test

Results 1 - 25 of 2261Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Dell EMC     Published Date: May 09, 2019
In nearly all midmarket businesses, staff costs are the single biggest expense – meaning that productivity gains have a substantial and lasting impact on the bottom line. This Proaction Series report, commissioned by Dell, discusses technologies that deliver the fastest, clearest productivity benefits to midmarket businesses and will address: - What midmarket firms are looking to accomplish - Why they would invest in IT solutions to achieve success in this area - Required IT solutions to support process evolution Download this report for more information.
Tags : 
    
Dell EMC
Published By: CyberSource     Published Date: Apr 25, 2019
Download this white paper to find out how you could augment your fraud management with Decision Manager machine learning insights from more than 68 billion annually processed Visa and CyberSource transactions – matched with flexible rules-based fraud strategies. • Detect fraud more accurately with robust data and insights on ever-changing fraud patterns • Protect your bottom line by reducing fraud and chargebacks • Increase acceptance rates with the only fraud solution that uses machine learning to generate and test new rules-based strategies from your historic data …and more.
Tags : 
    
CyberSource
Published By: Unit4     Published Date: Apr 25, 2019
Financial planning and analysis is evolving to support digital business initiatives. Application leaders supporting finance transformation must focus on new ways of managing financial performance by enabling broader integration with operational plans and actionable performance reporting. Download this complimentary Gartner report and discover how.
Tags : 
tag
    
Unit4
Published By: Schneider Electric     Published Date: May 31, 2019
Colocation facilities are rapidly designing and building new facilities in order to capitalize on market opportunity. Getting the facility up and running is the first challenge. The second? Recruiting, training, and retaining qualified data center staff. In this webinar, co-hosted by Tony DeSpirito, VP & General Manager Data Center Operations at Schneider Electric, & Brian Gisi, Infrastructure Management & Services Manager at IBM, to access field-tested methods & strategies that can help you: 1. Overcome the worldwide shortage of experienced data center professionals 2. Understand how out-tasking data center operations can benefit you & your clients 3. Identify key characteristics of a strong data center operations partner
Tags : 
data center, business growth, schneider electric
    
Schneider Electric
Published By: 3D Systems     Published Date: May 14, 2019
For more than two centuries, industrial factory production has excelled in four key aspects: repeatability of the process, durability of parts produced, productivity of the workflow, and an economical total cost of operation. Factory workflows have been optimized to produce the best possible parts in volume, as inexpensively as possible. Any new production method or workflow process that hopes to be accepted alongside this standard process must meet or improve on these time-tested elements. To learn more, download this whitepaper today.
Tags : 
    
3D Systems
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Die INFINIDAT® Enterprise-Storage-Lösungen basieren auf der einzigartigen und patentierten INFINIDAT Speicherarchitektur - Ein vollständig abstrahierter Satz von Software-De?ned Storage (SDS)-Funktionen wird mit der besten Standard-Hardware integriert. Mit dem Versand der Software liefert INFINIDAT eine ausgiebig getestete Hardware-Referenzplattform mit. Damit stellt INFINIDAT die ersten echten SDS-Lösungen der Enterprise-Klasse bereit.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Les solutions de stockage d’entreprise INFINIDAT® sont basées sur l’architecture de stockage exclusive et brevetée INFINIDAT, une couche d’abstraction logicielle des fonctions de stockage déployée sur des équipements matériels bon marché. En commercialisant le logiciel avec une plateforme matérielle de référence testée, INFINIDAT propose la première véritable solution de stockage dé?ni par logiciel pour entreprise.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
Le soluzioni enterprise di INFINIDAT® sono basate su un’architettura di storage unica e brevettata INFINIDAT – Un insieme completo di funzioni di software-de?ned storage (SDS) integrate con il migliore hardware commerciale presente sul mercato. Attraverso l’integrazione del software con una piattaforma hardware di riferimento ampiamente testata, INFINIDAT fornisce la prima vera soluzione SDS di classe enterprise.
Tags : 
    
Infinidat EMEA
Published By: Kestra Financial     Published Date: May 30, 2019
ndependent advisors make up one of the fastest growing segments in the financial services industry. If you’re curious about breaking free, you may want to consider these advantages that independent advisors can offer their clients
Tags : 
    
Kestra Financial
Published By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
As your organization grows and new branch sites need to connect to your network, you need a holistic security program that can leverage the latest advances in IT and cloud while still supporting greater productivity and collaboration. Download our eBook to learn about the three types of security that every new internet-connected site needs to have.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
When it comes to choosing an NGFW, it pays to listen to the experts. That's why we're excited to announce that NSS Labs, the leading independent third-party assessment provider for network security products, has awarded Forcepoint NGFW its highest rating for the sixth consecutive time. Download the report to view the full test results and analysis.
Tags : 
    
Forcepoint
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
    
Recorded Future
Published By: CoreSite     Published Date: May 30, 2019
This research report shows the statistics behind U.S. based Media and Entertainment organizations’ adoption of data storage and compute solutions. Touching on the latest trends and specifically researched for the IT departments to see how their peers and competitors are investing to reach future business and technology goals.
Tags : 
    
CoreSite
Published By: MuleSoft     Published Date: Apr 23, 2019
In today’s competitive landscape, businesses need to make decisions quickly in order to respond to rapidly changing customer preferences and nimble competitors; whether it’s a new business strategy, a new business process, or a new market offering, businesses are competing on speed and agility. The overwhelming majority of today’s business and IT leaders understand digital transformation is necessary to maintain leverage amid constantly changing customer preferences. They also have a clear picture of their desired end state—exemplified by leaders like Amazon, Google, and Microsoft. However, only a small minority of have a clear understanding of the path they need to lead the market. In this paper you’ll learn: How to build digital transformation into the root of your company with a practical, natural, and tested blueprint. Best practices from over 1,600 enterprises to transform your strategy, organization, and technology from the ground up. Actionable next steps to start your journ
Tags : 
    
MuleSoft
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: PRQA     Published Date: Feb 26, 2013
This paper discusses the thinking and motivation which has led to the publication of the latest version, MISRA C:2012
Tags : 
    
PRQA
Published By: Airfoil PR     Published Date: Apr 21, 2010
In our latest Point of View, "The Dirtiest Word In Business," Airfoil has assembled a collective set of best practices to help technology marketers meet the communications challenges of a new digital decade.
Tags : 
airfoil, innovation, pov, public relations, integration, communications, interactive/pr agencies
    
Airfoil PR
Published By: test     Published Date: Aug 10, 2011
test
Tags : 
    
test
Published By: AppAssure Software     Published Date: Jun 29, 2010
Recover from any server outage in 15 minutes or less and use 80% less storage space for backups with Replay's built-in deduplication.
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server, disaster recovery
    
AppAssure Software
Published By: OneUpWeb     Published Date: Jun 16, 2010
Could your website be doing more? Find out in Oneupweb's latest study. Today, the design and usability of your website directly affects your bottom line. Discover if it's driving sales, or driving them away with the new measurement you need to determine the success of your site's design.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design, website/graphic design
    
OneUpWeb
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.