it risk

Results 301 - 325 of 2334Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Aug 23, 2011
This paper analyzes the benefits and drawbacks of outsourcing cloud services, examines the business benefits and risks, and provides the steps one should take for a successful implementation.
Tags : 
vmware, market pulse report, global cloud adoption trends, cloud computing, transformation, enterprise hybrid cloud, business agility, cios
    
VMware
Published By: IBM     Published Date: Sep 22, 2011
This e-book offers tips and solutions to help you optimize infrastructure, boost development productivity and improve database administrator (DBA) efficiency. With intelligent actions and technologies, you can better manage and deliver the information your company needs-along with cost savings, risk reduction and increased performance-to drive smarter business outcomes.
Tags : 
ibm, data management, dba, productivity, infrastructure, development, productivity
    
IBM
Published By: Sybase     Published Date: Dec 01, 2011
This free white paper explores how IT departments at financial institutions are assuming a more proactive role in identifying technologies.
Tags : 
capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
    
Sybase
Published By: Sybase     Published Date: Dec 01, 2011
This white paper looks at managing securities trading data based on a robust process and technology infrastructure.
Tags : 
capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
    
Sybase
Published By: Sybase     Published Date: Dec 01, 2011
This free Sybase presentation provides a high-level overview of Complex Event Processing (CEP).
Tags : 
capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
    
Sybase
Published By: Sybase     Published Date: Dec 01, 2011
This white paper shows the success of using a visual data analytics platform to monitor and manage positions/exposure in real time.
Tags : 
capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
    
Sybase
Published By: Sybase     Published Date: Dec 01, 2011
This free white paper shows you how leading financial services companies are reaping the benefits of Continuous Intelligence.
Tags : 
capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
    
Sybase
Published By: Voltage Security     Published Date: Sep 13, 2012
If there are any lingering doubts that mobile de-vices-such as smartphones and tablets-have profoundly transformed today's business, one study finds that using smart devices for produc-tivity is "now the standard.
Tags : 
data security, smart devices, smart security, data security strtegy, mobile security, security risks, business technology
    
Voltage Security
Published By: Datto Inc.     Published Date: Jan 31, 2013
Business continuity, data insurance, local storage flexibility, cost benefits, standards compliance and infrastructure control. This is just some of what Datto and hybrid cloud backup can do for you, and your clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
A challenge for many MSPs is how to best sell business continuity solutions to the SMB market. In this whitepaper Datto presents six tips to help MSPs maximize their sales, revenue and profit.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
Datto shares 10 tips for MSPs to increase profit, improve visibility, and strengthen customer satisfaction -- all without breaking the bank.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
This IT solutions provider’s experience with enterprise storage vendors taught his one thing; you can’t cram an enterprise storage solution into a small to midsize business.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
Understanding RTO (recovery time objective) is a key to knowing the difference between BDR and intelligent business continuity. Read this article to learn more.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
There’s a big difference between traditional backup methods and what intelligent business continuity offers. Get the facts.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
Learn how an MSP uses Datto’s business continuity solutions as a valued profit center - all while giving their clients value peace of mind.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Jan 31, 2013
Not all backup and disaster recovery (BDR) solutions are created equal. Read how one MSP found the BDR solution that works best for them, and their clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Feb 05, 2013
In this white paper Datto explores the different types of risk in IT infrastructure and the ways intelligent business continuity can best mitigate that risk.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.
Published By: Datto Inc.     Published Date: Apr 15, 2013
Small businesses are positioned for the perfect data storm: more data, at more value, with more risk. Their challenge has been not having an enterprise-class BDR solution built with their specific pain points in mind. Datto ALTO, and you, can change that. Datto wants you to succeed. As the only 100% channel-focused backup, disaster recovery (BDR) and intelligent business continuity (IBC) vendor, Datto is focused on the success of our Partners. Our Partners succeed by delivering award-winning solutions to their clients that are easy to sell, easy to manage, and will eliminate downtime in the event of a natural or technical disaster.
Tags : 
datto redefines bdr for small business, bdr solution, datto alto, robust bdr solution
    
Datto Inc.
Published By: Juniper Networks     Published Date: Oct 28, 2014
To understand why an open, scalable network architecture is essential for enhanced IT security in the cloud era, get our eBook. Read how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
cloud, data protection, security, security breaches, safe virtual environment, risk, network security
    
Juniper Networks
Published By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : 
cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : 
sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
Venafi
Published By: MobileIron     Published Date: Apr 28, 2016
Welcome to the first edition of MobileIron Security Labs (MISL) quarterly Mobile Security and Risk Review. This report provides insights into the state of the mobile security and threat landscape, highlights emerging risks, and recommends ways to fortify mobile enterprise deployments.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.