Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

tables

Results 1 - 25 of 33Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco
Published By: SAP SME     Published Date: Apr 10, 2018
Las empresas de servicios públicos, en respuesta a las presiones competitivas y de los clientes, se están embarcando rápidamente en el cambio hacia la digitalización. Y si bien muchas apenas están comenzando este recorrido, otras están muy avanzadas en el proceso, experimentando con diferentes tecnologías con la esperanza de impulsar las innovaciones para que sean más ágiles, competitivas y rentables dentro de la industria.
Tags : 
    
SAP SME
Published By: Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
Cylance
Published By: Thawte     Published Date: Oct 05, 2015
L’heure est à la sécurisation intégrale de votre site. Face à des attaques de plus en plus fréquentes et faciles à exécuter, les internautes sont plus que jamais attentifs à la capacité des sites à sécuriser leurs données confidentielles. Pour les entreprises intraitables sur les questions de réputation et de protection de leurs clients, Always-On SSL s’impose comme une priorité absolue. Sa mission : protéger les internautes tout au long de leur parcours sur votre site – des recherches aux achats, en passant par le partage d’informations. Pour en savoir plus sur ce dispositif de renforcement de la protection en ligne, téléchargez notre nouveau guide de référence.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection, security
    
Thawte
Published By: Cylance     Published Date: Sep 13, 2017
AV-TEST performed an advanced threat prevention test of enterprise endpoint protection software to evaluate and compare its ability to detect and prevent new and unknown malicious executables.
Tags : 
    
Cylance
Published By: Fujitsu     Published Date: Feb 01, 2018
As schools look to blended learning as a solution to personalize and positively impact student achievement, the need to train and support teachers has become blatantly clear. Thus, districts and schools have allocated scarce resources to the process of onboarding and supporting teachers as new devices such as computers or tables are introduced. However, school leaders and teachers often fail to recognize the need to similarly onboard and support students into new digital environments, instead trusting the inherent technological competencies of the “digital native” student.
Tags : 
digital, native, teachers, leaders, fujitsu
    
Fujitsu
Published By: HP Virtualization     Published Date: Mar 22, 2010
This IDC White Paper presents a detailed analysis of the value proposition associated with moving across different virtualization adoption maturity levels. The following figures and tables compare business value accruing from the move from an unvirtualized environment to a virtualized environment or from a basic virtualization scenario to an advanced virtualization scenario.
Tags : 
virtualization, integrated solutions
    
HP Virtualization
Published By: SAP     Published Date: Jul 17, 2012
Relational database management systems (RDBMSs) are systems of software that manage databases as structured sets of tables containing rows and columns with references to one another through key values. They include the ability to optimize storage, process transactions, perform queries, and preserve the integrity of data structures. When used with applications, they provide the beating heart of the collection of business functions supported by those applications. They vary considerably in terms of the factors that impact the total cost of running a database application, yet users seldom perform a disciplined procedure to calculate such costs. Most users choose instead to remain with a single vendor's RDBMS and never visit the question of ongoing hardware, software, and staffing fees.
Tags : 
sap, infrastructure, database, data management, white paper, management, storage, business functions
    
SAP
Published By: OpenText     Published Date: Aug 19, 2014
A lot of talk is in the marketplace about enterprise software deployment models: on-premises, cloud, hybrid, managed/hosted. The conversation is an important one for every enterprise as it considers enterprise applications. This document is designed to help you evaluate the available deployment options for enterprise fax solutions. It includes easy-to-follow tables that will allow you to build selection criteria based on your organization’s requirements and needs.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, enterprise applications
    
OpenText
Published By: OpenText     Published Date: Aug 19, 2014
A lot of talk is in the marketplace about enterprise software deployment models: on-premises, cloud, hybrid, managed/hosted. The conversation is an important one for every enterprise as it considers enterprise applications. This document is designed to help you evaluate the available deployment options for enterprise fax solutions. It includes easy-to-follow tables that will allow you to build selection criteria based on your organization’s requirements and needs.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, enterprise applications
    
OpenText
Published By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : 
whitelisting, endpoint security, av signatures, patch management
    
Lumension
Published By: CA Technologies     Published Date: Aug 24, 2017
OAuth ist ein relativ neuer Webstandard zur Autorisierung des eingeschränkten Zugriffs auf Anwendungen und Daten. Er sorgt dafür, dass Anwender Drittanbieterkunden, etwa Fotodruckwebseiten, eingeschränkten Zugriff auf ihre Ressourcen gewähren können, z. B. auf Bilder auf Webseiten wie Flickr oder SmugMug. Bisher forderte der Client den Anwender üblicherweise zur Eingabe von Anwenderrnamen und Passwort auf – eine täuschend einfache Bitte, die ein inakzeptables Security-Risiko birgt. OAuth bietet im Gegensatz dazu ein Modell der geringstmöglichen Zugriffsrechte. Anwender können dabei mithilfe eines funktional begrenzten Tokens eingeschränkten Zugriff auf ihre Anwendungen und Daten gewähren.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: May 17, 2016
Wikibon conducted in-depth interviews with organizations that had achieved Big Data success and high rates of returns. These interviews determined an important generality: that Big Data winners focused on operationalizing and automating their Big Data projects. They used Inline Analytics to drive algorithms that directly connected to and facilitated automatic change in the operational systems-of-record. These algorithms were usually developed and supported by data tables derived using Deep Data Analytics from Big Data Hadoop systems and/or data warehouses. Instead of focusing on enlightening the few with pretty historical graphs, successful players focused on changing the operational systems for everybody and managed the feedback and improvement process from the company as a whole.
Tags : 
ibm, big data, inline analytics, business analytics, roi
    
IBM
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This Frost & Sullivan report sparks IT infrastructure economics conversation and fosters expert decisions with the following insights: 6 myths about IT financials debunked 3 basic tenets of IT the CFO needs to understand 2 tables assessing IT options from a TCO and business goals perspective"
Tags : 
    
Hewlett Packard Enterprise
Published By: SAS     Published Date: Nov 16, 2018
Medicaid fraud is prevalent, costly and difficult to prevent. With a combination of more integrated data and advanced analytics, state agencies can turn the tables on fraudsters. They can accelerate the transition from detection to prevention, as new forms of fraud are recognized faster and fewer improper payments go out the door. This IIA Discussion Summary explores the challenges and opportunities in preventing Medicaid fraud in an interview with SAS’ Ellen Joyner-Roberson, Principal Marketing Manager for Fraud and Security Intelligence, and Victor Sterling, Principal Solutions Architect.
Tags : 
    
SAS
Published By: Mitel     Published Date: Jun 29, 2016
The cloud – and more specifically, cloud communications – is the source of the transformation, which has fundamentally changed the IT landscape. Some IT pros have embraced it. Some are working on migrating to the cloud over time. And others, through choice or necessity, are sticking with a premises-based approach. Read on to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : 
cloud management, cloud services, cloud management, best practices, communications, cloud computing
    
Mitel
Published By: Mitel     Published Date: Sep 18, 2015
Read the white paper "How Cloud Communications Is Opening Up Possibilities (and Floor Space)" to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : 
cloud communications, server rooms, wireless, cloud technology, networking, security, it management
    
Mitel
Published By: Mitel     Published Date: Apr 25, 2018
In businesses and organizations across the world, rooms once humming with wires, black boxes and blinking lights now sit empty. In a lonely phone closet, there’s only dust, a single lonely terminal, or perhaps a foosball table where IT pros can let off steam. The cloud – and more specifically, cloud communications – is the source of the transformation, which has fundamentally changed the IT landscape. Some IT pros have embraced it. Some are working on migrating to the cloud over time. And others, through choice or necessity, are sticking with a premises-based approach. Read on to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : 
cloud, communications, organizations, landscape
    
Mitel
Published By: Dell PC Lifecycle     Published Date: May 22, 2018
Les modèles d'achat de PC en entreprise évoluent, tandis que les acheteurs souhaitent améliorer à la fois la sécurité et l'expérience des employés. La mobilité des employés augmente dans le monde entier et les investissements d'entreprise basculent vers les tablettes et les ordinateurs portables. Les entreprises étudient ainsi leurs investissements actuels dans les PC traditionnels. Un élément reste clair : les acheteurs de PC en entreprise accordent toujours de l'importance à la sécurité et aux performances qu'offrent les PC fixes. Ils indiquent également que les nouveaux formats, comme les micro PC, les aident à apporter une meilleure expérience aux employés, critère auquel ils accordent au moins autant d'importance qu'à la sécurité. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
    
Dell PC Lifecycle
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Les modèles d'achat de PC en entreprise évoluent, tandis que les acheteurs souhaitent améliorer à la fois la sécurité et l'expérience des employés. La mobilité des employés augmente dans le monde entier et les investissements d'entreprise basculent vers les tablettes et les ordinateurs portables. Les entreprises étudient ainsi leurs investissements actuels dans les PC traditionnels. Un élément reste clair : les acheteurs de PC en entreprise accordent toujours de l'importance à la sécurité et aux performances qu'offrent les PC fixes. Ils indiquent également que les nouveaux formats, comme les micro PC, les aident à apporter une meilleure expérience aux employés, critère auquel ils accordent au moins autant d'importance qu'à la sécurité. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Mitel     Published Date: Jan 21, 2019
La question n’est plus de savoir quand, mais comment vous passerez vos communications dans le cloud. Et c’est l’un des principaux enseignements de cette seconde édition de notre enquête sur la perception du cloud par les entreprises européennes. L’adoption des solutions cloud, synonymes d’innovation pour une grande majorité des répondants, semble inéluctable. Dans un monde où la capacité des entreprises à se transformer rapidement est devenu critique, le modèle du paiement à l’usage répond à leurs attentes de flexibilité et d’innovation, particulièrement en termes de collaboration. Grace à cette enquête, nous pouvons comparer les sensibilités des responsables d’entreprise et mieux appréhender les différences culturelles et les freins potentiels en fonction des pays. Les réponses selon les pays sont souvent similaires, à quelques exceptions notables, qui sont révélatrices des différences de maturité d’adoption des solutions cloud en Europe. Si chaque pays conserve des spécificités, le S
Tags : 
    
Mitel
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Lifetime Products manufactures tables, chairs, and basketball equipment for customers in more than 50 countries. Its employees in the United States and China depend on messaging technologies to stay connected to customers and the office. To improve productivity, Lifetime deployed Microsoft® Exchange Server 2007 Unified Messaging. Employees can access their e-mail, voice-mail, and fax messages in their inboxes—while at work, at home, or on the road.
Tags : 
microsoft, microsoft exchange, exchange server, messaging, productivity, unified messaging, convergence
    
Microsoft Exchange
Published By: Schneider Electric     Published Date: Oct 17, 2016
Cet article explique certaines causes de blocage des capacités d'alimentation, de refroidissement et d'espace dans les centres de données en collocation et comment la distribution d'énergie des racks haute densité, le confinement d'air et d'autres pratiques améliorent la disponibilité et l'efficacité. Des exemples de politiques d'utilisation acceptables réglant ces problèmes sont présentés.
Tags : 
    
Schneider Electric
Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices, security
    
LogRhythm
Published By: McAfee     Published Date: May 19, 2014
Este libro proporciona una visión general de la seguridad de la red y explica cómo los ciberdelincuentes pueden utilizar métodos ocultos o actualmente no detectables para acceder a los sistemas de red protegidos. Las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques) eluden las soluciones comunes actuales de seguridad de red. Pueden transportar cualquier ataque o exploración a través de dispositivos de seguridad de red y firewalls, firewall de próxima generación, detección de intrusos y sistemas de prevención e incluso enrutadores que realizan la inspección profunda de paquetes. En este libro encontrará todo sobre AETs y obtendrá consejos útiles y recomendaciones para ayudarlo a proteger su organización. Si trabaja en el gobierno, el área militar, banca, industria, comercio electrónico o con otras infraestructuras críticas, lea este libro para descubrir lo que se enfrenta y cómo protegerse mejor contra las evasiones avanzadas.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti, security, it management
    
McAfee
Previous   1 2    Next    
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.