apt

Results 101 - 125 of 1636Sort Results By: Published Date | Title | Company Name
Published By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
    
Oracle CX
Published By: Cognizant     Published Date: Sep 19, 2017
Focus on creating consistent terminology in order to generate insights from the digital data encircling employees, partners, processes and customers.
Tags : 
data science, predictive analytics, applications services, systems integration, business process management, digital transformation, social mobile analytics cloud (smac), integrated cloud services
    
Cognizant
Published By: Gigamon     Published Date: Oct 25, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 25, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon
Published By: IBM     Published Date: Mar 28, 2018
The global electronics industry is the cornerstone of the digital economy and the Internet of Things (IoT). Electronic devices act as conduits for users’ digital experiences, which are now seamlessly enabled and updated in the cloud. The industry’s digital device success has also introduced its latest challenge: going beyond the device. Leveraging data to drive insights is key to delivering greater value. Doing so requires electronics firms to flawlessly integrate hardware, software, services and data while learning from and adapting to users. Through Digital ReinventionTM, they can combine digital approaches and data by design to drive new capabilities, changing business from the ground up
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM
Published By: gyro     Published Date: Sep 11, 2018
Although humor is featured in many of the most memorable ads of all time, it is still seldom seen in the world of business-to-business. Why? B-to-B professionals are afraid humorous ads may fall flat or — worse — damage brand image. In the first study of its kind, gyro and Research Now SSI have discovered that humor can be a powerful tactic for capturing attention and even prompting purchase consideration.
Tags : 
    
gyro
Published By: Oracle     Published Date: Aug 01, 2018
The Zero Data Loss Recovery Appliance’s benefits are compelling for any enterprise with a need to protect critical Oracle databases. The differences between this database recovery appliance and other approaches to data protection are stark. The Recovery Appliance leverages a combination of existing proven technologies and new developments that eliminate data loss and improve recovery. The elimination of periods between backups when database changes are not captured is also a major benefit, and the movement to a process of frequent or constant incremental backups provided by this appliance changes the game.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
    
Oracle
Published By: Lenovo UK     Published Date: Nov 07, 2018
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 08, 2018
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
    
Lenovo UK
Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
    
Preempt
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
A medida que las empresas se someten a la transformación digital (DX), se están moviendo hacia nuevos modelos de negocios que reconocen los datos como un recurso estratégico clave para potenciar las aplicaciones e impulsar las decisiones de negocios. Para lograr esto, es necesario transformar los datos que las organizaciones recolectan y administran en un valioso recurso de capital denominado “capital de datos”. La infraestructura y las cargas de trabajo tradicionales de TI no están diseñadas para impulsar la creación del capital de datos. La escala de los datos que se deben capturar, almacenar, proteger y poner a disposición para su uso, además de las necesidades de las aplicaciones de última generación (NGA) que las organizaciones de TI desarrollan para impulsar la creación del capital de datos, va más allá de las funcionalidades de la infraestructura tradicional en las áreas de rendimiento, escalabilidad, disponibilidad, flexibilidad y capacidad de administración. Para cumplir con e
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Au fur et à mesure que les entreprises effectuent une transformation numérique, elles se tournent vers de nouveaux modèles économiques qui reconnaissent les données comme une ressource stratégique essentielle pour alimenter les applications et favoriser les décisions métiers. Pour ce faire, il est nécessaire de transformer les données collectées et gérées par les entreprises en un capital important appelé « capital de données ». L’infrastructure et les charges de travail traditionnelles des technologies de l’information ne sont pas conçues pour favoriser la création d'un capital de données. L’ampleur des données qui doivent être capturées, stockées, protégées et disponibles à l’utilisation, ainsi que les besoins des applications de nouvelle génération (NGA) que les départements informatiques développent pour stimuler la création de ce capital de données dépassent les fonctionnalités de l’infrastructure traditionnelle dans le domaine des performances, de l’évolutivité, de la disponibili
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 20, 2019
Au fur et à mesure que les entreprises effectuent une transformation numérique, elles se tournent vers de nouveaux modèles économiques qui reconnaissent les données comme une ressource stratégique essentielle pour alimenter les applications et favoriser les décisions métiers. Pour ce faire, il est nécessaire de transformer les données collectées et gérées par les entreprises en un capital important appelé « capital de données ». L’infrastructure et les charges de travail traditionnelles des technologies de l’information ne sont pas conçues pour favoriser la création d'un capital de données. L’ampleur des données qui doivent être capturées, stockées, protégées et disponibles à l’utilisation, ainsi que les besoins des applications de nouvelle génération (NGA) que les départements informatiques développent pour stimuler la création de ce capital de données dépassent les fonctionnalités de l’infrastructure traditionnelle dans le domaine des performances, de l’évolutivité, de la disponibili
Tags : 
    
Dell EMC Storage
Published By: Dell DnCP     Published Date: Mar 06, 2019
À l’avenir, dans le monde professionnel, il sera de plus en plus question d’offrir des expériences de qualité supérieure à la fois aux employés et aux clients. Mettre à disposition des effectifs une meilleure technologie, notamment des écrans adaptés, est l’une des façons d’améliorer ces experiences. Nous offrons un large éventail d’écrans adaptés aux besoins et aux budgets métiers variables. Quel que soit votre domaine d’activité, Dell vous aidera à être plus productif.
Tags : 
    
Dell DnCP
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Une enquête menée par le groupe mondial d'études sur les marchés des technologies de l'information IDC auprès de 3 500 grands noms de l'informatique à travers le monde montre l'unanimité des entreprises au sujet de PC Lifecycle as a Service qui s'avère économique, rapide et mieux adapté aux employés. Dell PC as a Service (PCaaS) intègre le matériel, les logiciels, les services pour le cycle de vie et le financement dans une solution globale qui propose un prix unique et prévisible par mois et par siège, fourni par le Service financier de Dell. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Da die Mobilität von Mitarbeitern weltweit zunimmt und Unternehmen mehr in Tablet- und Laptop-PCs investieren, überdenken Organisationen ihre laufenden Investitionen in traditionelle PCs. Dennoch schätzen Einkäufer von Unternehmens-PCs nach wie vor die Sicherheit und Leistung von Desktop-Computing-Lösungen. Ihrer Meinung nach helfen neue Formfaktoren wie Mikro-PCs dabei, die Produktivität von Mitarbeitern zu steigern und ein angenehmes technisches Arbeitsumfeld zu schaffen, dass Ihnen mindestens so wichtig wie eine hohe Sicherheit ist. Dell beauftragte Forrester Consulting mit der Durchführung einer kundenspezifischen Studie mit 103 Entscheidungsträgern und Influencern aus den Bereichen Business und IT-PC in Nordamerika. Erfahren Sie mehr über Dell Lösungen in Zusammenarbeit mit Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Para mantenerse al día del crecimiento de la movilidad del negocio sin sucumbir a los riesgos potenciales, el equipo de TI debe ser capaz de afrontar de manera eficaz problemas complejos, desde el aprovisionamiento de servicios y la adquisición de dispositivos hasta la supervisión de la seguridad. ¿Por qué? Los trabajadores de la información necesitan acceso a información a menudo confidencial en una amplia variedad de dispositivos y aplicaciones de empresa desde donde estén. En otras palabras, las políticas de seguridad y privacidad que no obstaculicen la productividad del usuario final facultarán a los trabajadores y aumentarán su rendimiento. Descargue este documento técnico para obtener más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: May 08, 2019
How long would it take your IT team to get a batch of five fully provisioned laptops into the hands of your employees? What about a hundred laptops? A thousand? Depending on the size of your order, the time it takes to manually configure these devices, combined with shipping logistics, could mean days or weeks of delays for your end user. Dell Provisioning for VMware Workspace ONE® can solve this problem with minimal IT intervention. Download this whitepaper to find out more. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.