consumer behavior, local customers
    
Dex
Published By: IBM     Published Date: May 07, 2015
Hurwitz & Associates announced the findings of its inaugural Victory Index for predictive analytics. This assessment highlights both the diverse uses of predictive analytics and vendors who make those applications.
Tags : 
predictive analytics, data sources, vendor selection, data mining
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : 
ibm, requirements management, risk analysis, conformance assessments, addressing complexity, manage requirements, manage compliance, it management
    
IBM
Published By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : 
hackers, information technology, symantec, verisign, web applications, security, network security
    
Symantec
Published By: NAVEX Global     Published Date: Dec 22, 2017
Knowing which steps to take to ensure your organisation remains vigilant against bribery and corruption is an important move. When your organisation is aligned on anti-bribery and corruption policy, training and third party risk, your employees can identify, report and ultimately stamp out—bribery and corruption. Our Solutions Experts can help you strengthen your most challenging ABC issues and better protect your organisation. Contact us to set up a consultation today at info@navexglobal.com.
Tags : 
anti-bribery programme, anti-bribery and corruption, corruption risk assessment, anti-bribery checklist, preventing anti-bribery, corruption assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 22, 2017
Assessment is part of your compliance programme’s necessary life cycle for improvement. We work in an ever-evolving landscape of risk that requires compliance professionals to identify the gaps their programmes have today, and may have tomorrow. Your programme effectiveness as a whole is based on the effectiveness of each one of its parts. So, ensure your assessment is broad as well as in-depth. Programme assessment is not a tick-the-box exercise. It is just as important as creating a company culture and mitigating risk. Remember, if your assessment is thorough and effective, you will have identified weaknesses in your programme and vulnerabilities for risk. Don’t be discouraged by your work to highlight these areas for improvement. Your programme and your organisation will be better for it once you make the necessary adjustments for a robust and effective ethics and compliance programme.
Tags : 
compliance programme, compliance, programme assessment, definitive guide, improving compliance, ethics and compliance, programme awareness, anti-bribery awareness
    
NAVEX Global
Published By: AlienVault     Published Date: Aug 12, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.