whitepaper

Results 1951 - 1975 of 2049Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Read this whitepaper—Give All the People What They Want (Safely)—to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.
Tags : 
bring your own device, byod security, byod management, byod challenges, byod strategy, emm, enterprise mobility
    
Good Technology Corporation
Published By: Indegy     Published Date: Jul 29, 2019
Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events.
Tags : 
    
Indegy
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As software-defined WAN (SD-WAN) continues to become a mainstream technology, its relationship to WAN Optimization (WANop) must be examined. At first glance, the two can appear alike, and are often erroneously mentioned as synonymous technologies. A deeper examination however, will reveal two distinct and highly complementary technologies with very limited feature overlap. This document aims to demystify the relationship between the two, outline the market shifts that have led to a reduced WANop sector, and provide a recommendation on deploying both technologies in a modern enterprise WAN.
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Workday UK     Published Date: Apr 25, 2019
Most businesses treat finance and Human Capital Management (HCM) as different domains, but this separation creates a lot of problems. Combining finance and HCM into one system makes it easier to see the whole picture, make changes, and plan for growth. Read the whitepaper to see eight detailed reasons why bringing finance and HCM together is the better way to go.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday UK
Published By: Workday     Published Date: Apr 30, 2019
"Most businesses treat finance and Human Capital Management (HCM) as different domains, but this separation creates a lot of problems. Combining finance and HCM into one system makes it easier to see the whole picture, make changes, and plan for growth. Read the whitepaper to see eight detailed reasons why bringing finance and HCM together is the better way to go."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: VMware AirWatch     Published Date: Sep 16, 2015
In this whitepaper, we discuss common enterprise use cases and define the advantages of MDM, containerization and the layered approach to security that both can provide.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware AirWatch
Published By: Panaya     Published Date: Sep 14, 2017
Learn how using the right methodologies will enable you to deliver change rapidly to your enterprise applications.
Tags : 
software delivery lifecycle, enterprise, application delivery, collaboration, automation
    
Panaya
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Most organizations have invested in improving the performance and resiliency of their on-premise Global Load Balancing (GLB) capabilities, but very few organizations are able to achieve the level of performance and high availability that a cloud-based anycast DNS network can offer. Enterprises across the globe have begun complementing their existing GLB with a DNS service that operates in an always-on manner and can effectively manage and balance internet traffic through intelligent steering capabilities. Download whitepaper and learn the keys to: • Maintaining availability - through global and regional load balancing • Improving digital experience in a hybrid cloud environment • Increasing performance and reliability through a secondary DNS solution Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry
Published By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : 
cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway, web gateway, mobile security, ssl protection, web 2.0, bandwidth management, ips, mobile devices, saml
    
ZScaler
Published By: McAfee APAC     Published Date: Jun 25, 2019
Business is accelerating with technology. Technology is expanding the cyberattack surface. In today’s survival of the fittest landscape, here are five ways to not just survive, but thrive with a layered and integrated defense that protects your entire digital terrain and all types of devices.
Tags : 
    
McAfee APAC
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: • The critical role DNS plays in the user experience • The failure and outage risks of relying on a single DNS solution • The major resiliency and performance differences between unicast vs anycast addressing • Criteria for evaluating a managed DNS service provider Download Now! "
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: The critical role DNS plays in the user experience The failure and outage risks of relying on a single DNS solution The major resiliency and performance differences between unicast vs anycast addressing Criteria for evaluating a managed DNS service provider Download Now!
Tags : 
    
Oracle + Dyn
Published By: Conversica     Published Date: Nov 10, 2015
In this whitepaper you will learn how artificial intelligence can automatically interpret and respond to emails from leads.
Tags : 
conversica, sales leads, leads, lead nurturing, intelligence, web analytics, business intelligence, data management/analytics, lead generation & automation, sales
    
Conversica
Published By: Radius Intelligence     Published Date: Jun 15, 2015
Market expansions are a viable strategy when a company’s growth in an existing market has stalled. However, marketers often rely on intuition and qualitative data to inform decisions around market fit and size. In this whitepaper, marketing technology expert, David Raab, explores how the shift in data and predictive solutions streamlines the market expansion process. The paper will reveal 4 keys to a successful market expansion, common mistakes to avoid, and show marketers how to win customers in new market segments.
Tags : 
predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition, segmentation, targeting, real-time analytics, total addressable market, multi-channel optimization, pipeline prioritization, predictive scoring, lead prediction, account targeting, predictive intelligence, marketing intelligence, emerging marketing
    
Radius Intelligence
Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft
    
ZScaler
Published By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : 
ibm, cognos, mobile, inelligence, business intelligence
    
IBM
Published By: IBM     Published Date: Apr 15, 2015
Technology Adoption Analyst whitepaper by Forrester. This IBM-commissioned profile of IT operations decision-makers at enterprise companies in the US, UK and Germany evaluates IT operations analytics adoption, benefits, and challenges based on Forrester’s own market data and a custom study of the same audience.
Tags : 
ibm, it operations, decision makers, analytics, market analysis
    
IBM
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Electronic infant protection systems have, to date, been department-level solutions. A new generation of Wi-Fi technology, however, expands infant protection hospital-wide, presenting new opportunities. This white paper reviews the steps required for healthcare IT professionals to select, design and deploy a Wi-Fi Infant Protection solution, in cooperation with clinical and security peers.
Tags : 
wi-fi, infant protection, hospitals, security, healthcare
    
STANLEY Healthcare
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware
    
Webroot
Start   Previous    68 69 70 71 72 73 74 75 76 77 78 79 80 81 82    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.