anti

Results 176 - 200 of 1103Sort Results By: Published Date | Title | Company Name
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
    
Fidelis Cybersecurity
Published By: CA Technologies     Published Date: Aug 24, 2017
Pour gérer votre IT de manière professionnelle, vous avez besoin d’outils qui vous permettent de garantir la fiabilité de vos services de manière proactive, tout en renforçant votre agilité opérationnelle. Cela implique d’opter pour une nouvelle approche de la gestion de l’infrastructure IT et de sélectionner un fournisseur de solutions de gestion de l’infrastructure qui soit en mesure de répondre à vos nouvelles exigences IT et métier.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Dans l’économie des applications, la réussite d’une entreprise est de plus en plus conditionnée par sa capacité à livrer des applications multicanal offrant une expérience client différenciée et exceptionnelle. Pour garantir les niveaux de service que cela implique, les équipes IT doivent passer à des approches de supervision IT proactives. Ce livre blanc dresse un aperçu des exigences clés que ces équipes doivent remplir afin de mettre en place des fonctionnalités de supervision proactive efficaces.
Tags : 
    
CA Technologies
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell & Microsoft
Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus, business technology
    
Qualys
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Managing a large datacenter is a costly, complicated activity for any enterprise, but when that datacenter also includes a number of database servers, and when database performance is critical, those costs and complications can multiply. A recent study from IDC explains simple tips to quantify the value of Oracle Exadata Database Machine for your own business. Discover how to deliver new business applications faster.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Sitecore EMEA     Published Date: Jan 23, 2018
The global beauty company provides an exhilarating example of the power of context-driven commerce. When customers can rely on brands to achieve the outcomes that are important to them, brand owners can shift their focus from nonstop customer acquisition to long-term customer engagement. The Sitecore Experience Platform and the underlying Sitecore Experience Database are foundation technologies for IT organizations wanting to implement context-driven commerce environments that function elegantly today and into the future. Sitecore puts an end to digital retailers’ obsession with cart abandonment, replacing it with opportunities to delight customers with personal, meaningful commerce offers.
Tags : 
advertising, revenue, customers, social channels, sitecore
    
Sitecore EMEA
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : 
cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
    
WNS
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Veracode     Published Date: Jun 26, 2019
DevOps, a new model for software development, is transforming the way the world creates software. And despite its substantial organizational, cultural and technological requirements, this new way of organizing development and IT operations work is spreading rapidly.
Tags : 
    
Veracode
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: UL EduNeering     Published Date: Jul 05, 2012
This paper summarizes the results of a quantitative benchmarking survey to over 200 Life Science organizations. The study identifies the key compliance and performance improvement training topics they had addressed in 2011 along with key issues for 2012.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11, regulatory compliance, pharmaceuticals, medical device, good manufacturing practices, quality system regulation, online compliance training, part 11 compliance, fda part 11 compliance, iso 13485, quality management system, life science, health care
    
UL EduNeering
Published By: TriNet     Published Date: Jul 28, 2015
This paper acts as a well-qualified resource for those desiring quantitative data to support the validity of how outsourcing key HR functions can produce positive business results.
Tags : 
hr outsource, peo, data analysis, hr functions, in-house hr processes, co-employment models, compliance risk, healthcare reform regulation
    
TriNet
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls, anti-virus, threats, solutions, webpulse, defense, cloud
    
Blue Coat Systems UK
Published By: CenTrak     Published Date: Aug 17, 2012
Learn how Mission Hospital successfully leverages CenTrak RTLS to significantly improve hospital asset management and realize a substantial ROI This reduces rental equipment costs, improved equipment management, and eliminates all asset shrinkage.
Tags : 
technology, healthcare, centrak, asset tracking, asset management deployment, asset, management, mission hospital, rtls, roi, business technology
    
CenTrak
Published By: Teradata     Published Date: Oct 15, 2012
Does your organization struggle to get new business insights from all data types with rapid exploration?
Tags : 
data scientists, analyst, statistician, quants, quantitative analyst, scientist, data science, business technology
    
Teradata
Published By: Oracle     Published Date: May 05, 2017
La innovación digital repercute en todos los aspectos del negocio moderno. El acceso a las opiniones y conocimientos de los compañeros y las prestaciones de autoservicio, desde prácticamente cualquier sitio y a través de cualquier dispositivo, han transformado enormemente la forma en la que gestionamos nuestros negocios y vivimos nuestra vida.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 17, 2017
Dans cette optique, Oracle Hospitality propose Restaurant 2025. Il s’agit d’un important rapport sur ce secteur d’activité visant à sonder des clients et des restaurateurs pour identifier les nouvelles technologies qui serviront à réorganiser notre activité. Leurs réponses combinées apportent des informations supplémentaires sur ces innovations, notamment le taux d’adoption anticipé, les incidences éventuelles et les craintes connexes, réelles ou imaginaires, qu’il convient de dissiper.
Tags : 
anticiper les tendances, à la consommation et, rechercher des solutions, novatrices pour améliorer, l’expérience du client
    
Oracle
Published By: Oracle     Published Date: Aug 17, 2017
50% of guests do not want to be served by a robot but 80% of operators say robots will be cleaning restaurants by 2027 50% of guests want to be recognized without giving a name or loyalty card 54% of restaurant operators would like to see artificial intelligence helping with menu planning
Tags : 
anticipating, consumer trends, seeking innovations, enhance guest experiences
    
Oracle
Published By: CEB     Published Date: Dec 09, 2013
This guide is designed to break down the complex challenge of mitigating third-party corruption risk into manageable components. Based on hundreds of member conversations and extensive research, we believe that successful companies conduct third party due diligence in five key phases.
Tags : 
corruption risk, managing risk, compliance, risk, anticorruption, third-party corruption
    
CEB
Published By: BI WORLDWIDE     Published Date: Mar 07, 2016
If you’re a sales manager, you’re probably feeling stuck in the middle. On one hand, you have a huge employee engagement movement going on with HR departments focusing on developing leaders and recognizing achievements with substantial budgets. On the other side, marketing departments are using technology and creativity (and also large budgets) to connect with and educate customers about their products, solutions and brands. The trend is to challenge every dollar spent on sales compensation to maximize ROI. HR departments are treating salespeople like all other employees. And customers are going online to avoid anyone with sales in their title. Based on our research and applications we see in our customers’ leading sales initiatives, if you’re a sales manager, you are trying to maximize results out of your sales team by increasing your teams engagement to meet company goals. Download this white paper to see which eight trends you should consider as you strategize for the year.
Tags : 
bi worldwide, sales, incentives, effectiveness, sales incentive, productivity, engagement, business technology
    
BI WORLDWIDE
Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity
    
MobileIron
Published By: Storiant     Published Date: Apr 27, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : 
storage technologies, it storage vendors, storiant, storage infrastructures, automated storage
    
Storiant
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.