tech products

Results 151 - 175 of 212Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: Intel Corp.     Published Date: Aug 08, 2012
This report covers the challenges of first generation deduplication technology and the advantages of next-gen deduplication products. Next generation Dedupe 2.0 systems use a common deduplication algorithm across all storage systems-whether they're smaller systems in branch offices or large data center storage facilities. That means no more reconstituting data as it traverses different storage systems, which saves bandwidth and improves performance.
Tags : 
advances, deduplication, help, tame, big, data, chanllenges, first, generation, technology, dedupe, 2.0, algorithm
    
Intel Corp.
Published By: IHS GlobalSpec     Published Date: Jul 09, 2014
Industrial customers use content to research and make purchasing decisions. Are you giving them the info they need? Developed by IHS GlobalSpec, this white paper explains the growing importance of using content to attract, acquire and engage engineers and technical professionals. Content marketing positions your company as an expert, builds trust and introduces new products and services to a wider audience via webinars, technical articles, social media and more. Find out which content appeals most to technical professionals. Learn how to provide information that fulfills their needs at specific points in the buying cycle. And see examples of how and where industrial suppliers effectively use content marketing to deliver information that can help turn shoppers into buyers. Content Marketing for Industrial Marketers also explores the challenges of producing enough of the right content, repurposing it across multiple channels and budgeting for it. Plus, it provides the steps to start dev
Tags : 
ihs globalspec, influence buying decisions, content marketing, purchasing decision makers, content marketing strategy, building brand awareness, content marketing vehicles, engagement opportunities, user-generated content, improve engagement, engaging content, social media engagement, re-using content, b2b content marketing, content assets, content marketing budgets, curating information, content marketing measurement, industrial marketers, content management systems
    
IHS GlobalSpec
Published By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
lab, reports, improvement, storage, data, technologies, purchasing, valuable, customers, third-party, evaluation, security, information
    
Intel Corporation
Published By: ForgeRock     Published Date: May 05, 2015
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by ForgeRock.
Tags : 
esg, forgerock, identity platform, self-service, third-party authentication
    
ForgeRock
Published By: Microsoft Office 365     Published Date: Sep 08, 2016
As a tech leader, you recognize that disruption is a fact of life. According to Gartner, enterprise IT has entered an era of digitalization where disruptive new products are providing a continuous stream of growth, innovation, and differentiation.
Tags : 
    
Microsoft Office 365
Published By: IBM     Published Date: Apr 13, 2015
IDC Retail Insights defines omni-channel merchandise optimization as the set of technologies, data assets, skills, processes, and management intent required to develop and maintain sets of targeted and localized offers that best satisfy important business objectives. These goals include customer satisfaction, customer lifetime value, and category, channel, and corporate performance. By "offers," IDC Retail Insights means the broad set of attributes that characterize assortments, products, services, prices, utility, and convenience that match customers' buying criteria and shopping behaviors. Targeted and localized offers present a compelling "choice set" that satisfies and delights consumers. Download this white paper to read the questions posed by IBM to Greg Girard, program director of Omni-Channel Analytics Strategies at IDC Retail Insights, on behalf of IBM's customers.
Tags : 
omni-channel merchandise, ibm, targeted offers, localized offers, customer satisfaction, corporate performance, emerging marketing, internet marketing, crm & customer care, marketing research, sales
    
IBM
Published By: Dell     Published Date: Aug 16, 2013
"As any technology becomes increasingly popular and widespread, certain pieces of inaccurate information begin to sound like facts. Moreover, as a product matures, it evolves by taking on new features, shedding old ones and improving functionality. However, many products continue to carry those myths as truisms even as the version count rises higher. Get the facts about vSphere. Read the White Paper "
Tags : 
vsphere, virtual, technology
    
Dell
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service
    
EMC
Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service
    
EMC
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks, business logic attacks, security, protections, data loss prevention, attack tools, network reconnaissance, low-bandwith asymmetric attacks, anti-attack technology
    
F5 Networks Inc
Published By: InMage     Published Date: Feb 18, 2009
The concept of Continuous Data Technologies (CDT) emerged on the scene two years ago, and is now transforming the data storage industry. Nearly every major storage vendor has one or more CDT products in their offering roadmap, in addition to a vital community of emerging vendors who are the true innovators in this space.
Tags : 
inmage, taneja group, continuous data technologies, cdt, dr scout, continuous data protection, cdp, continuous data imaging, cdi, apit data capture, any-point-in-time
    
InMage
Published By: IBM     Published Date: Oct 01, 2013
This technical white paper presents benchmark results showing greater VM consolidation ratios than demonstrated in previous benchmarks and demonstrating the extent of the performance lead that PowerVM virtualization technologies deliver over x86-based add-on virtualization products. The tests, running two workload benchmarks of different consolidation ratios on POWER7 processor-based and comparable Intel-based systems, demonstrate the exceptional performance and scalability of PowerVM virtualization technologies compared to VMware vSphere1 on an x86-based platform.
Tags : 
ibm, ibm power7 systems, ibm powervm, virtualization, virtualization technology, consolidation, infastructure
    
IBM
Published By: IBM     Published Date: Oct 01, 2013
Clabby white paper that highlights the benefits and advantages that IBM brings to the market with its breakthrough technology and products, providing the right solution and value for customers' issues compared to Cisco UCS.
Tags : 
ibm, ibm’s bladecenter, x86 servers, it solutions, servers, san, chassis, applications, energy efficienct, networking, storage, data management
    
IBM
Published By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : 
ibm, mobile, mobile app, api, api management, web application, application programming interface, app, ubm tech, mobility, cloud, mobile devices, software
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
Nemertes Business Value Analysis independently evaluates technology products and services to identify the value to enterprise organizations. Through detailed interviews with technology professionals who use the products or services, Nemertes analyzes and quantifies the real-world benefits and improvements to the efficiency of their organizations.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: InReality     Published Date: Aug 31, 2015
Rapid consumer adoption of digital technologies and online channels has evolved the traditional path to purchase to the point of no return. Now consumers control when, where and how they research, purchase and receive products, leaving brands and retailers struggling to connect the dots between the online, mobile and physical worlds.
Tags : 
inreality, digital, strategy, content, commerce, emerging marketing, internet marketing, crm & customer care, e-commerce
    
InReality
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
As a tech leader, you recognize that disruption is afact of life. According to Gartner, enterprise IT has entered an era of digitalization where disruptive new products are providing a continuous stream of growth, innovation, and differentiation. IT overhauls in business productivity—moving to the cloud, supporting a remote workforce, and preserving valuable legacy data while maintaining security and control—are necessary for your business to remain competitive. These changes require communications solutions that can keep pace with the accelerating demands of the connected world.
Tags : 
    
Microsoft Office 365
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: IBM     Published Date: Jul 31, 2015
New competitors, new technologies and new expectations created by ubiquitous mobile connectivity are dramatically reshaping—and disrupting—the retail and consumer products landscape. To keep up, retailers and consumer products manufacturers need to understand their customers better than ever before.
Tags : 
ibm, consumer products landscape, consumer products manufacturers, big data, retailers
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.