> Technology > Business Technology
 

Business Technology

Results 276 - 300 of 4257Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Sep 30, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Discover how an integrated approach to access management can reduce complexity and thwart security breaches
Tags : 
ibm, security, access management, access manager, business technology
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Having an integrated approach to access management for mobile, web and cloud applications is essential to taking control of access management.
Tags : 
ibm, security, access management, access manager, integrated access management
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : 
ibm, security, access management, access manager, kuppingercole
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Address budget shortages and skills gaps with cloud-based Security Intelligence & Analytics. Use a Software-as-a-Service solution to replace aging security technologies and deploy a market leading solution in only weeks. Read how you can focus on monitoring the environment rather than updating software, and replace up-front capital costs with a monthly operational fee.
Tags : 
business technology
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud, networking
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, security, maturity, gartner, magic quadrant
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
ibm, security, web fraud, malware, cybercrime
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
ibm, security, web fraud, fraud protection, cyber security
    
IBM
White Paper Published By: Salesforce Commerce Cloud     Published Date: Sep 29, 2016
The concept of distributed commerce, the ability for consumers to buy on any Internet-connected device or application, could have a profound impact on retail. As a result, integrating new means of engagement and commerce – quickly and at scale – is vital. In this whitepaper from Salesforce Commerce Cloud, formerly Demandware, you’ll see how every touchpoint is a transaction and how retailers can adapt. Download now!
Tags : 
demandware, commerce, retail, shopping, shopping journey
    
Salesforce Commerce Cloud
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : 
akamai, cybersecurity, security, ddos, ddos attack
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Read this guide to learn the key security capabilities that a web application firewall (WAF) can deliver to defend your web applications and to get ideas for extending your existing WAF and improving web application security.
Tags : 
akamai, security, cybersecurity, web application security, web application firewall
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
This infographic will walk you through a few key questions around your web applications.
Tags : 
akamai, attackers, cyber attacks, cybersecurity, web applications
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
Tags : 
akamai, bots, scrapers, bot traffic, security
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale—you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
Tags : 
akamai, web, dns, infrastructure security, sql
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : 
akamai, state of the internet, security, security report, cybersecurity
    
Akamai Technologies
White Paper Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security
    
BitSight Technologies
White Paper Published By: Epicor     Published Date: Sep 26, 2016
Download this eBook for a closer look at how online efforts are driving business growth including: - Where is eCommerce headed? Well, where would you like it to go? - What matters most to distributors in eCommerce? - What about eCommerce and ERP? - Distributor ERP best practices - Epicor eCommerce solutions
Tags : 
epicor, ecommerce, ecommerce solutions, distributors, erp
    
Epicor
White Paper Published By: Epicor     Published Date: Sep 26, 2016
Simple, economic, and reliable reasons distributors are moving to the cloud
Tags : 
epicor, cloud, distributors, cloud technology, cloud system
    
Epicor
White Paper Published By: Epicor     Published Date: Sep 26, 2016
In this report, Mint Jutras references data collected from its 2016 Enterprise Solution Study, investigating goals, challenges and status and performance of software used to run a business.
Tags : 
epicor, digital distributor, distributor, mint jutras, enterprise solution study
    
Epicor
White Paper Published By: Macola     Published Date: Sep 26, 2016
Manual business processes are cumbersome and time consuming, so how do you know when the time is right for your business to upgrade? Download now and consider these five signs.
Tags : 
exact, exact software, macola, erp, manufacturing
    
Macola
White Paper Published By: IBM     Published Date: Sep 26, 2016
SPSS and open source seamlessly complement each other. With open source, IBM makes it easy to build your own extensions, adding new functionality to existing products. Coding is not required for the use of extensions. IBM offers an extensive library of already developed extensions that can be downloaded and used immediately.
Tags : 
ibm, ibm spss, open source, statistics, modeler
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.