Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

report

Results 401 - 425 of 4775Sort Results By: Published Date | Title | Company Name
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: CA Technologies     Published Date: Jun 05, 2014
A report into how an automated lifecycle approach to DevOps supports the agile business
Tags : 
application delivery, high velocity application delivery, devops strategy, service virtualization, release automation, application performance management
    
CA Technologies
Published By: IBM     Published Date: Jul 25, 2012
IBM PureSystems offers highly integrated solutions that can help you deploy and tune applications for cloud architectures with ease. Read the research report to take a deeper look at PureFlex Systems within the PureSystems family and learn how PureFlex Systems can help you streamline management and accelerate client time-to-value with a new integrated and modular system/subsystem.
Tags : 
technology, cloud computing, cloud architecture, storage, management, storage management, ibm puresystems, ibm
    
IBM
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : 
verisign, health, ehr, security, breaches, risks, web-based, information, patient, privacy, confidential, protect, security, healthcare industry
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.
Tags : 
verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication, symantec
    
VeriSign, Inc.
Published By: NAVEX Global     Published Date: Oct 18, 2016
This report aims to help you identify the compliance program you have in place, how to document your program elements and finally, develop and implement a work plan for addressing gaps.
Tags : 
    
NAVEX Global
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Symantec
Published By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration
    
McAfee
Published By: McAfee     Published Date: Oct 14, 2013
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, network security
    
McAfee
Published By: IBM     Published Date: Sep 27, 2013
Teams of engineers and statisticians spend their days immersed in seas of data from various sources. However, it isn't just the largest of organizations that can benefit from analytics and data-driven decision-making. Businesses of all sizes need to leverage the new currency of data and information.
Tags : 
ibm, ibm business analytics solutions, business analytics, analytics solutions, midsize businesses, financial reporting, business intelligence, desktop data visualizations, data mining
    
IBM
Published By: Trend Micro     Published Date: May 11, 2015
Reports of server-side data breaches and zero-days found for widely used web applications continue have become quite common in recent years.
Tags : 
data center, security, networking
    
Trend Micro
Published By: Trend Micro     Published Date: May 15, 2015
Reports of server-side data breaches and zero-days found for widely used web applications continue have become quite common in recent years.
Tags : 
    
Trend Micro
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
Organizations must be able to extend the boundaries of their corporate network to provide consistent Web security protection, policies and reporting for all users on any device or network.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: Concur     Published Date: Jan 14, 2013
Where was the most popular place worldwide for business travelers to dine out, drive in or hang their hat in 2011? This report reveals where travelers are spending money, where they aren’t, and what the state of the industry is at home and abroad.
Tags : 
business expense, cloud expense management, cloud expense reporting, expense best practices, expense management, expense management best practices, expense management report, expense management research, expense management study, expense report software, expense reporting, expense research, expense software, t&e best practices, t&e report, travel expense management, travel expense software, travel expense cloud, mobile expense management, mobile expense
    
Concur
Published By: Abacus Labs     Published Date: Jul 25, 2018
We’ve all been there: staring at a pile of receipts at the end of a business trip, dreading the process of filling out a report just to get your money back. Wouldn’t it be great if all your expenses automatically entered into the system and you got reimbursed the next day? At Abacus, we thought so too. Meet real time expense reporting.
Tags : 
abacus, sales, report, system
    
Abacus Labs
Published By: Zycus     Published Date: Nov 30, 2009
If the go-go 1990s, with its fast money and flush credit seeking rapid and steep returns, created the demand for "renaissance" Chief Financial Officers ("CFO"), who could manage (and market) both the strategic and financial operations of the enterprise, the more sobering decade that followed led directly to the creation and subsequent rise of the Chief Procurement Officer ("CPO"), who could reduce costs, build internal relationships, and develop strategic suppliers efficiently and effectively.
Tags : 
zycus, cfo, chief financial officer, procurement, chief procurement officer, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement
    
Zycus
Published By: Zycus     Published Date: May 01, 2009
The global recession is taking no prisoners. Neither industry, nor region, nor company-size has provided shelter from its impact. Within the enterprise, few business functions have been unaffected. Yet, as this business downturn continues, the Chief Procurement Officer's ("CPO") agenda and the CEO's agenda have started to converge.
Tags : 
zycus, recession, downturn, procurement, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement, strategic procurement
    
Zycus
Published By: Oracle     Published Date: Apr 29, 2014
Cash forecasting in an extremely important process that organizations must execute effectively in order to succeed. Since cash is the lifeblood of a business, business leaders must know how much cash is going to be available to the organization at any given time. Download this white paper to learn more!
Tags : 
oracle, cash forecasting, cash, available cash, modern business approach, cash management, enterprise applications
    
Oracle
Published By: Oracle     Published Date: Oct 29, 2015
The rise of the empowered customer has converged B2B and B2C e-commerce. Despite similarities in the challenges faced by firms in both categories, B2B firms differentiate themselves by using content as a key lever to help buyers do their jobs. This report provides an overview of how B2B and B2C commerce are converging and what B2B firms must do to better interact with today’s business buyers.
Tags : 
oracle, aberdeen convergence brief, b2b, b2c commerce, networking, enterprise applications
    
Oracle
Published By: Oracle     Published Date: Apr 29, 2014
It is common belief that automation of existing processes and implementation of an Enterprise Resource Planning (ERP) system can help organizations with their strategic objectives and seamlessly translate into operational excellence. While a modern ERP system certainly provides companies with many benefits, it does not necessarily translate to optimal business performance.
Tags : 
oracle, policy compliance, erp, enterprise resource planning, business performance, automation, continuous monitoring, enterprise applications
    
Oracle
Published By: Oracle     Published Date: Apr 29, 2014
Many enterprises contend with fragmented systems and processes. Mergers and acquisitions have increased the number of organizations with disparate systems and business units. Download this white paper to learn how to achieve and integrated accounting platform.
Tags : 
oracle, accounting platform, mergers and acquisitions, disparate systems, fragmented accounting, enterprise applications
    
Oracle
Published By: Epicor     Published Date: Jul 05, 2012
An ERP strategy is not just for implementing ERP, it is critical factor in operating your ERP at peak efficiency. Just like you maintain your ERP system, you must maintain your ERP strategy.
Tags : 
erp, aberdeen group, manufacturers
    
Epicor
Published By: Epicor     Published Date: Aug 03, 2012
The capabilities that enterprise resource planning (ERP) systems enable in wholesale and distribution have a wide umbrella of influence throughout an organization. Using ERP data to make better business decisions while cutting your costs is only one
Tags : 
wholesalers, distributors, erp capabilities, cross functional teams, full visibility, operations, transactions, technology aids, erp modules, erp extentions, measurement, optimization, measurable benefits, social media
    
Epicor
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.