anti

Results 101 - 125 of 1104Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Nov 02, 2012
FAQs for how to break the old trade-off between effectiveness against malware and speed.
Tags : 
faqs, virus detection, endpoint security, it security, malware detection, antivirus detection, business technology
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
The experts agree that AV software is a must-have for business PC users, but it is necessary to take great care in choosing one. In this brief, you'll find that user experiences with AV solutions can vary widely.
Tags : 
malware attacks, antivirus security, endpoint solution, endpoint security, security solutions, business technology
    
Webroot
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Thomson Reuters     Published Date: Jul 30, 2012
Thomson Reuters QA Studio, powered by Palantir, provides easy and rapid financial time series analysis, multi-asset class portfolio simulation, factor testing, and other portfolio analytics.
Tags : 
starmine, equity, trading, strategy, financial, tool, long, portfolio, s&p, strategy, volatility, backtesting, rebalancing
    
Thomson Reuters
Published By: BMC Software     Published Date: Jun 26, 2013
Cloud is not simply a new technology platform, it’s a new way of running your IT processes. Success changes relationships with users, with services and with operations. Learn what to anticipate as you embark on cloud – and how to ensure success not just in your datacenter, but in your business.
Tags : 
cloud management, hybrid cloud, cloud planning, cloud operations, cloud users, cloud process, it management, business technology, data center
    
BMC Software
Published By: Oracle     Published Date: Dec 31, 9999
Employee Services Systems and Technology Manager Trent Filth out talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Employee Services Systems and Technology Manager Trent Filthout talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm, business technology
    
Oracle
Published By: Lumeris     Published Date: Aug 04, 2014
For health plans, health systems and delegated payer operations, or health systems wanting to become their own payer, Lumeris’ turnkey outsourcing offers expert support to design, build, operate, measure, and optimize value-based health plan operations that can drive clinical and financial excellence. This can be evidenced by our ability to help clients achieve higher revenue, lower costs, higher market share, and meeting mandates for medical cost ratio contained in the Patient Protection and Affordable Care Act.
Tags : 
lumeris, health plan delivery, health plan operations, population health services, value based health plan operations, health plan outsourcing, operating a health plan
    
Lumeris
Published By: Panasonic     Published Date: Aug 04, 2016
Whether deploying, securing or managing mobility solutions in a professional environment, enterprise leaders must go to great lengths to ensure their investments are effective and easily assimilated into their existing workflows. In order to avoid encountering challenges with rugged mobile devices and other specialist mobile solutions, it is crucial for businesses with field workforces to leverage services and partners that can help them instill strategic best practices across the entire spectrum of mobilization, including security and data protection, installation and integration, training, maintenance and warranties, and proper disposal of old assets.
Tags : 
mobile devices, mobility, managing mobility, best practices, productivity
    
Panasonic
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Nearly all datacenters in enterprise IT organizations have areas where efficiency can be improved. IDC study shows: Meadian efficiency in enterprise IT: People 50%, Process 30% and Technology 50%
Tags : 
    
Hewlett Packard Enterprise
Published By: Zendesk     Published Date: Jan 03, 2019
To successfully meet customer demands for more immediate, personalized attention, companies are leveraging new technologies that go beyond traditional voice and email. By implementing such channels as live chat, social media, mobile apps, SMS/text messages, self-help solutions, and more, companies can now be ready wherever and however the customer wants. The following report, sponsored by Zendesk, is based on an online survey of 1,044 U.S. consumers who have received online or phone customer service. The research goal was to better understand present customer expectations and to quantify the impact of customer service on business results. Questions were asked about past experiences with customer service, as well as preferences and opinions. Certain questions were repeated from a similar 2013 survey to enable trend analysis.
Tags : 
    
Zendesk
Published By: QAD     Published Date: Jan 19, 2018
QAD anticipa los problemas que pueden afectar a sus clientes y provee soluciones antes de que se den cuanta de que tienen un problema. Nos aseguramos de que nuestro producto no solo se ocupe de los principales retos si no que recomendamos soluciones para sus problemas, aparte de nuestras soluciones y servicios. Nuestro objetivo es ayudar a nuestros clientes a formar la Empresa Efectiva.
Tags : 
    
QAD
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Oracle APAC     Published Date: May 24, 2018
Container technologies have substantial benefits especially given the need to isolate applications to increase service levels. Linux Containers (LXC) and Docker containers can be your best choice, depending on your use case.
Tags : 
    
Oracle APAC
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Construction BUSINESS CHALLENGE Proactively prevent business disruption as a result of cyberattacks IT ENVIRONMENT Kaspersky antivirus, layered enterprise security SOLUTION Malwarebytes Endpoint Protection RESULTS Detected and eliminated thousands of threats that other solutions missed Delivered visibility into entire installed base of endpoints, regardless of location Saved time and accelerated response via the cloud console Prevented PUPs and exploits from gaining entry
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
    
MalwareBytes EMEA
Published By: Skillsoft     Published Date: May 19, 2015
This paper shows how companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives.
Tags : 
business corruption, complaince training, skillsoft, anti-corruption training, employee corruption training, changing landscape of corruption
    
Skillsoft
Published By: Adobe     Published Date: Aug 05, 2014
In this paper, we explore the challenges of quantifying social marketing’s financial and nonfinancial ROI and how businesses are employing strategic measurements that reveal dividends beyond the bottom line.
Tags : 
roi, investment, sales, social media, social marketing, financial, non-financial, campaigns, measurement, stakeholders
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Aujourd’hui, certaines prévisions sont moins complexes qu’elles ne l’étaient auparavant. Nous disposons désormais d’une quantité d’informations sans précédent sur les consommateurs et de la technologie adéquate pour faire parler les données. Les marketeurs peuvent prévoir avec une grande précision le comportement des clients, parfois même avant que ces derniers ne sachent eux-mêmes ce qu’ils vont faire.
Tags : 
data, information available, customer, customer experience, customer relationship
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Customers crave personalized experiences, but to meet this expectation, marketing teams are creating 10 times more content than ever before. Despite this, asset management is a stumbling block because of siloed shared drives and antiquated storage systems, making it difficult for companies to collaborate and deliver content quickly.
Tags : 
content management, customer experience, content management, customer engagement
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Customers crave personalized experiences, but to meet this expectation, marketing teams are creating 10 times more content than ever before. Despite this, asset management is a stumbling block because of siloed shared drives and antiquated storage systems, making it difficult for companies to collaborate and deliver content quickly.
Tags : 
content management, customer experience, content management, customer engagement
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.