web methods

Results 1 - 25 of 36Sort Results By: Published Date | Title | Company Name
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : 
prophix, best practices, performance management, business analytics, productivity
    
Prophix
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies
Published By: IBM Watson Health     Published Date: Dec 20, 2018
In this webinar, experts discuss how data and analytics can be applied to improve health program outcomes and how social determinants of health affect risk. It includes a case study on how the application of advanced analytic methods helped to decipher the impact of high-priced specialty drugs on the overall population. The experts also address how artificial intelligence can drive better decision-making, improve population health and cut costs.
Tags : 
government, health and human services, artificial intelligence, data, cognitive insights, long-term care, case study, analytics, social program management, spm, healthcare technology, high-priced drugs, specialty drugs, population health
    
IBM Watson Health
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security
    
Fortinet, Inc.
Published By: Red Hat     Published Date: Mar 11, 2016
Innovative and agile IT, as both a strategy and a means of delivering new applications, requires a fundamental shift in processes, applications, and infrastructure. This web book sheds light on the cloud infrastructure and tools required to support agile IT methods and applications and demonstrates why open source technology is the best way to achieve the full benefits of this new, rapid mode of IT service delivery.
Tags : 
    
Red Hat
Published By: M86 Security     Published Date: Nov 02, 2010
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
Published By: Acquia     Published Date: Sep 13, 2011
Considering migrating your website to open-source Drupal? This paper examines scenarios, reasons, and methods for migration. Learn about available tools and best practices to help make you successful.
Tags : 
acquia, drupal, open-source, evolving web trends, site assets
    
Acquia
Published By: NetIQ     Published Date: Dec 08, 2011
In this webcast IT security expert Matt Mosley will look at traditional detection methods and discuss discuss new alternatives to identify threats.
Tags : 
    
NetIQ
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : 
advanced threats, advanced targeted attacks, security, cybersecurity, it management, knowledge management, data management
    
ThreatTrack Security
Published By: Gladinet     Published Date: Mar 30, 2015
Public cloud storage solutions have become increasingly convenient as they enable anywhere access to files and folders for web browsers, desktops and mobile devices, with sync and share capabilities. And we have seen companies like Dropbox and Box leading the charge to popularize these public cloud access methods. However, despite the convenience they provide, many enterprises (IBM, for instance) will not allow employees to use public services like Dropbox or Apple’s iCloud at work because they cannot tolerate the risk of trusting third-party cloud services to provide adequate security for their sensitive corporate data. The resulting challenge for large and small enterprises is to provide convenient access methods for corporate data while maintaining full control over the security of all data storage and data passage. Download this white paper today to learn how the private cloud combines the benefits of both a public cloud and VPN.
Tags : 
storage, cloud, dropbox
    
Gladinet
Published By: White Horse     Published Date: Oct 07, 2009
One of the biggest dilemmas for marketers today is how to evolve their marketing mix without breaking the bank on testing or sacrificing the predictable results of their established programs. In this Webinar, White Horse provides an overview of cross-channel modeling methods, weighing the pros and cons of each, and presents new tactics for sharpening marketing channel allocation for stronger, more measureable results.
Tags : 
integrated marketing, cross-channel marketing, digital marketing, digital advertising, marketing strategy, media mix, media planning, interactive marketing
    
White Horse
Published By: GoToWebinar     Published Date: Aug 01, 2011
Watch this on-demand webinar to hear pioneer presentation innovator Nancy Duarte, CEO of Duarte Design, demonstrate how to apply the methods in her book, Resonate: Presenting Visual Stories That Transform Audiences, to build meaningful connections with audiences that compel them to action. Her groundbreaking work details a new way of structuring presentations that helps the presenter create a human connection with audiences.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: nettime solutions     Published Date: Mar 04, 2014
This webinar covers the best practices, methods and standards for time off accruals that are enhancing PTO policies nationwide, while showing you how a customizable automated time and attendance platform can provide workforce analytics and labor management solutions — all from your web-browser.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform, stratustime, workforce analytics, labor management, management solutions, pto banks, flexibility, privacy, traditional pto, bank-type pto
    
nettime solutions
Published By: SyberWorks     Published Date: Oct 21, 2008
In most cases, the biggest quandary an organization must solve is to put together a rational, i.e., a cost justified, business case why they should spend capital to invest in a learning management system. The focus of this white paper will outline the benefits of web-based training along with a practical framework for developing ROI when looking at the cost of traditional training methods verses e-Learning.
Tags : 
syberworks, e-learning, roi, global workforce, just-in-time learning, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management
    
SyberWorks
Published By: GoToMeeting     Published Date: Oct 06, 2011
Whether you are speaking to an audience of 1 or 1,000, it's critical that you engage your listeners. Join this live webinar to hear presentation coach Tim Wackel share the 6 worst presentation habits that put barriers between you and your listener. You'll also learn unique and proven methods for conquering these habits so that you can become a more professional and inspiring presenter.
Tags : 
citrix, marketing, prospect, webinar, engagement, tim wackel
    
GoToMeeting
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, software development, it management, business technology
    
Cisco
Previous   1 2    Next    
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.