exploit

Results 1 - 25 of 252Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Jun 06, 2019
HR’s most confident leaders are using data, predictive insights and AI to transform HR into a new value driver. Discover what it takes to become an HR transformation trailblazer. Read this report to discover: • how trailblazers are exploiting uncertainty to drive new competitive advantage • which technologies HR leaders are investing in • what it means to integrate human and digital labour in a collaborative workplace • six priorities for forward-looking HR leaders.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence (AI), automation, Internet of Things (IoT), blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies.
Tags : 
    
Group M_IBM Q4'19
Published By: Panasonic     Published Date: Oct 10, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum.
Tags : 
    
Panasonic
Published By: NEC     Published Date: Dec 16, 2009
The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?
Tags : 
nec, business communication, productivity, unified communications, uc delivery
    
NEC
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Ability Commerce     Published Date: May 18, 2009
eCommerce Marketers who want to exploit the full potential of e-mail should develop plans to consistently grow their permission-based e-mail lists of customers and prospects. This allows them to build loyalty and promote cross-sell and up-sell opportunities.
Tags : 
ability commerce, seo, roi, pci, emarketing, email marketing, email acquisition, ecommerce, e-commerce, order management, load time, e-commerce solutions, email marketing services/software, list management
    
Ability Commerce
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There will be a ransomware attack on businesses every 14 seconds by the end of 2019 . Every 40 seconds, one of those attacks will prove successful , with devastating effects ranging from permanent loss of irreplaceable data to life-threatening interruptions to patient care. In years past, expert malware authors packaged up their know-how into costly exploit kits sold on the underground market. Cyber criminals had to recover high upfront costs before launching a campaign and realizing a profit. Today, ransomware-as a-service groups like Satan make it easier than ever before for would-be cyber criminals with minimal technical skills to launch attacks, offering free ransomware toolkits and hands-on help to manage campaigns and extort payments. Read our white paper to learn how CylancePROTECT® prevents Petya, Goldeneye, WannaCry, Satan, and many more from executing, with machine learning models dating back to September 2015, long before the ransomware first appeared in the wild.
Tags : 
    
BlackBerry Cylance
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Découvrez ce à quoi ressemblent les aujour cybermenaces aJectant les PME d'hui aKn d'aider votre entreprise à survivre, à réduire ses dé coûts d'exploitation et à se velopper en limitant l'exposition aux risques.Faites de la sécurité une priorité pour tous et protégez votre entreprise grâce à Cisco.
Tags : 
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Learn why replacing servers is often delayed. Confronted with competing business priorities, limited budgets and personnel, and a sense of comfort as current servers reliably hum along, delay is easy to rationalize. Yet, delays are not without risk and trade-offs. Cases in point are two circumstances that small and midsized enterprises should seriously consider and, in our opinion, initiate action now. Discover why the new era of cyber warfare aimed at exploiting hardware vulnerabilities and the End-of-Support for Windows Server 2008/2008 R2 means delaying server replacement leaves SMB IT open to risk.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
La transformation numérique est incontournable pour les entreprises de taille moyenne (de 100 à 999 salariés) si elles veulent prospérer dans l’économie numérique. La transformation numérique permet aux entreprises d’augmenter leur avantage concurrentiel au travers d’initiatives telles que l’automatisation des processus métier, l’amélioration de l’efficacité opérationnelle, le renforcement des relations client, et la création de nouvelles sources de revenus basées sur des produits et des services reposant sur la technologie. La transformation numérique est un parcours. Ce parcours commence avec des entreprises qui adoptent une vision centrée sur l’informatique pour favoriser une stratégie elle-même centrée sur les données et les analyses. Le résultat des initiatives de transformation numérique dépend de la capacité d’une entreprise à exploiter efficacement les talents, les processus, les plates- formes et la gestion pour atteindre les objectifs commerciaux de l’entreprise.
Tags : 
    
Hewlett Packard Enterprise
Published By: SAP     Published Date: May 18, 2014
Forrester conducted in-depth surveys with 330 global BI decision-makers and found strong correlations between overall company success and adoption of innovative BI, analytics, and big data tools. In this paper, you will learn what separates the leading companies from the rest when it comes to exploiting innovative technologies in BI and analytics, and what steps you can take to either stay a leader or join their ranks.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Over the past several years, the IT industry has seen solid-state (or flash) technology evolve at a record pace. Early on, the high cost and relative newness of flash meant that it was mainly relegated to accelerating niche workloads. More recently, however, flash storage has “gone mainstream” thanks to maturing media technology. Lower media cost has resulted from memory innovations that have enabled greater density and new architectures such as 3D NAND. Simultaneously, flash vendors have refined how to exploit flash storage’s idiosyncrasies—for example, they can extend the flash media lifespan through data reduction and other technique
Tags : 
    
Hewlett Packard Enterprise
Published By: SAS     Published Date: Jan 17, 2018
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
    
SAS
Published By: Adobe     Published Date: Mar 21, 2017
Il suffit de se promener en ville ou de se rendre dans une entreprise pour constater que le mobile est devenu le nouveau système d’exploitation de l’humanité. Le téléphone envahit nos vies. Il nous réveille le matin, nous propose des itinéraires de remplacement pour éviter les bouchons ou nous permet d’obtenir un bon de réduction dans la queue d’un fast?food.
Tags : 
    
Adobe
Published By: Cisco     Published Date: Jun 21, 2016
En adoptant de nouvelles technologies, telles que le cloud, la mobilité, le Big Data et l'Internet des objets, vous améliorez les interactions entre les personnes, les processus, les données et les objets, et tirez le meilleur parti des connexions réseau et des ressources disponibles. L'IT prend également une nouvelle dimension dans l'entreprise. Pour rester en phase avec les objectifs de l'entreprise, le département IT doit innover et offrir des solutions performantes encore plus rapidement. L'infrastructure intégrée Cisco UCS® (Cisco Unified Computing System™) vous permet de migrer vers le Fast IT, un nouveau modèle IT qui transforme votre infrastructure de data center en un environnement rapide, agile, intelligent et sécurisé. Faites tomber les barrières informatiques qui freinent votre croissance et créez des solutions qui exploitent tout le potentiel des nouvelles connexions et informations.
Tags : 
    
Cisco
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Dell EMC     Published Date: Nov 26, 2018
La technologie Dell EMC pour l’industrie exploite le stockage, les stations de travail et le calcul hautes performances en combinant leurs fonctionnalités pour améliorer les produits, développer des processus de conception et de production plus efficaces et répondre aux préférences en constante évolution des clients. La collecte, l’assemblage et l’intégration d’un nombre croissant de données dans l’ensemble de l’écosystéme, de la modélisation du produit aux tendances d’aprés-vente, font de l’usine numérique une réalité puissante et nécessaire dans l’environnement de production. En savoir plus sur les solutions Dell en collaboration Intel® Xeon® processors
Tags : 
    
Dell EMC
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
L'ère numérique a engendré une prolifération de données qui alimentent les entreprises modernes. Les entreprises qui savent exploiter ces données connaissent les bénéfices qu'elles peuvent en tirer dans tous les aspects de leur activité. L'utilisation des données au service de différents flux de travail, analyses et activités les transforme en capital : une ressource numérique qui créera de la valeur pour l'entreprise. La mesure dans laquelle une entreprise prend en compte ce capital de données, à la fois dans la manière dont elle utilise les données et dans la manière dont elle investit dans la technologie des données, peut avoir un impact durable sur la réussite de l'entreprise. En février 2019, Dell EMC et Intel ont demandé à Forrester Consulting de déterminer si la capacité de maîtriser et d'appliquer des données et des procédures d'analyse à chaque opportunité s'imposait rapidement comme une condition préalable à la réussite. Pour le vérifier, Forrester a mené une enquête mondiale
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 22, 2019
Aujourd’hui, les entreprises ont besoin d’une infrastructure de stockage de fichiers hautement évolutive, sécurisée et multi-Cloud. Dell EMC, l’un des leaders du marché, vient de dévoiler son système d’exploitation Dell EMC Isilon OneFS 8,2, ainsi qu’Isilon H5600, un nouveau nœud de stockage NAS hybride, plus rapide et plus compact. Grâce à ces nouvelles innovations, Isilon permet aux organisations d’accélérer les nouvelles charges de travail, de créer de nouvelles opportunités, de gagner en efficacité, et d’accélérer ainsi considérablement la modernisation de leur infrastructure informatique.
Tags : 
    
Dell EMC Storage
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: SAS     Published Date: Nov 04, 2015
Big data evolution: forging new corporate capabilities for the long term is an Economist Intelligence Unit report, sponsored by SAS. It explores how far along companies are on their data journey and how they can best exploit the massive amounts of data they are collecting.
Tags : 
sas, big data, big data evolution, economist intelligence unit, eiu, data journey
    
SAS
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Targeted threats are increasing at an alarming rate. Malicious actors are evolving their methodologies and are increasingly exploiting the domain name system (DNS) to launch cyberattacks. Learn more about how to proactively protect your company with an additional layer of cloud-based security.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.