man the middle

Results 26 - 45 of 45Sort Results By: Published Date | Title | Company Name
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
This survey of senior managers and directors was conducted in four regions – North America, Europe, the Middle East and Africa (EMEA), Central and South America, and Asia-Pacific – with the aim of discovering attitudes towards and plans for the adoption of cloud based supply chain management (SCM) solutions. We focused on three key areas: 1. The criticality of supply chain to their business 2. How to reach their business objectives through supply chain processes 3. The propensity to use the supply chain cloud and reasons for adopting/not adopting
Tags : 
cloud, scm, supply chain management, cloud computing
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
Do attitudes to IT adoption vary depending on your seniority within a business? And could this be holding back adoption of technology? These are key questions explored in this paper, which compares the views of mid-level ‘hands on’ IT managers with those of senior directors within British companies. Across both groups, there is a sense that UK business in general is too wary of implementing new technology. But there is a significant divergence of opinion when it comes to a range of factors, such as the extent to which companies invest in new technology, stay on top of the latest tech, and understand its importance to the success of the business. A pattern emerges, whereby the senior leaders within companies are far happier than middle managers with the status quo around technology adoption. And IT managers even suggest that this might be driven by self preservation on the part of senior leaders.
Tags : 
video conferencing, instant messaging, cloud based computer system, fixed phone line, pbx, cloud based telephony system, call analytics, byod, wearable technology
    
8x8 Inc.
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: Equinix     Published Date: Jul 11, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content
    
Equinix
Published By: Equinix     Published Date: Jul 07, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content
    
Equinix
Published By: Red Hat     Published Date: Jun 23, 2016
The Middleware Services Group within Information Technology Services (ITS) at the University of North Carolina at Chapel Hill needed a comprehensive, dynamic solution for frequent server provisioning requests and, in particular, managed servers. Without such a solution, the likelihood that users would employ outside vendors significantly increased. Use of outside vendors would potentially increase security concerns, present additional costs, and further complicate system administration. Moving to a fully-interoperable Platform-as-a-Service (PaaS) offering, built on OpenShift Enterprise by Red Hat, has allowed the middleware services team to deliver a flexible development and hosting environment that has fostered innovation and increased peace of mind.
Tags : 
best practices, technology, productivity, enterprise, red hat
    
Red Hat
Published By: AWS     Published Date: Jun 15, 2016
If cloud architectures were human beings, their development stage would fall squarely in the middle of adolescence. Enterprises are at an inflection point with their cloud deployments as they migrate from ad hoc projects to full-fledged, mature, integrated cloud architectures. The discussion around cloud reflects the trepidation and uncertainty that come with adolescence: Cloud advocates express excitement, whereas others voice concern about these developments.
Tags : 
    
AWS
Published By: BI WORLDWIDE     Published Date: Mar 07, 2016
If you’re a sales manager, you’re probably feeling stuck in the middle. On one hand, you have a huge employee engagement movement going on with HR departments focusing on developing leaders and recognizing achievements with substantial budgets. On the other side, marketing departments are using technology and creativity (and also large budgets) to connect with and educate customers about their products, solutions and brands. The trend is to challenge every dollar spent on sales compensation to maximize ROI. HR departments are treating salespeople like all other employees. And customers are going online to avoid anyone with sales in their title. Based on our research and applications we see in our customers’ leading sales initiatives, if you’re a sales manager, you are trying to maximize results out of your sales team by increasing your teams engagement to meet company goals. Download this white paper to see which eight trends you should consider as you strategize for the year.
Tags : 
bi worldwide, sales, incentives, effectiveness, sales incentive, productivity, engagement, business technology
    
BI WORLDWIDE
Published By: Entrust Datacard     Published Date: Nov 24, 2015
This guide explores how EV certificates reduce phishing and man-in-the-middle attacks, bring trust, reduce shopping cart abandonment, protect brand and provide support saving.
Tags : 
verification, ev certificates, identification, extended validation ssl certificates, security
    
Entrust Datacard
Published By: IBM     Published Date: Apr 09, 2015
Discover service virtualization and how it fits into the big picture of software quality. In this book, Service Virtualization For Dummies, IBM Limited Edition written by industry analysts Marcia Kaufman and Judith Hurwitz, learn how to deliver higher quality software by increase the efficiency and effectiveness of your testing processes while reducing testing downtime and testing cost. The book covers the following topics and more: • Understand the changing relationship between IT and business — quicker delivery is required • Examine today’s complex applications — mobile, web, social meet middleware, packaged apps, databases, and mainframes. • Discover how to begin with service virtualization — build your business case. • Realize the benefits of service virtualization —enable earlier testing to eliminate surprises and reduce risk.
Tags : 
service virtualization, software quality, testing processes, software testing, packaged apps, delivery, ibm, software development, it management, business technology
    
IBM
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
Many people view middle managers as having the ultimate “cushy” job. In reality, middle managers are the key to turning top-line strategy into day-to-day action. Successful middle managers keep their teams motivated by using recognition that is timely, specific, sincere and positive. Learn how to harness the power of your middle managers to develop a culture of recognition in your organization.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, employee programs, recognition ideas, employee motivation, recognition program ideas
    
BI WORLDWIDE
Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.
Tags : 
osterman research, cybercriminals, cybercrime, email-based malware, spearphishing, short urls, advanced persistent threats, phishing emails, man-in-the-middle attacks, spam, botnets, ransomware, scareware, mcafee email protection, it management
    
McAfee
Published By: BlackLine     Published Date: Sep 12, 2014
The survey’s findings highlight how the role of finance professionals at middlemarket firms is being viewed as every bit as transformational as that of finance professionals employed by large-enterprise firms. Although there are many studies on change management and finance, the role of middle-market finance professionals has not always received the attention that it has in larger firms.
Tags : 
finance professionals, middlemarket, actionable data, large-enterprise firms, middle-market finance
    
BlackLine
Published By: Acxiom Corporation     Published Date: Jun 20, 2014
Consumers demand – no, expect – marketers to deliver highly relevant communications. Yet, daily headlines about security and privacy keep them on guard about use of their personal information. How do you reconcile the personalization privacy paradox? Guest speaker, Forrester Research, Inc.’s Fatemeh Khatibloo and Bryan Throckmorton of Acxiom will offer fresh findings on customer expectations regarding privacy and examples of how companies are building transparency and trust – and differentiating themselves – with preference centers that put more control in the hands of customers.
Tags : 
acxiom, forrester research, privacy, personalization, personal information, marketing, personalization privacy, business technology
    
Acxiom Corporation
Published By: SafeNet     Published Date: Sep 08, 2010
Find out about the most effective defense against MitB attacks.
Tags : 
safenet financial services, secure browser authentication, man-in-the threats, mitb, man-in-the-middle, mitm, security
    
SafeNet
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: Arcot     Published Date: Jun 04, 2008
Solutions including one-time-password (OTP) generator tokens, do not offer the same level of protection as the ArcotID against attacks such as the man-in-the-middle attack. The ArcotID secure software credential provides protection against common Internet threats and several futuristic attacks that are becoming popular among fraudsters.
Tags : 
authentication, digital signature, password management, cardholder authentication, arcot, smartcard
    
Arcot
Published By: Arcot     Published Date: Jun 04, 2008
Man-in-the-Middle attacks can defeat most kinds of multi-factor authentication, including OTP tokens. Financial institutions, brokerages, and other likely targets of MITM attacks should consider the ability of their countermeasures to defeat MITM attacks, as these types of attacks will continue.
Tags : 
authentication, identification, identity, identity theft, arcot, man in the middle, man-in-the-middle, mitm
    
Arcot
Previous    1 2     Next   
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.