it teams

Results 251 - 275 of 818Sort Results By: Published Date | Title | Company Name
Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks
Published By: Cisco     Published Date: Sep 27, 2018
The pace of innovation for collaboration and unified communications (UC) technologies has been nothing short of incredible during the past few years. IT teams are now able to deliver consistent, simple and high- quality experiences with voice, video, messaging and chat from any smartphone, tablet, laptop or conference room system. Users can move seamlessly and securely from one device to the next, escalate from one communication mode to another and share content—all while retaining the context of the meeting or discussion.
Tags : 
    
Cisco
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 42.3% of respondents in ASEAN countries saying they deal with more than 50 alerts each day. Shockingly, for 7% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in ASEAN.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile
Published By: Lifesize     Published Date: Nov 23, 2015
Mitarbeiter an untschiedlichen Standorten zu führen muss nicht anders sein als mit ihnen im gleichen Gebäude zusammenzuarbeiten. Wie? Mit Videokommunikation. Telearbeit - Erfahren Sie, wie einfach (und selbstverständlich) es ist, Produktivität, Enthusiasmus und Leistung von verstreut arbeitenden Teams zu steigern.
Tags : 
tips for managing a remote workforce, video conferencing, benefits of using video conferencing, remote workers management, teleworking, employee performance, virtual meetings
    
Lifesize
Published By: Lifesize     Published Date: Nov 23, 2015
Jemandem von Angesicht zu Angesicht gegenüberzusitzen, übersteigt die Wirkung einer Audiokonferenz oder einer E-Mail. Doch die Möglichkeit, den Videoanruf später zu präsentieren und mit anderen Teams innerhalb des Unternehmens oder auch extern teilen zu können, stellt diese Technologie auf eine ganz neue Stufe. Erfahren Sie, wie die Aufzeichnung von Videokonferenzen und das Teilen ganz neue Möglichkeiten der Zusammenarbeit eröffnet.
Tags : 
video conferencing, video recording, hd video recording, benefits of video recording, video recording and sharing, collaboration, share video content, video recordings, webinars & web conferencing, sales
    
Lifesize
Published By: Dassault Systèmes     Published Date: Jul 25, 2017
Jim Brown, President of Tech-Clarity, explores how fast growing, midsized, High-Tech manufacturing companies can accelerate their time-to-market by streamlining their engineering and business processes on a unified platform. Watch the 20-min webinar and learn: • How a unified platform accelerates collaboration between all stakeholders of product development • How the principle of ‘invisible governance’ helps engineering teams save time on unnecessary reporting and administration • How online collaboration helps build customer intimacy and validate product ideas early and effectively • How modern, secure social collaboration platforms can smoothly transition to structured product development
Tags : 
project management, company optimization, execution, product development, research report, web based, business impacts
    
Dassault Systèmes
Published By: CA Technologies     Published Date: Sep 11, 2014
This paper provides a number of capabilities your organization should look for in a Service Virtualization solution, enabling your extended teams to get high quality applications to market faster, with lower cost and risk
Tags : 
service virtualization solution, application testing, getting applications to market, speeding up application delivery time
    
CA Technologies
Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: Pure Storage     Published Date: Oct 09, 2018
Apache® Spark™ has become a vital technology for development teams looking to leverage an ultrafast in-memory data engine for big data analytics. Spark is a flexible open-source platform, letting developers write applications in Java, Scala, Python or R. With Spark, development teams can accelerate analytics applications by orders of magnitude
Tags : 
    
Pure Storage
Published By: Cisco     Published Date: Apr 20, 2016
Be more productive, collaborative, and get more done faster using Cisco WebEx Meeting Center — the proven industry leader in web and video conferencing. As a FedRAMPcompliant service, you can use Cisco WebEx to hold regular meetings with anyone — regardless of location. Manage projects, host meetings, and make faster, more informed decisions by keeping everyone on the same page with meetings that allow everyone to see, hear, and view the same information at the same time. And host engaging and creative sessions with colleagues, internal teams and other agencies.
Tags : 
cisco webex, meeting center, security, web conferencing, video conferencing, fedramp
    
Cisco
Published By: Oracle     Published Date: May 20, 2019
Kein Finanzexperte würde den Nutzen von Planung, Budgetierung und Forecasting infrage stellen. Zusammen bilden diese Prozesse eine Roadmap für das Unternehmen, die den Mitarbeitern klare Hinweise gibt, wie sie die Unternehmensziele erreichen können. Außerdem definiert sie Finanz- und Leistungsziele als wichtige Meilensteine auf dem Weg dorthin. Problematisch sind jedoch die Instrumente und Konzepte, die viele Unternehmen dafür einsetzen – und die Ergebnisse, die sie mit ihnen erzielen. Planungs-, Budgetierungs- und Prognoseprozesse sind oft so gestaltet, dass Finanzteams sich mit banalen Verwaltungsarbeiten beschäftigen müssen und ihnen wenig Zeit für Analysen, Strategieentwicklung und Zielsetzung bleibt. Es muss einen besseren Weg geben, eine Roadmap für ein wachstumsstarkes Unternehmen zu erstellen.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 07, 2019
Our research reports on the 2,000 executives from the marketing community, across 22 markets, who agreed that innovation drives growth. However, barriers to innovation remain significant, ranging from isolation within the business, to a lack of insight into the data, and absent support from leadership in 24% of cases, and data remains the second largest issue for marketing with a 10% gap. New technologies help harness data, demonstrate how innovation will benefit teams and businesses, and help CMOs create a successful innovation agenda. Read the report
Tags : 
    
Oracle
Published By: Laser 2000     Published Date: Mar 12, 2019
End-user experience & network security unifying NetOps and SecOps teams
Tags : 
    
Laser 2000
Published By: Cisco     Published Date: Jun 29, 2015
Ron the CIO challenges IT operations to cut 70% off of the application deployment schedule. Are his application, security, and network teams up to the task? How can SDN in the data center provide a powerful answer?
Tags : 
cisco, cisco aci, technology, security, data center, apic, security data, cio
    
Cisco
Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security
    
Qualys
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
In the face of all the challenges presented by the accelerating pace of application development and everexpanding options for deployment, IT organizations are changing how they deliver services. Traditional manual approaches are simply too slow to keep up. Yet, when application teams attempt to circumvent IT in order to speed up deployment, security, performance, and longterm manageability suffer. To get the most out of your multi-cloud deployments, you need to fundamentally rethink how you deliver the right application services that meet current and future needs, consistently across every cloud. Standardization is key. If too much is changing too quickly, start with standardization. As your organization evolves, you will be better positioned to take the next step in making those standardized services accessible to developers through the automation toolchains they rely on.
Tags : 
multi cloud, organizations, application, security, deployment, performance
    
F5 Networks Inc
Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : 
cyber attacks, live, virtual, security, analytics, ecat
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics and RSA ECAT give security teams an edge in the hunt for cyber attacks.
Tags : 
cyber attacks, live, virtual, security, analytics, ecat
    
EMC Corporation
Published By: Citrix Systems     Published Date: Sep 17, 2015
A range of business issues are driving IT towards desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their workforces, one project at a time. See the trends driving the adoption of virtual desktops and the top use cases IT teams are deploying today.
Tags : 
citrix, xendesktop, it management, virtual desktop
    
Citrix Systems
Published By: RSA Security     Published Date: Oct 24, 2013
New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.
Tags : 
rsa, emc, security, analytics, architecture, data
    
RSA Security
Published By: HP     Published Date: Feb 02, 2015
Everyone agrees that data is the lifeblood of any business. Just think how tense you get when your laptop crashes and you realize you have not saved that critical document. Or put yourself in the shoes of your company’s sales teams when they suddenly find themselves unable to access information related to a deal in the pipeline at the end of the quarter because it is corrupted or went missing because of a database or server issue. Data protection is—and always will be—a constant concern.
Tags : 
    
HP
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.