overview

Results 1 - 25 of 653Sort Results By: Published Date | Title | Company Name
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
This Technology Brief is divided into two parts. The first part discusses the evolution of Ethernet, and then focuses on 10 Gigabit Ethernet and related transceiver and cabling technologies. The second part examines BLADE’s RackSwitch product line, including 10 GbE applications within enterprise networks and data centers.
Tags : 
enterprise data centers, blade’s rackswitch, 10gbe applications, enterprise networks, blade network technologies, evolution of ethernet, cabling technologies, it management, storage
    
BLADE Network Technologies
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: ServiceSource     Published Date: Nov 01, 2013
How strong is your renewal program? Are you able to predict and analyze your performance correctly? ServiceSource® believes that the real yardstick of renewal performance lies in a comprehensive set of key performance indicators (KPIs) that can tell a much broader story. Over the last 13 years and over 145 engagements, we’ve identified these twelve critical factors for successfully measuring and growing your renewal revenue. This whitepaper provides a detailed overview of those KPIs.
Tags : 
reducing customer churn, servicesource, maximize revenue, essential kpis, renewal opportunity, renewal results, sales process, performance drivers, trends and information, buying behaviors, key performance indicators, revenue performance, drive exceptional results
    
ServiceSource
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Coupa Software     Published Date: Nov 04, 2014
Modern eProcurement solutions promise greater efficiency through improved AP integration, tighter controls, standardized processes, and supplier connectivity. This Paystream Advisors survey report focuses on current attitudes toward eProcurement solutions, how they're being used, and why (and how) that usage is changing. The report also includes an overview of eProcurement capabilities, best practices, and selection criteria.
Tags : 
eprocurement solutions, efficiency, integration, tighter controls, standardized process, best practices, procurement, p2p
    
Coupa Software
Published By: IBM     Published Date: Oct 13, 2015
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, ibm managed security services, cyber security, data, threat, malware, index
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, threat, data
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, overview, threats, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats, knowledge management
    
IBM
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : 
citrix, cyberthreat, infographic, 2015 report
    
Citrix Systems, Inc.
Published By: IBM     Published Date: May 12, 2015
This guide provides a quick overview of the solutions IBM offers aligned to the three ‘imperatives’ facing the retail industry - to deliver a Smarter Shopping Experience, to build Smarter Merchandising and Supply Networks and to drive Smarter Operations.
Tags : 
retail solutions, merchandising, customer experience, supply networks, operations, digital commerce, e-commerce
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
This guide provides a quick overview of the solutions IBM offers aligned to the three ‘imperatives’ facing the retail industry - to deliver a Smarter Shopping Experience, to build Smarter Merchandising and Supply Networks and to drive Smarter Operations.
Tags : 
ibm, retail solutions, retail industry, supply networks, omni-channel commerce, retail security, performance insights
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : 
ibm, security, ibm x-force, cyber security intelligence index., cyber security, intelligence, business technology
    
IBM
Published By: Citrix Systems     Published Date: Jul 25, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2016 Cyberthreat Defense Report.”
Tags : 
    
Citrix Systems
Published By: Secureworks     Published Date: Oct 04, 2017
Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016.
Tags : 
    
Secureworks
Published By: eDataSource     Published Date: Apr 13, 2015
Looking to improve your email campaigns? Now you can with 3 remarkable email tools. Competitive Tracker - email data & creative on what your direct competitors are doing. Design Tracker, powered by Litmus - pre test the campaign before you hit send button. Inbox-tracker - know in real-time your inbox delivery. Learn more by downloading our quick overview white paper.
Tags : 
edatasource, email tools, email data, competitive tracker, design tracker, inbox-tracker
    
eDataSource
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview covering threat management, identity and access, data protection, and monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview animation covering threat management, identity and access, data protection, monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, animation, business technology, data center
    
Intel
Published By: Intel Corp.     Published Date: Jul 09, 2012
Enterprise performance and embedded security technology benefits are covered in the 3rd gen Intel® CoreT vProT processor overview.
Tags : 
intel, 3rd generation, core vpro
    
Intel Corp.
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
    
VMware AirWatch
Published By: CodeBaby     Published Date: Nov 27, 2012
Healthcare organizations are integrating intelligent virtual assistants to enhance online experience and reduce costs. This guide overviews the capabilities and benefits of using virtual assistants to engage, optimize, and complement existing service channels.
Tags : 
online self-service, customer experience, customer service, intelligent virtual assistants, conversion optimization, tech support, crm, web self-service, contact center management, virtual agent, knowledgebase, ecommerce, mcommerce, live chat, website optimization, multi-channel branding, business technology
    
CodeBaby
Published By: Scalebase     Published Date: Mar 08, 2013
Technology analyst firm 451 Research offers a brief overview of ScaleBase’s Data Traffic Manager software for dramatic scaling of MySQL databases beyond the capabilities of MySQL 5.6.
Tags : 
shard, cluster, high availability, failover, mariadb, mysql, read/write, scalability, capacity planning, scalebase, 451 group overview, research, it management, data management, business technology, data center
    
Scalebase
Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.