fte

Results 201 - 225 of 1759Sort Results By: Published Date | Title | Company Name
Published By: LogRhythm     Published Date: Apr 04, 2017
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.
Tags : 
    
LogRhythm
Published By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : 
hack, malware, intellectual, property, compliance
    
LogRhythm
Published By: MobileIron     Published Date: Apr 20, 2015
Diese Anleitung beschreibt nicht nur, wie Enterprise Mobility Management funktioniert, sondern zeigt auch an einem typischen Implementierungsbeispiel, wie ein Unternehmen die Einführung plant und alle Teile einer EMM-Lösung verwaltet. Diese Anleitung enthält einen detaillierten Bereitstellungsprozess unter Verwertung der gesammelten Erfahrungen und Empfehlungen zur Suche nach dem richtigen EMM-Anbieter und Schritt für Schritt umsetzbare Erkenntnisse aus der Praxis, die jedem Unternehmen bei der Umwandlung zum Mobile-First-Unternehmen helfen können.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering
    
Burton Group
Published By: Symantec     Published Date: Sep 14, 2015
When organizations fail to integrate their people, processes, and technology, it hinders their ability to quickly detect and respond to an incident and keep it from becoming a data breach. The result? Increased risk for every security incident they face. The proposal? Execute a holistic approach that address the before, during, and after stages of a potential breach.
Tags : 
data breach, data security, increased risk
    
Symantec
Published By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungs- und DDoS-Angriffe lassen sich nicht vorhersehen und treffen Unternehmen ohne Vorwarnung. Für die meisten DDoS-Angriffe (Distributed Denial of Service) ist nicht viel Know-how erforderlich. Angreifer können günstig Ressourcen mieten, die auf entsprechenden Seiten leicht zu finden sind. Trotz des geringen Preises führen DDoS-Angriffe zu vielen Problemen: • Betriebsunterbrechung • Verlust vertraulicher Daten • Niedrigere Nutzerproduktivität • Rufschädigung • Beeinträchtigung von Partnerschaften und Kundenbeziehungen • Umsatzverlust Je nach Branche können sich so schnell Schäden von Zehntausenden US-Dollar ergeben – in einigen Fällen geht der Schaden sogar in die Millionen. Nur 2 % der Unternehmen gaben an, ihre Webanwendungen seien in den vergangenen 12 Monaten nicht Opfer eines Angriffs geworden. Bei 98 % war das Gegenteil der Fall.
Tags : 
    
Akamai Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Banken, Vermögensberater, Zahlungsanbieter und andere Finanzinstitutionen erleben tief greifende Veränderungen in Form von sich entwickelnden Marktanforderungen und neuen Vorschriften. Diese Unternehmen müssen ihre etablierten Prioritäten, Prozesse und Produkte überdenken, um das Fundament für den künftigen Erfolg zu legen. Software ist der Schlüssel.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Banken, Vermögensberater, Zahlungsanbieter und andere Finanzinstitutionen erleben tief greifende Veränderungen in Form von sich entwickelnden Marktanforderungen und neuen Vorschriften. Diese Unternehmen müssen ihre etablierten Prioritäten, Prozesse und Produkte überdenken, um das Fundament für den künftigen Erfolg zu legen. Software ist der Schlüssel.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Data center refresh cycles and new initiatives tied to business growth and revenue opportunities are leading more organizations to deploy integrated systems, including both converged and hyper-converged infrastructures. IT leaders can see the potential benefits of converged, integrated systems but as applications increase in complexity, virtual workloads grow, and resource demands expand, managing these applications becomes a critical and often stubborn challenge.
Tags : 
application delivery services, systems deployments, integration, idg research, integrated system approach, networking, business technology
    
F5 Networks Inc
Published By: HP Ecommerce     Published Date: Dec 10, 2015
In today’s user-centric world, applications are increasingly at the heart of how your customers experience your products and services. Consistently good application performance is now essential to business success. This is where the quality of application performance enters the picture. Given the complexities of today’s modern application environments, applications should be tested early, often, and thoroughly in the development cycle using processes and solutions to fit your specific needs. To help your organization meet this objective, this interactive brochure explores an eight-step framework for better application performance. This framework begins with business requirements and culminates in the ongoing optimization of your application performance. With its expansive application software portfolio, HP covers all of the steps in this framework.
Tags : 
    
HP Ecommerce
Published By: Mitel     Published Date: Apr 07, 2017
Für intelligentere Geschäfte Die heutige Geschäftswelt wird zunehmend schnelllebiger, wettbewerbsorientierter und globaler, außerdem nimmt der Einfluss von Technologie immer mehr zu. Kulturelle, technologische und physische Elemente greifen ineinander und treiben den Wandel voran wie nie zuvor. Gefordert wird eine freiere Arbeitsgestaltung, der Trend zur „BYOD“-Praxis (bring your own device) setzt sich immer weiter durch, echnologieinnovationen und neue Geräte, Plattformen und Anwendungen halten immer weiter Einzug und internationale und regionale Grenzen werden überwunden.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Jun 29, 2016
Dagens affärsvärld rör sig allt snabbare. Konkurrensen blir tuffare, tekniken mer avancerad och spelfältet är globalt. Kultur, teknik och fysiska element samverkar och gör att förhållandena förändras snabbare än någonsin. Ett exempel är att allt mer frihet efterfrågas när det gäller sättet att arbeta, och trenden med egna enheter (BYOD). Ett annat är att tekniken utvecklas allt snabbare med nya enheter, plattformar och tillämpningar. Allt detta gör att gränserna mellan länder och regioner suddas ut allt mer.
Tags : 
bästa praxis, företag optimering, företagsledning, produktivitet, business intelligence, work 3.0, bring your own device
    
Mitel
Published By: IBM     Published Date: Mar 05, 2014
For many years, companies have been building data warehouses to analyze business activity and produce insights for decision makers to act on to improve business performance. These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse. Typically, a history of business activity is built up over a number of years allowing organizations to use business intelligence (BI) tools to analyze, compare and report on business performance over time. In addition, subsets of this data are often extracted from data warehouses into data marts that have been optimized for more detailed multi-dimensional analysis.
Tags : 
ibm, big data, data, big data platform, analytics, data sources, data complexity, data volume, data generation, data management, storage, acceleration, business intelligence, data warehouse
    
IBM
Published By: IBM     Published Date: May 02, 2014
These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse.
Tags : 
ibm, big data platform, architecting big data, analytics, intelligent business strategies, data complexity, data types, workload growth, workload complexity, big data analytic applications, operational decisions, multi-structured data, querying data, scalable data management, analytical ecosystem, hadoop solutions, it management, data management, data center
    
IBM
Published By: Intel     Published Date: Apr 11, 2019
Restaurants, like many industries, are data-rich environments that often do not have the tools or technologies to gather and mine the value from this data. Fast food chain automation is changing how restaurants calculate and manage costs on a daily basis. ARDIC's IoT-Ignite* analytics solution combines with Intel® technologies to gather, filter, and analyze key variables to automate operations in fast-moving environments. For restaurants, benefits include reduced waste, insight into customer behaviour, and operational efficiency—with positive impact on the bottom line.
Tags : 
    
Intel
Published By: VMTurbo     Published Date: Mar 25, 2015
An Intelligent Roadmap for Capacity Planning Many organizations apply overly simplistic principles to determine requirements for compute capacity in their virtualized data centers. These principles are based on a resource allocation model which takes the total amount of memory and CPU allocated to all virtual machines in a compute cluster, and assumes a defined level of over provisioning (e.g. 2:1, 4:1, 8:1, 12:1) in order to calculate the requirement for physical resources. Often managed in spreadsheets or simple databases, and augmented by simple alert-based monitoring tools, the resource allocation model does not account for actual resource consumption driven by each application workload running in the operational environment, and inherently corrodes the level of efficiency that can be driven from the underlying infrastructure.
Tags : 
capacity planning, vmturbo, resource allocation model, cpu, cloud era, it management, knowledge management
    
VMTurbo
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data.
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: AuditBoard     Published Date: Nov 26, 2018
When the IASB and FASB issued a joint press release on May 28, 2014 1 announcing new revenue recognition standards for revenue from contracts with customers, the adoption deadline seemed a long way off. After pushback from companies across various industries, the implementation date was extended by one year, granting companies more time to update their policies and systems to adhere to the new standards.
Tags : 
    
AuditBoard
Published By: Arial Software     Published Date: Aug 22, 2007
Email marketing should be considered a key component of a company’s overall marketing strategy. In the past many companies treated email marketing as an afterthought, failing to devote the talent and resources needed to affect an appreciable return on investment. To get the most out of an ongoing email marketing campaign, a quality team of knowledgeable professionals must be assembled.
Tags : 
staffing, hiring, marketing, marketing manager, email marketing, email marketing manager, marketing director, staff, hire, leader, arial, arial software, graphic designer, deliverability, newsletter, enewsletter, e-newsletter, email design
    
Arial Software
Published By: IBM     Published Date: Sep 18, 2008
Powering your IT hardware often costs more than double the price of the actual machine. While this fact alone motivates businesses to build more energy efficient data centers, IBM's Project Big Green details the additional operational and social benefits for businesses. Read more on IBM's holistic approach to reducing your IT energy use to save you money.
Tags : 
ibm, network management, networking, green, green computing, green datacenter, green data center, data center, environmental
    
IBM
Published By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that when properly designed, built and operated, are an integral part of the business strategy driving the success of any enterprise, yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems, with little thought given to the structure and space in which it is to be housed, serviced and maintained. This invariably leads to facility infrastructure problems, such as thermal hot spots, lack of UPS, rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: Oracle Primavera     Published Date: Oct 09, 2015
Asset intensive organizations like Oil and Gas have their own industry specific challenges when it comes to managing their asset's lifecycles. One area that is often overlooked or pushed off until the last minute is the decommissioning phase of their assets. Leaders in the industry turn to three areas to transform their business-Risk and Financial Management, Operational Excellence, and Innovation
Tags : 
oracle, asset decommissioning, oil and gas, oil and gas industry, risk management, financial management, operational excellence, innovation, project management, portfolio management
    
Oracle Primavera
Published By: Webroot UK     Published Date: Aug 07, 2013
Whether you are using virtual desktops or virtual servers it's essential that you consider protecting them from malware. Unfortunately, until now, that protection has often meant making some serious compromises.
Tags : 
virtualization, security, virtual desktop, virtual servers, protection
    
Webroot UK
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.