surface

Results 51 - 75 of 97Sort Results By: Published Date | Title | Company Name
Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys
Published By: Internap     Published Date: Dec 02, 2014
As organizations aim to increase business agility and streamline costs, demand for public cloud services continues to grow exponentially, with Gartner predicting it will become the majority of new IT spending by 2016. This evolving application ecosystem with its intensive performance demands is placing new pressures on traditional public cloud services. Amid this shift, Internap surveyed nearly 250 Internet infrastructure decision makers to gain insight into cloud adoption, requirements and challenges – including the differences in feedback between the cloud-wise, those using cloud services, and the cloud-wary, those with no near-term plans to use cloud services. The details of these findings are reflected in this Cloud Landscape Report.
Tags : 
internap, cloud landscape, application ecosystem, cloud adoption, cloud, internet infrastructure, it management, data center
    
Internap
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: KPMG     Published Date: Jul 10, 2018
Initiatives that provide a digital customer experience or digitise existing processes merely scratch the surface. To unleash the true potential of digital, you need to reimagine your business model. Download this report to find out: • ten key technologies that will change business forever • why strategy beats technology in the race to transform • where business leaders think the key changes happen • the three categories of innovation that will drive digital business models of the future.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 10, 2018
Initiatives that provide a digital customer experience or digitise existing processes merely scratch the surface. To unleash the true potential of digital, you need to reimagine your business model. Download this report to find out: • ten key technologies that will change business forever • why strategy beats technology in the race to transform • where business leaders think the key changes happen • the three categories of innovation that will drive digital business models of the future.
Tags : 
    
KPMG
Published By: LogRhythm     Published Date: Jun 19, 2018
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M.1 1 Ponemon 2015 Cost of Cyber Crime Study 2 CyberEdge 2016 Cyberthreat Defense Report 3 Symantec, Underground black market: Thriving trade in stolen data, malware, and attack service. November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014 4 Deloitte, Beneath the Surface of a Cyberattack, 2016 The Modern Cyber Threat Pandemic 3 The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizatio
Tags : 
data, breaches, organizations, global
    
LogRhythm
Published By: Lumension     Published Date: Oct 17, 2008
Vulnerability management can be a powerful means toward reducing the threat surface within an enterprise IT environment. But because vulnerability management technology has been around in some form or another for so long there has been plenty of time for the din of marketing-speak from various vendors to confuse users about the true nature of vulnerability management tools and practices.
Tags : 
lumension, it environment
    
Lumension
Published By: McAfee     Published Date: Mar 31, 2017
NSS Labs performed rigorous testing of McAfee Endpoint Security v10.5 across a multitude of attack threat vectors targeting a very dynamic enterprise class endpoint attack surface. In addition, McAfee Endpoint Security v10.5 was evaluated for it's resistance against several evasion categories and false positive testing. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee's participation. Download a complimentary copy ($750 value) of this NSS Labs individual test report that provides detailed information not available elsewhere.
Tags : 
endpoint attack, endpoint protection, security, nss
    
McAfee
Published By: McAfee APAC     Published Date: Jun 25, 2019
Business is accelerating with technology. Technology is expanding the cyberattack surface. In today’s survival of the fittest landscape, here are five ways to not just survive, but thrive with a layered and integrated defense that protects your entire digital terrain and all types of devices.
Tags : 
    
McAfee APAC
Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
    
Microsoft Office 365
Published By: Microsoft Surface     Published Date: Feb 14, 2017
Productivity remains one of the top issues facing small and medium-sized businesses (SMBs) today. And while there’s no doubting the importance of trying to get the most out of your talent, the approach many SMBs take actually has the reverse effect. This is the ‘productivity puzzle.
Tags : 
    
Microsoft Surface
Published By: Microsoft Surface     Published Date: Feb 14, 2017
There’s a big change happening in how small and medium-sized businesses (SMBs) think about IT security as they take advantage of mobility and the cloud. They’re recognizing the need for mobile device management (MDM), cloud security, and the importance of choosing the right devices.
Tags : 
    
Microsoft Surface
Published By: Microsoft Surface     Published Date: Feb 14, 2017
In an increasingly competitive environment, ideas can differentiate businesses and fuel their growth. SMBs need to get behind ideas and the people that create them. They can do that by encouraging a culture in which ideas thrive, and by giving people the tools they need to shape, share, and sell their ideas.
Tags : 
    
Microsoft Surface
Published By: Microsoft Surface     Published Date: Jun 30, 2017
The Natural Progression of the Digital Experience Our notes are the gatekeepers to discovery. From alternating current to the lithium battery, the flick of a pen is often the first stage of every great idea, but how many other great discoveries and connections have we missed, simply because we didn’t write something down?
Tags : 
    
Microsoft Surface
Published By: Microsoft Surface     Published Date: Jun 30, 2017
The Natural Profession of the Digital Experience Our notes are the gatekeepers to discovery. From alternating current to the lithium battery, the flick of a pen is often the first stage of every great idea, but how many other great discoveries and connections have we missed, simply because we didn’t write something down?
Tags : 
    
Microsoft Surface
Published By: Motorola     Published Date: May 05, 2010
Digital radio seemed to be the best route for NASCAR to achieve the key requirements surfaced in this study, which included their need to coordinate large numbers of radios, ensure absolute audio clarity, maintain consistent, reliable communications and have a radio that was durable enough to withstand a rough environment.
Tags : 
motorola mototrbo, communication system, digital radio, two-way radio, voice clarity, audio
    
Motorola
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
Multi-channel or cross-channel marketing: which is better? The differences seem subtle on the surface, but the results are vastly different.  Neolane's new white paper, titled, Multi-channel Marketing Hits the Wall,describes the perils of over-reliance on simplistic multi-channel campaigns, explains how to build the foundation for true cross-channel marketing, and includes real-world examples of organizations that made the transition.
Tags : 
neolane, multi-channel marketing, cross-channel marketing, cross-channel, direct marketing, crm software, custom content, deliverability
    
Neolane, Inc.
Published By: Ooyala     Published Date: Dec 02, 2014
While the definition of TV blurs across a multi-device landscape, the industry is still scratching the surface in terms of how big data can be applied to maximize personalization and profits.
Tags : 
multi-device, mobile video, multi-screen, mobile, tablets, long-form video
    
Ooyala
Published By: Q2 eBanking     Published Date: Jul 30, 2017
Many financial institutions see their customer data as one of their most valuable assets. Unlocking insights from that data helps FIs understand, anticipate and offer account holders the products and services they truly need. A major trend to unlocking customer insights is using machine learning to surface the behavioral intelligence buried in the large amount of account holder transactional data captured each and every day. In this paper, learn how a group of talented, enthusiastic analysts with an open approach to data can yield some very interesting and extremely valuable and actionable results. This approach, championed by Q2 Executive Vice President and CTO Adam Anderson, has led to a new platform, Q2 SMART, which provides powerful behavioral analytics for financial institutions, enabling growth while providing account holders with real value.
Tags : 
    
Q2 eBanking
Published By: Qualys     Published Date: Jan 08, 2015
The Critical Security Controls (CSCs), a well-known roadmap for enterprise information assurance published and maintained by the Council on CyberSecurity, is being widely adopted across financial and government sectors, according to the second SANS survey on CSC adoption. Download this report from SANS to find out why more and more organizations of various types consider the CSCs a reliable mechanism to reduce attack surfaces, increase visibility and improve protection and response.
Tags : 
critical security controls, csc adoption, enterprise information assurance, cybersecurity
    
Qualys
Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security, networking, it management
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
Continuous monitoring (CM) begets a process of continuous improvement that works to reduce attack surface and improve security posture, according to the 2016 SANS survey on CM conducted during the months of July to September. In it, 63% of respondents said CM was improving their security posture.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Quinstreet - Netapp     Published Date: Jun 11, 2012
On the surface, the move to consolidate IT resources and virtualize infrastructure might seem to be a straightforward exercise, but IDC found the process to be as challenging as any other high-reward project. Download this paper to learn more.
Tags : 
netapp, network storage, cloud computing, virtualization, storage efficiency, data storage, information management, nas
    
Quinstreet - Netapp
Start   Previous    1 2 3 4    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.