target

Results 351 - 375 of 1030Sort Results By: Published Date | Title | Company Name
Published By: FireEye     Published Date: Nov 27, 2012
How to Protect Against the Next Generation of Cyber Attacks
Tags : 
fireeye, cyber attacks, firewalls, ips, protect
    
FireEye
Published By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : 
fireeye, spear phishing attacks, cybercriminals, malware, malicious activities
    
FireEye
Published By: FireEye     Published Date: Feb 28, 2014
This whitepaper further educates you on the new security challenges for state and local governments.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: FireEye     Published Date: Feb 28, 2014
How are data centers becoming unwitting accomplices in advanced cyber attacks?
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, data warehouse
    
FireEye
Published By: FireEye     Published Date: Feb 28, 2014
Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses
    
FireEye
Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: Fitbit     Published Date: Mar 21, 2017
"Have you ever caught yourself assuming that all Millennials are active athletes and all Baby Boomers are more sedentary? By making generalizations about employee health goals based on age groups, you risk misunderstanding your employees and their wellness goals. View this webinar and see how you can: * Manage your wellness program by defining your workforce according to personas * Motivate each employee based on fitness goals - regardless of their generation * Increase engagement with targeted communication and attractive incentives
Tags : 
    
Fitbit
Published By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
    
Flexera
Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
With technology being at the center-stage of education today, educators are compelled to figure out how best to combine technology with teaching. There’s just one end-goal – student success! Ensuring that the right infrastructure is in place is an absolute priority. Without it, student learning goals and curriculum targets are at risk. Fujitsu has years of experience in education sectors around the world. We are passionate about every stage of the learning process, supporting educators in uncovering the potential that will help students move onto the next stage of education. As students, teachers and IT departments explore a new era of learning, Fujitsu is by your side – opening up a world of possibilities.
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 21, 2019
With technology being at the center-stage of education today, educators are compelled to figure out how best to combine technology with teaching. There’s just one end-goal – student success! Ensuring that the right infrastructure is in place is an absolute priority. Without it, student learning goals and curriculum targets are at risk. Fujitsu has years of experience in education sectors around the world. We are passionate about every stage of the learning process, supporting educators in uncovering the potential that will help students move onto the next stage of education. As students, teachers and IT departments explore a new era of learning, Fujitsu is by your side – opening up a world of possibilities. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: G/O Digital     Published Date: Nov 13, 2014
To stay ahead of the competition in this constantly changing environment, you need to understand which marketing tools work best for your business. Today, companies are employing integrated marketing to help target, engage, and convert new and existing customers. Download this whitepaper to learn ‘how’ and ‘why’ you need these top five digital marketing services for your local business.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
    
G/O Digital
Published By: G/O Digital     Published Date: Nov 13, 2014
As an HVAC company, you have to understand how to connect your services to your targeted audience’s typical purchase cycle. You have to think about how your clients find you, where they are researching your specific services, and what prompts them to call your business versus your competitor. Download this guide for quick and easy steps to improve digital advertising for your local business.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
    
G/O Digital
Published By: G/O Digital     Published Date: Sep 13, 2016
• Getting and staying in front of shoppers is key. 55 percent of respondents would be somewhat to very likely to click on a retargeted ad from a previous website they had visited. • Reviews make a difference to the consumer. Only 8 percent of respondents said online reviews never factor into their decision to purchase at a local retailer. • Relevant Facebook ads work for local retailers. Almost 1 in 2 respondents would be likely to click on a Facebook ad that aligns with their personal needs and interests.
Tags : 
retail consumers, local stores, consideration phase, repeat customers, consumer survey, social media, facebook ads
    
G/O Digital
Published By: Genesys     Published Date: Jun 19, 2019
Contact centers often pool agents into large groups of generalists to distribute work evenly. Skills-based routing takes this a step further with specialized groups. But neither approach scales properly to identify all opportunities and drive business outcomes on each interaction. Predictive routing uses artificial intelligence (AI) and machine learning to create balance—meeting targets and giving customers a personalized experience. Read Demystifying AI: Creating an AI partnership that maximizes business results to learn how predictive routing systematically: Evaluates historical and real-time data to make predictions; Makes the best customer-agent match to drive desired outcomes; Keeps agents engaged and reduces handle times.
Tags : 
    
Genesys
Published By: GeoTrust     Published Date: Oct 06, 2014
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the same, and choosing the right CA is critical to running and maintaining a safe and trusted online business. This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Tags : 
certificate authority, web security, security landscape, online service, trusting relationship, certificate authorities
    
GeoTrust
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: Gigaom     Published Date: Oct 01, 2019
BEGINS: OCT 1, 2019 - 12:00 PM CDT ENDS: OCT 1, 2019 - 1:00 PM CDT This free 1-hour webinar from GigaOm Research brings together experts in Kubernetes and microservices, featuring GigaOm analyst Jon Collins and a special guest from Weaveworks, Steve George. The discussion will focus on how to ensure that a Kubernetes-based target environment delivers the expected benefits, both initially and over time. Kubernetes has emerged as a de-facto platform for deploying container-based microservices. While this approach holds much promise, enterprises need to start on the right foot to not build up problems for later. So, how can you build a Kubernetes-based strategy that delivers both now and in the future? In this 1-hour webinar, you will discover: What is the opportunity and challenge presented by Kubernetes-based microservices delivery? How to ensure the right elements of strategy, to maximize effectiveness while minimizing risk? What might a staged approach look like, depending on w
Tags : 
    
Gigaom
Published By: Gleanster Research     Published Date: Oct 22, 2013
This Deep Dive from Gleanster research will explore why some marketing technologies may not be the best solution for distributed marketers and how an merging class of technology called “local marketing automation” is enabling corporate marketing to oversee brand consistency and simultaneously give local marketers autonomy and control over communications to their local target audiences.
Tags : 
    
Gleanster Research
Published By: Global Payments     Published Date: May 02, 2019
The economic face of the APAC region is changing. While the East has long been considered a source of competitively priced raw materials and manufacturing services, the spending power of its inhabitants - and their increased fondness for international travel - has transformed it into a force to be reckoned with. It’s estimated that, over the next five years, 88% of the growth in the global middle class will be in the Asia Pacific region.1 If multinational companies hope to take advantage of this vast new target market, they will need to adapt their expansion strategies and offer APAC customers a tailored retail experience.
Tags : 
apac growth, global payments, luxury brands, trusted payments, localized purchasing, retail, wechat pay, alipay
    
Global Payments
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.