Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

isolation

Results 1 - 25 of 40Sort Results By: Published Date | Title | Company Name
Published By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Here’s a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of today’s reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Magento     Published Date: Feb 13, 2018
Commerce is permanently altering the way B2B businesses work- from customer acquisition to customer retention, and from order fulfillment to building a relationship with customers. From our experience of working with B2B companies across industries, we have curated a list of 11 most common obstacles to B2B eCommerce success, including: Thinking About eCommerce In Isolation Ignoring Customer Experience No Advanced Analytics Failure Maintain and Improve Systems
Tags : 
    
Magento
Published By: Menlo Security     Published Date: Nov 19, 2019
"Leading Secure Cloud Transformation as a Visionary in the Secure Web Gateway (SWG) Landscape Gartner has recognized Menlo Security as a Visionary again in the 2019 Magic Quadrant for Secure Web Gateways (SWG). Our vision of Secure Cloud Transformation powered by isolation provides the most secure way for enterprises to replace expensive, on-premises security appliances with a global security cloud. The Menlo Security Cloud Platform stands out in the industry since it is the only cloud security platform with an Isolation Core™. The Menlo Security Cloud Platform allows enterprises to embrace Secure Cloud Transformation. Powered by our patented isolation technology, the global platform provides secure direct access to an architecture designed for SaaS applications. This cloud-native architecture is elastic and auto scales security and throughput for seamless on-demand growth in the number of users, devices, and applications, while providing 100% protection from malware and phishing at
Tags : 
    
Menlo Security
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
In September 2012, the New York City Board of Health approved a measure to ban the sale of large sodas and other sugary drinks in restaurants, movie theaters, sports arenas and street carts in a first of its kind restriction in the US. At the forefront of this measure was Mayor Michael Bloomberg. The mayor noted that 6,000 New Yorkers die every year from obesity-related illness. Some ethnic groups in the city have rates of overweight and obesity approaching 70 percent of adults. African-American New Yorkers are three times as likely, and Hispanic New Yorkers twice as likely, as white New Yorkers to die from diabetes.1 Is this social policy run amuck? Is it, as some have suggested, an infringement on individual rights? Or is it simply recognition that health issues cannot be treated in isolation from the many other factors that affect an individual’s or a community’s health?
Tags : 
    
Group M_IBM Q119
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Oracle     Published Date: Dec 13, 2011
One of the biggest dangers in establishing best practices for your contact center is to do so in isolation from your self-service stakeholders.
Tags : 
best practices, customer, crm, contact center, face-to-face, performance indicators
    
Oracle
Published By: Oracle     Published Date: Apr 05, 2013
One of the biggest dangers in establishing best practices for your contact center is to do so in isolation from your self-service stakeholders. Instead, all customer "touch-points" must be viewed as part of a continuum. Customer touch points include Web Self-Service, Interactive Voice Response, Contact Center Agents, and Face-to-Face transactions. By tracking the interplay between these, you can more easily identify meaningful key performance indicators.
Tags : 
contact center, oracle, call center, touch point methodology, face to face, contact center agents
    
Oracle
Published By: Recom     Published Date: Feb 06, 2009
“Medical grade DC/DC converters” is an often used, but more often abused, description of a class of converters that are increasingly in demand. What are actually the particular requirements that medical applications place on DC/DC converters?
Tags : 
recom, dc/dc converters, medical applications, dc/dc transformer, recom datasheets, isolation
    
Recom
Published By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
    
CheckMarx
Published By: Symantec     Published Date: Dec 13, 2017
This paper explores in more detail how you can use complementary application isolation and antimalware capabilities, delivered by Symantec Endpoint Protection, to achieve a more holistic, layered approach to your security, without sacrificing productivity.
Tags : 
defenses, symantec, endpoint, protection, application, holistic, security, antimalware, isolation
    
Symantec
Published By: Schneider Electric     Published Date: Sep 17, 2018
This on demand webinar contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs.
Tags : 
fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 08, 2018
This paper contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs.
Tags : 
fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
    
Schneider Electric
Published By: Schneider Electric     Published Date: Mar 06, 2018
"This paper contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs."
Tags : 
fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
    
Schneider Electric
Published By: Menlo Security     Published Date: Nov 11, 2019
"Digital Transformation Is Changing How Enterprises Provide Secure Web Access to Users. According to Gartner, “Digital business and edge computing have inverted access requirements, with more users, devices, applications, services, and data located outside of an enterprise than inside.” A New Approach to Enterprise Security in the Cloud Is Needed. Gartner recommends, “Complexity, latency and the need to decrypt and inspect encrypted traffic once will increase demand for consolidation of networking and security-as-a-service capabilities into a cloud-delivered secure access service edge (SASE, pronounced “sassy”).” This new approach requires an Internet isolation solution that: - Provides 100 percent malware-free email and web browsing - Preserves the native email and web browsing experience - Gives users ubiquitous yet secure access wherever they work Menlo already offers the solution that delivers on Gartner’s vision of network security in the cloud. Find out more by downloading t
Tags : 
    
Menlo Security
Published By: Hamilton Captel     Published Date: May 15, 2019
Many studies have linked hearing loss to serious conditions, such as cognitive decline, Alzheimer’s disease, clinical depression, diabetes, heart disease and more. These linkages are often referred to as comorbidities—the simultaneous presence of two or more chronic conditions in an individual. The white paper by Harvey Abrams, Ph.D., focuses on the research literature surrounding seven comorbid conditions associated with hearing loss: social isolation, depression, increased risk of falling, cardiovascular disease, diabetes, dementia and even mortality.
Tags : 
    
Hamilton Captel
Published By: Oracle     Published Date: Mar 07, 2019
Our research reports on the 2,000 executives from the marketing community, across 22 markets, who agreed that innovation drives growth. However, barriers to innovation remain significant, ranging from isolation within the business, to a lack of insight into the data, and absent support from leadership in 24% of cases, and data remains the second largest issue for marketing with a 10% gap. New technologies help harness data, demonstrate how innovation will benefit teams and businesses, and help CMOs create a successful innovation agenda. Read the report
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 22, 2019
Our research reports on the 2,000 executives from the marketing community, across 22 markets, who agreed that innovation drives growth. However, barriers to innovation remain significant, ranging from isolation within the business, to a lack of insight into the data, and absent support from leadership in 24% of cases, and data remains the second largest issue for marketing with a 10% gap. New technologies help harness data, demonstrate how innovation will benefit teams and businesses, and help CMOs create a successful innovation agenda. Read the report
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 13, 2019
Our research reports on the 5,000 executives from the marketing community, across 24 markets, who agreed that innovation drives growth. However, barriers to innovation remain significant, ranging from isolation within the business, to a lack of insight into the data, and absent support from leadership in 24% of cases, and data remains the second largest issue for marketing with a 10% gap. New technologies help harness data, demonstrate how innovation will benefit teams and businesses, and help CMOs create a successful innovation agenda. Read the report
Tags : 
    
Oracle
Published By: Menlo Security     Published Date: Jun 01, 2018
"According to Gartner, ""by 2022, 25% of enterprises will adopt browser isolation techniques for some high-risk users and use cases, up from less than 1% in 2017.” ""By effectively isolating endpoints from browser-executable code, attacks that compromise end-user systems will be reduced by 70%, while eliminating the need to detect or identify malware."" -Gartner What do these organizations know that you don’t? Learn more about why Gartner believes this to be true in this report."
Tags : 
    
Menlo Security
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
With the viability and importance of cloud computing now widely accepted by IT and business leaders alike, the focus of planning, discussion and implementation has shifted to the best approaches for using cloud computing to achieve the all important business goals of agility, flexibility and efficiency. From an architectural standpoint, most organizations have embraced some combination of public and private clouds — sometimes in isolation, other times in concert. But increasingly, large and small organizations alike are taking steps toward the next wave of cloud architecture: hybrid clouds.
Tags : 
private cloud, public cloud, hybrid cloud, cloud computing
    
Dell & Microsoft
Published By: Menlo Security     Published Date: Nov 12, 2019
"Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach. Identified by Gartner as ""one of the single most significant ways to reduce web-based attacks,"" remote browser isolation has become an important line item in IT budgets around the world. But not all Isolation is created equal. With so many offerings how do you weed through the noise? Learn: - Why remote browser isolation technology adoption is on the rise - Key use cases for Isolation that should be evaluated - 3 critical requirements when selecting a practical browser isolation solution"
Tags : 
    
Menlo Security
Published By: Lawson     Published Date: Jun 23, 2008
Managing and maintaining your key assets throughout their entire lifecycle is critical to your organizations success. Rather than looking at each part of the asset's lifecycle in isolation or only focusing on the operational phase, your asset management solution should enable a more holistic view. It should help you manage the entire cycle.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management
    
Lawson
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: IBM     Published Date: Aug 21, 2013
In many enterprises, marketing is a multichannel effort that includes a wide range of touch points. The touch points range from websites and email promotions to traditional print advertising, postal mail, and broadcast, and direct sales by phone and in-person sales teams. But too often, each channel works independently, accountable to its own objectives, unaware of the efforts and results made within other marketing channels. As a result, call centers speak to customers without knowing the offers the customers previously accepted or rejected. In addition, emails launch without reference to online promotions and websites present messages that disregard their visitors’ previous contact history.
Tags : 
cross channel marketing, customer communications, interactive marketing, multi-channel marketing, sales, multichannel, communications, email marketing, customer relationship management, crm, telecom
    
IBM
Published By: IBM     Published Date: Oct 15, 2013
Cross-channel marketing is no longer an ideal to strive for, but a practical reality you can achieve. However, technology is never the whole answer.
Tags : 
isolation, integration, cross-channel customers, customer communication, ibm, right marketing technology, marketing approach, better targeting, increase efficiency, customer loyalty, click-throughs from emails, banner ads, ppc campaigns, adwords, online applications, enterprise applications
    
IBM
Previous   1 2    Next    
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.