av works

Results 276 - 300 of 331Sort Results By: Published Date | Title | Company Name
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers
    
Symantec
Published By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales
    
VisiStat
Published By: AirTight Networks     Published Date: Aug 21, 2009
More and more companies are realizing that their corporate air waves are an asset that requires protection. Strong security policies have been created for wired networks. The same is now needed for the corporate air waves. This paper will discuss the compelling business reasons why an investment in wireless intrusion prevention should be made.
Tags : 
intrusion prevention, wireless security, security policy, security policies, security management, governance, airtight, airtight networks
    
AirTight Networks
Published By: Groundwork Open Source     Published Date: Aug 21, 2009
IT teams have long recognized that an enterprise-class IT management system is absolutely essential, especially given the mission-critical nature of most corporate IT networks. In order for robust IT monitoring and management functionality, they had no alternative but to use a proprietary solution. Download this white paper to learn about Open Source alternatives.
Tags : 
open source, network management, openview, open view, monitoring, open source network, open source networks, groundwork
    
Groundwork Open Source
Published By: HP     Published Date: Jul 08, 2009
This white paper looks at what it takes to deliver a broad set of network storage solutions that address the ongoing needs of IT managers while accommodating their current business requirements. Learn more today!
Tags : 
smbs, small and medium-sized businesses, idc, das, directattached, storage, storage, availability
    
HP
Published By: HP     Published Date: Jul 08, 2009
The growth of structured data from databases, e-mail and other applications has been exponential. The increasing flood of data can lead to a host of problems — failing to recognize that data storage must be managed as a critical resource often results in a very difficult environment to manage, a higher cost of ownership, less responsiveness to change and added risk to the business. This white paper discusses how a dedicated, optimized network storage solution can increase data availability and reduce operating costs by simplifying management and improving capacity utilization.
Tags : 
simply storage, storage, email, databases, databasing, structured data, network storage solution, capacity utilization
    
HP
Published By: IBM     Published Date: Nov 06, 2006
This IBM white paper posits that most enterprises have yet to realize the full value of convergence and explains why the real promise of IP networks lies in converged applications. It goes on to explain how IP convergence can build real business value for today's busy contact centers.
Tags : 
convergence, communications convergence, ip telephony, ip faxing, networking, network management, infrastructure, voip
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Natural and manmade disasters have costly, far-reaching impacts on businesses. And organizations of all types are making business continuity plans that protect their data, networks, core business applications and facilities. But it’s important to build resiliency into your business operations as well your human capital. This Web seminar on Workplace Recovery will take you through the risks related to human capital resiliency and provide a framework for addressing them.
Tags : 
ibm, ibm mi, ibm grm, disaster recovery, recovery, business continuity, storage
    
IBM
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
    
Quocirca
Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : 
network security, access control, nac, network access control, intrusion prevention, landesk
    
LANDesk
Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : 
network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware
    
LANDesk
Published By: AT&T     Published Date: Jun 25, 2008
Mobile applications are transforming how companies operate. With new ways to work flexibly, employees are becoming more responsive and more productive. But enterprises have experienced only the start of what IP networks will bring to mobile working.
Tags : 
mobile workers, mobile applications, productivity, mobile, wireless, pda, att, at&t
    
AT&T
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Telecom operations typically have sophisticated network and systems management (NSM) software in place to monitor their servers, workstations and routers. Such systems often utilize Simple Network Management Protocol (SNMP) as a means of transmitting and receiving network monitoring information. Great - if you run only modern equipment. 
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Tideway Systems     Published Date: Dec 11, 2007
A world class IT organization needs to be better than even the regulators require – and good IT governance doesn't have to tie the IT department up in red tape. Judicious application of IT best practices, frameworks and methodologies can help achieve this, based on an accurate picture of the IT environment, at which point regulatory compliance becomes a happy side effect. Find out how you can have an up-to-date true view of your infrastructure on a daily basis – not just at a point in time by reading this white paper.
Tags : 
compliance, regulation, regulations, regulator, regulators, governance, compliant, infrastructure
    
Tideway Systems
Published By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : 
storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san
    
TeraCloud
Published By: WebMetro     Published Date: Mar 24, 2008
Regardless of your budget, website owners and marketers have an abundance of resources available when it comes to Search Engine Marketing (SEM). Maneuvering through those resources and determining what aptly works for your company is the tricky part.
Tags : 
search marketing, sem, seo, webmetro
    
WebMetro
Published By: Easynet     Published Date: Mar 26, 2008
Online bookings, billing and ticketing activities lie at the heart of high quality and reliable services in the leisure, entertainment and travel (LET) industry. Indeed, they can effectively act as a primary differentiator in an increasingly competitive and cost-aware environment.
Tags : 
leisure, entertainment, travel services, e-booking, e-ticketing, managed networks, e-commerce, easynet
    
Easynet
Published By: Easynet     Published Date: Mar 26, 2008
From the results of recent interviews with LET organisations, IDC positions the industry in the midst of a major transition phase from legacy to next-generation services and technology. This Executive Brief highlights the major technology and business trends taking place in the LET sector, and outlines the advantages of adopting new technologies and services in comparison with other industries.
Tags : 
leisure, entertainment, travel services, technology, managed networks, easynet
    
Easynet
Published By: SAS     Published Date: Aug 04, 2016
Machine learning and the Internet of Things (IoT) are two of the hottest terms out there today for utilities. Both have the power to create an increasingly autonomous grid that can eventually handle billions of endpoints on utility networks, but the industry may not be maximizing the benefit of these disruptive innovations, nor adequately leveraging the connection between the two of them.
Tags : 
best practices, networks, utility network, autonomous grid, innovation, competitive advantage, business technology
    
SAS
Published By: GoToMeeting     Published Date: Apr 07, 2010
The purpose of this paper is to quantify the benefits of workshifting -- specifically working from home -- has for employers, employees, and the community.
Tags : 
citrix gotomeeting, telecommunting, travel, commuter, interview, telecommuting, telecommute, telework
    
GoToMeeting
Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
This EMA paper reviews the HP IRF approach and examines potential savings and efficiencies that it enables specific to the design, deployment, and ongoing operations management of Ethernet networks.
Tags : 
smb, networks, operations, ethernet, ema, design, ethernet networks, ip networks
    
HP and Intel® Xeon® processors
Published By: Asure Software     Published Date: Mar 06, 2014
Since 2005, organizations have created more workspace changes – eliminating vast (and dull) cubicle farms in favor of community spaces arranged to accomplish several goals including: • Maximize existing workspace • Foster more collaboration and teamwork • Accommodate mobile/remote employees who no longer need a dedicated space in an office building Hot desking and desk hoteling are workspace strategies that are here to stay. This executive briefing will help any real estate or facility manager understand how to leverage these concepts, adapt to trends and get a return that the finance team will appreciate.
Tags : 
    
Asure Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.