landscape

Results 101 - 125 of 904Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: BlackLine     Published Date: May 24, 2018
Digital transformation is the new boardroom buzzword. But what does this really mean for finance teams, and why does it matter? Beyond the hype, real change is underway.
Tags : 
    
BlackLine
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid
    
Blue Coat Systems
Published By: BMC     Published Date: Dec 03, 2012
Read EMA's Impact Brief to get a detailed evaluation of the new capabilities of BMC Control-M V8, and learn how the latest version of BMC Software's workload automation software fits within the current industry landscape.
Tags : 
workload automation, bmc control-m, control-m, job scheduling, data management, business technology, data center
    
BMC
Published By: BMC ESM     Published Date: Nov 09, 2009
Gartner assesses the vendor landscape in their latest Magic Quadrant for IT Event Correlation and Analysis, and positions BMC in the Leaders' Quadrant. Read the report
Tags : 
bmc esm, magic quadrant, consolidation, eca, event correlation and analysis, business service management, event management, deduplication
    
BMC ESM
Published By: Box     Published Date: Jun 11, 2012
This paper examines the market drivers, inhibitors, and top vendors in this segment, including Box, Citrix Sharefile, Dropbox, Egnyte, Nomadesk, Sugarsync, Syncplicity and YouSendIt.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture, it management
    
Box
Published By: Box.net     Published Date: Jun 27, 2012
Enterprise content management strategy has and will be a vital component of the business IT landscape
Tags : 
enterprise content management strategy, improving collaboration, emc solutions, cloud computing
    
Box.net
Published By: Brandwatch     Published Date: Dec 01, 2015
Download this Brandwatch report to learn how social media and streaming services are changing the landscape of television networks, and how social media not only provides a platform to directly link audiences to online content but it is also the preferred venue for generating conversation or public interest in entertainment.
Tags : 
social media, social intelligence, social media monitoring, social listening, social insights, television, tv networks, television networks
    
Brandwatch
Published By: Breakout Solutions     Published Date: Sep 24, 2008
Breakout Solutions is pioneering the way in which organizations utilize Social Media to meet their online promotional objectives. Our proprietary video contest platform provides a turnkey solution for organizations that value interacting and communicating directly with their target market through social media. Web 2.0, has led to a more interactive and social landscape where content is no longer king, conversation is. Breakout Solutions can help your brand become a part of these conversations so that you have a better understanding of how others view your brand and utilize your products and services.
Tags : 
breakout solutions, promotional contest, branded promotion, videos, photos, audio, myspace, facebook, youtube, social networks, social media, web 2.0
    
Breakout Solutions
Published By: Bridgeline Digital     Published Date: May 17, 2013
Digital touchpoints support an increasingly large percentage of the overall customer experience. 2012 saw the emergence of several important digital customer experience trends that will gain momentum as firms look to unify the cross-touchpoint experiences they deliver in 2013. This report outlines key trends that will make up the landscape that customer experience professionals will be working in as they take strides to improve their digital customer experiences in 2013.
Tags : 
forrester, digital customer experience, customer experience management, customer experience trends, digital experiences
    
Bridgeline Digital
Published By: Brightcove     Published Date: Sep 29, 2015
As the marketing landscape changes, marketers need to change the way they interact with their customers. In order to help you avoid common pitfalls, we present the Top 5 Video Marketing Mistakes of 2015.
Tags : 
branding, consumer marketing, content management system (cms), crm best practices, lead generation
    
Brightcove
Published By: Bulldog Solutions     Published Date: May 20, 2013
This executive overview focuses on one of these drivers--program effectiveness--defined by leading marketers as programs that drive a high level of conversion and prospect engagement throughout the buyer's journey. in this executive overview, we'll take a look at the current buyer landscape, and then at five five best practice areas that need to be optimized in order for your programs to reach their full potential.
Tags : 
program effectiveness, b2b, b2b buyers, message alignment, buyer insights, audience acquisition, performance monitoring, campaign, campaign effectiveness
    
Bulldog Solutions
Published By: Business Software     Published Date: Apr 04, 2013
With the advent of a new globally-based economy, process manufacturers face significant challenges. Rapidly shifting markets, more empowered buyers, increasing regulation, commodity volatility, and margin pressures, and the effects of a credit crunch bring a “new normal” of constant volatility, variability, and variety to today’s landscape. In order to survive, process manufacturers need to become far more flexible, risk aware, and responsive to generate healthy revenues and profits. But above all else, they need to understand the importance of finding the right software application to drive maximum return on their investment. Business-Software.com profiles the leading process manufacturing software vendors in this white paper, download it now!
Tags : 
top 15 process, manufacturing, software vendors revealed, business-software.com, rapidly shifting markets, increasing regulation commodity
    
Business Software
Published By: CA Technologies     Published Date: Jun 04, 2015
In today’s fast-moving, ultra-competitive business landscape, the days of enterprises spending months—or even years—building, testing and releasing an application, service or new set of capabilities to the market are over. Customers, technology users and the market as a whole are more nimble than ever before, and their demands for innovative new functionality have grown in concert. In other words, customers are no longer content to wait for the next big release—nor are they willing to deal with glitches and defects when it arrives. In this brief you will learn how an enterprise release automation solution can help your organization simplify and accelerate your application delivery processes.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
By necessity, every company is now a software company. By 2017, two-thirds of customer service transactions will no longer require the support of a human intermediary. That means that if you haven’t already done so, you must adapt your business model to meet the needs of online customers. Failure to do so will put you at a severe competitive disadvantage. And chief among those demands is that you provide an exceptional user experience. App speed, reliability and ease of use are the new currency in this fast-changing landscape. In fact, app characteristics such as convenience and the ability to save users time can enhance brand loyalty by 60 percent or more.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Regardless of the industry, there are several common trends that are reshaping the business landscape. Each one has had a profound effect on the ways companies develop products, bring them to market and compete against their rivals.
Tags : 
portfolio initiatives, vendor, implementation, frameworks, dashboards, metrics
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Microservices can have a positive impact on your enterprise- just ask Amazon and Netflix-but you can fall into many traps if you don't approach them in the right way. This practical guide covers the entire microservices landscape, including the principles, technologies, and methodologies of this unique, modular style of system building. You'll learn about the experiences of organizations around the globe that have successfully adopted microservices.
Tags : 
microservices, organization, business, ca technologies, architecture
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Over 90% of organizations believe that the GDPR will impact the way they collect, use and process personal data. It’s one of the biggest changes to hit the digital privacy landscape in 20 years. And, in May 2018, the EU General Data Protection Regulation (GDPR) will introduce maximum fines of €20 million for non-compliance.
Tags : 
digital privacy, data protection, gdpr, organization optimization, technical challenges, data regulation, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, you’ll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
With high user expectations shifting faster than ever, the software landscape is evolving at a feverish pace to deliver higher–quality software—and testing must be able to keep up. CA has worked with Paul Gerrard, Principal, Gerrard Consulting, to identify some of the new challenges that the digital economy presents for testing, and the trends that have emerged to meet them. We cover some of these topics in this e–book.
Tags : 
    
CA Technologies EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.