nis

Results 101 - 125 of 1922Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: May 24, 2017
Apps sind auf dem Vormarsch: Bei der Nutzung mobiler Geräte entfallen 85 % der Zeit auf Apps. Der App-Markt ist jedoch extrem umkämpft und 20 % der heruntergeladenen Apps werden nur ein einziges Mal geöffnet. Wie können Sie Ihre App von der massenhaften Konkurrenz abheben? Der Schlüssel zum Erfolg ist die Performance. Laden Sie diese Infografik herunter. Darin erfahren Sie, worauf es ankommt, um sich in den komplexen App-Umgebungen behaupten zu können, und wie Sie Nutzer mit schnellen, interaktiven Apps überzeugen.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs sind die verborgene Sprache des Internets. Sie bilden die Grundlage für die digitale Transformation vieler Branchen, indem sie es Anwendungen ermöglichen, miteinander zu kommunizieren und als Backend-Services für Websites und Apps zu fungieren. Da es sich um eine dynamische Technologie handelt, die im Hintergrund arbeitet, ist es schwierig, detaillierte Informationen zur API-Landschaft zu finden. Auf Basis von Erkenntnissen unserer neuesten API-Umfrage unter 400 führenden Technologieunternehmen sowie umfassenden Branchendaten haben wir vier essenzielle Fakten zu APIs herausgearbeitet.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Konsumerisierung der Technologie und der Vormarsch mobiler Geräte in neuen und bestehenden Märkten bewegt Unternehmen dazu, enorme Beträge und Ressourcen zu investieren, um ein optimales mobiles Erlebnis für alle Endnutzer zu erreichen. Ohne dedizierte Lösung für die mobile Performance sind ihnen jedoch trotz aller Investitionen Grenzen gesetzt.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Ein bestmögliches App-Erlebnis zu bieten, ist kein leichtes Unterfangen. App-Umgebungen werden immer komplexer und erschweren die Bereitstellung vielfältiger, interaktiver Apps
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : 
bot manager, bot interaction bot detection
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 07, 2018
We are pleased to present the Cost of Web Application and Denial of Service Attacks, sponsored by Akamai Technologies. The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks since the study was first conducted in 2015. For this study, Ponemon Institute surveyed 621 individuals in IT operations, IT security, IT compliance or data center administration.
Tags : 
web, application, attacks, security, akamai, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 13, 2018
Recent high-profile data breaches and numerous waves of widely publicised internet attacks have made everyone nervous about security. Families, small businesses and other organisations are struggling to figure out how to protect themselves.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Where education connects with technology that works. For your school, college or university. With global reach and local focus, we deliver purpose built networking and communications for the education environment that enable secure, reliable collaboration between your faculty and students.
Tags : 
teachers, administrators, education leaders, cyber security, iot devices, digital content
    
Alcatel Lucent Enterprise
Published By: ALE     Published Date: Jan 10, 2019
Providing an effective teaching and learning environment is the primary goal of all educational institutions. Traditionally, administrators concentrated on providing faculty with the tools to properly deliver the curriculum and structuring the learning process to sufficiently engage students. But, violent incidents over the past decade along with government regulations have put pressure on administrators to focus on the physical security and safety of staff, faculty, and students. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: Alert Logic     Published Date: May 23, 2019
IT professionals who attended the Alert Logic Cloud Security Summit on 20th June 2018 highlight aspects of the state of security of their organisation.
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Alight Solutions     Published Date: May 07, 2018
Choosing a payroll provider is never easy. Read the top questions you should be asking to assess payroll providers.
Tags : 
payroll provider, tax vendor, garnishments, quality assurance, tax reconciliation, payroll on cloud, payroll service, tax filing, workday, workday payroll, cloud services
    
Alight Solutions
Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Selecting an email system to fulfill the needs of a small-to-medium business (SMB) with 5-500 employees can be easy to do by following some practical and straightforward guidelines. Choosing a productive system involves finding the best combination of security, mobility, collaboration and ease-of-use, in addition to the basic functions of sending and receiving electronic messages.
Tags : 
alt-n technologies, email server, email, security, mobility, collaboration, administration
    
Alt-N Technologies
Published By: Alteryx, Inc.     Published Date: Sep 07, 2017
Download this paper now and start to deliver the self-service data analytics that your organisation requires.
Tags : 
    
Alteryx, Inc.
Published By: Amazon Web Services     Published Date: Jun 02, 2017
451 Research ist ein herausragendes IT-Forschungs- und Beratungsunternehmen. Mit der Gewichtung auf technologischer Innovation und Marktstörung liefert es wichtige Erkenntnisse für führende Unternehmen der digitalen Wirtschaft. Mehr als 100 Analysten und Berater stellen diese Erkenntnisse durch syndizierte Forschung, Beratungsdienste und Live-Events für über 1.000  undenorganisationen in Nordamerika, Europa und auf der ganzen Welt bereit. 451 Research wurde im Jahr 2000 mit Hauptsitz in New York gegründet und ist ein Geschäftsbereich von The 451 Group.
Tags : 
cloud, cloud platform, amazon, aws, microsoft
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Jun 02, 2017
451 Research est une société de recherche et de conseil de premier rang spécialisée dans le domaine informatique. L'innovation technologique et les perturbations du marché sont au cœur de notre activité, ce qui nous permet d'offrir des lectures de données primordiales aux leaders de l'économie numérique. Plus de 100 analystes et consultants proposent cette lecture à plus de 1 000 organisations clientes situées en Amérique du Nord, en Europe et dans le monde entier, par le biais de services de recherche et de conseil syndiqués et d'événements en direct. Fondée en 2000 et établie à New York, 451 Research est une division de The 451 Group.
Tags : 
cloud, cloud platform, amazon, aws, microsoft
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Oct 09, 2017
As easy as it is to get swept up by the hype surrounding big data, its just as easy for organisations to become discouraged by the challenges they encounter while implementing a big data initiative. Concerns regarding big data skill sets (and the lack thereof), security, the unpredictability of data, unsustainable costs, and the need to make a business case can bring a big data initiative to a screeching halt. However, given big data's power to transform business, it's critical that organisations overcome these challenges and realise the value of big data. The cloud can help organisations to do so. Drawing from IDG's 2015 Big Data and Analytics Survey, this white paper analyses the top five challenges companies face when undergoing a big data initiative and explains how they can effectively overcome them.
Tags : 
amazon, web services, intel, migration, data warehousing, organization optimization, security, software
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : 
global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : 
cloud, aws, security, organizations, visibility, control, networks, platforms
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Dec 01, 2017
Les informations suivantes doivent servir de ressources aux directeurs financiers qui dirigent ou assistent leur organisation tout au long de sa migration vers le cloud. Elles ont pour objet de présenter les motivations, les coûts, les risques et les avantages de l'adoption du cloud, et de soulever des questions importantes en matière d'effectifs et de technologie, qui s'avèrent essentielles à la réussite de cette adoption. Elles visent également à permettre de mener des analyses de rentabilité, en mettant en valeur des mesures et des indicateurs spécifiques aux environnements cloud, capables d'influencer les résultats. Les conseils fondamentaux qui sont fournis sont tirés de conversations et d'entretiens directs entre Amazon Web Services (AWS) et les directeurs financiers d'entreprises clientes, qui représentent un large éventail de secteurs d'activité.
Tags : 
planification, amazon, web, services, destine, aux, directeurs, financiers, guide
    
Amazon Web Services
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.