Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 2401 - 2425 of 2642Sort Results By: Published Date | Title | Company Name
Published By: TDi Technologies     Published Date: Aug 16, 2011
Configuration ports on critical and non-critical cyber assets are often misunderstood and overlooked in the overall cyber security strategy.
Tags : 
    
TDi Technologies
Published By: TE Connectivity     Published Date: Feb 23, 2018
In our increasingly connected world, quality, reliability and consistency matter a great deal, particularly in the context of the smart home ecosystem. The antennas, connectors, relays, sensors, switches, terminals and tubing inside these devices play critical roles in the product’s ultimate functionality. If you don’t focus on the right components or choose the wrong or incompatible ones, then device reliability becomes an issue.
Tags : 
    
TE Connectivity
Published By: Tealium     Published Date: Feb 20, 2015
Is Your Marketing Headed Down The Right “Path”? Download our free Econsultancy study, “The Path to Unified Marketing,” (value: $695) to learn why nearly 50 percent of marketers consider obtaining a single view of the customer journey critical to their success.
Tags : 
tealium, marketing, technology, data, advertising, digital, fragmented data, unification, distributed computing, cloud computing
    
Tealium
Published By: TeamQuest     Published Date: Mar 04, 2013
Virtualization and cloud architectures can actually make it harder to deliver consistent performance to critical applications. Best practice performance management can help IT virtualize applications that require guaranteed performance.
Tags : 
virtualization, network, performance, cloud, cloud computing, enterprise applications
    
TeamQuest
Published By: Technomedia-Hodes iQ     Published Date: Apr 25, 2012
Get your complimentary copy now! The Importance of Alignment in Employee Performance Management white paper examines the critical relationship between goal alignment and employee performance and their impact on business initiatives and the company's talent management strategies.
Tags : 
human resources, hr management, talent management, performance management, employee performance
    
Technomedia-Hodes iQ
Published By: Technomedia-Hodes iQ     Published Date: Jul 03, 2012
Designing a sustainable business process continuum that starts with sourcing and recruiting and continues through to succession planning means the interactions between the processes can be identified and linked.
Tags : 
talent acquisition, human resources, hr management, talent, succession, development
    
Technomedia-Hodes iQ
Published By: Telx     Published Date: Dec 09, 2014
CIOs are on a constant quest to understand what infrastructure will provide the best fit, at the lowest risk and cost. In today’s evolving data center, defining the proper use of data center assets, and how cloud-based platforms may or may not fit into the mix is critical to business success. With the abundance of cloud offerings in the market place, physical infrastructure is no longer an enterprise IT requirement. Cloud has established itself as an excellent option for infrastructure outsourcing.
Tags : 
telx, data center, network architecture, infrastructure, storage, data center costs, power and cooling, energy, servers, data center design and management
    
Telx
Published By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts, ebook
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Aug 15, 2018
"What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale."
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"The latest report from Tenable Research analyzes vulnerability prevalence in the wild, highlighting the cyber threats that security practitioners are dealing with in practice – not just in theory. Our research shows that enterprises must triage more than 100 critical vulnerabilities a day. To better understand where to focus remediation efforts, you need to find out how cyber defenders are actually acting. Download the report now to: -See why CVSS is an inadequate prioritization metric – and why you must prioritize vulnerabilities based on actual risk -Discover vulnerability trends in the ever-expanding attack surface -Learn whether your organization has one of the most common vulnerabilities (some are more than a decade old!)"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"With the number of vulnerabilities on the rise, and their severity increasing, how can you identify the biggest cyber threats to your business – and know what to fix first? Download the “3 Things You Need to Know About Prioritizing Vulnerabilities” ebook now to: -Discover the 3 critical steps to building an effective vulnerability remediation plan -Explore the pitfalls of popular prioritization approaches -Learn next steps you can take today to dramatically reduce the list of vulnerabilities you need to remediate If you’re looking for answers to questions like “Where should we prioritize based on risk?” and “Which vulnerabilities are likeliest to be exploited?” this quick read is an excellent way to get started. Download the free ebook now."
Tags : 
    
Tenable
Published By: Teradata     Published Date: Jun 12, 2013
In March of 2011, CFO Research Services conducted a survey among more than 200 senior finance executives primarily in the United States to explore how well companies' information systems are supporting finance executives' ongoing efforts to transform the finance function into a value-added partner to the business. Especially in the aftermath of a worldwide recession, do CFOs and their staffs have the information they need to deliver real business value throughout the organization? How well equipped are they to provide the kinds of critical and useful business analytics that can drive the company forward? Download this paper to learn the findings of our research.
Tags : 
financial analytics, teradata, it complexity
    
Teradata
Published By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
    
Teradata
Published By: Teradata     Published Date: May 02, 2017
even West Media (SWM) is Australia’s leading multiple platform media company with a market-leading presence in broadcast television, magazine and newspaper publishing, and online. To support its unprecedented broadcast of the Rio de Janeiro 2016 Olympic Games, SWM integrated the world’s first production implementation of the Teradata Database running on Amazon Web Services (AWS) into its existing data ecosystem. This enabled the delivery of critical insights during the event and helped directly drive audience engagement with SWM’s digital products, resulting in the creation of a powerful audience asset that that now informs their broadcasting, marketing, and advertising plans. Find out how with in this case study.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Teradata
Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv, customer service, customer satisfaction, texas instruments, remote network management
    
Texas Instruments
Published By: Texas Instruments     Published Date: Nov 06, 2006
Read how the Next Generation Residential Gateway (RG) is capable of supporting the ever increasing need for higher data throughput rates, signaling range that covers the whole house and robustness capable of mitigating the sources of interference found in the home.
Tags : 
bandwidth, residential gateways, bandwidth management, home networking, wireless networking, consumer electronics, texas instruments, network architecture, remote access, remote network management, traffic management
    
Texas Instruments
Published By: Thawte     Published Date: Dec 29, 2015
Colleges and universities secure critical data, optimize certificate management, and gain peace of mind.
Tags : 
education, data, management, security
    
Thawte
Published By: The Ariel Group     Published Date: Jan 25, 2017
There was a time when middle managers were seen as fairly expendable. If you needed to cut costs or eliminate layers, managers were the first to get the axe. The realities of today’s environment are changing that, however. Managers are playing a pivotal role, not just in making sure key tasks get done, but in engaging employees to be more vested in the organization and motivated to contribute their best. As we keep asking people to “do more with less,” step up to new challenges, and embrace new organizational directions, managers are the ones who have the greatest opportunity to influence the actions on the front lines. They are also critical for helping organizations keep and grow top talent, a particular concern as employee disengagement and turnover rates are costing companies billions of dollars annually.
Tags : 
    
The Ariel Group
Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade
    
Third Brigade
Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection, ips, host-based ips, third brigade, security
    
Third Brigade
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade, security
    
Third Brigade
Start   Previous    90 91 92 93 94 95 96 97 98 99 100 101 102 103 104    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.