world

Results 351 - 375 of 3067Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Mar 23, 2010
It's no secret: Smartphones are infiltrating the corporate world and making employees more productive. Their use is no longer dictated by IT departments that provision them to executives and salespeople.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Published By: BlackBerry     Published Date: Dec 22, 2009
The Johnson & Johnson Family of Companies is comprised of the world's premier consumer health company, the world's largest medical devices and diagnostics company, the world's fourth-largest biologics company, and the world's seventh-largest pharmaceuticals company. With over 250 operating companies in 57 countries, Johnson & Johnson's Credo is to put the needs and well-being of the people they serve first.
Tags : 
blackberry, mobile applications, johnson, pharma, cio, pim, voip, smartphones
    
BlackBerry
Published By: BlackBerry     Published Date: Dec 22, 2009
AT&T is a premier communications holding company. Its subsidiaries and affiliates, AT&T operating companies, are the providers of AT&T services in the United States and around the world. Among their offerings are the world's most advanced IP-based business communications services, the nation's fastest 3G network and the best wireless coverage worldwide, and the nation's leading high speed Internet access and voice services.
Tags : 
blackberry, mobile applications, at&t, pharma, cio, pim, voip, smartphones
    
BlackBerry
Published By: Blackberry     Published Date: Jul 03, 2012
With the increasing amount of smartphones and tablets in today's workplace, it is difficult to ensure security without jeopardizing user experience.
Tags : 
blackberry, mobile, smartphones, tablets
    
Blackberry
Published By: BlackBerry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance® can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Seeing an opportunity to help its customers and local distributors, TFC worked with BlackBerry® Alliance Elite Member FloatPoint Media Inc. to develop the custom iGasketT app. The result? Improved user safety and a wider worldwide market.
Tags : 
blackberry, mobile applications, application development, case study
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
RIM recently worked with Park Manor Public School in Elmira, ON to integrate BlackBerry PlayBook tablets in two Grade 6 classrooms. Check out this great story on the value of PlayBook tablets in Education!
Tags : 
tablets, blackberry, rim, classroom applications, real world applications, mobile computing
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Get future ready with BlackBerry Enterprise Server v5. Join a free webcast to understand how upgrading to BlackBerry Enterprise Server v5 will get your organization ready for the next generation in mobile device management: BlackBerry Mobile Fusion.
Tags : 
blackberry enterprise server, mobile device management, mdm, mobile computing, mobile solutions
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 11, 2013
FIPS, CAPS, AISEP, and many more — BlackBerry® has received certification from the most rigorous security testers in the world. In this insightful webinar, find out what they mean and why they matter to enterprises.
Tags : 
blackberry security, certifications, security tests, webinar, security tests
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance® can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
Blackberry
Published By: Blackberry     Published Date: Mar 12, 2013
FIPS, CAPS, AISEP, and many more — BlackBerry® has received certification from the most rigorous security testers in the world. In this insightful webinar, find out what they mean and why they matter to enterprises.
Tags : 
blackberry security certifications, organization, blackberry 10, webinar, transition
    
Blackberry
Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry
Published By: Blackberry     Published Date: Jul 12, 2019
Technology is changing the way that businesses across industries operate. Often referred to as “digital transformation” or “digitization,” this change is rapid, and it is relentless. It touches everything in the legal profession from the completion of everyday tasks to the way information is secured and shared
Tags : 
    
Blackberry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence (AI) is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today. Learn more about AI in this eBook.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
The Cylance 2019 Threat Report represents the company’s piece of the overall cybersecurity puzzle. It details the trends observed and the insights gained, and the threats Cylance’s consulting team, research team, and customers encountered over the past year. Cylance shares this report in the hope that you will put it to good use in our collective fight against the rising tide of cyber attacks worldwide.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. Each year, it attracts more than 8.2 million visitors on site and stages more than 2,000 performances attended by over 1.5 million people. Since opening its doors in 1973, the Opera House has become the symbol of modern Australia and the country’s premier tourist destination, with an iconic national-identity value that Deloitte Access Economics has estimated at $4.6 billion. On the Opera House’s 40th anniversary, it embarked on a Decade of Renewal, a series of projects to prepare the Opera House for future generations of artists, audiences, and visitors. Because renewal isn’t just about the building and the arts; it’s also about renewing technology and systems. This enabled the Opera House to engage VMtech and BlackBerry Cylance to modernize its IT server and network infrastructure, as well as information management, privacy, and cybersecurity.
Tags : 
    
BlackBerry Cylance
Published By: BlackLine     Published Date: May 24, 2018
Digital transformation is the new boardroom buzzword. But what does this really mean for finance teams, and why does it matter? Beyond the hype, real change is underway.
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 06, 2018
The biotechnology and pharmaceutical industry is among the most heavily regulated industries in the world, challenged by evolving regulations, complex compliance requirements and close regulatory scrutiny. At the same time, companies must address the market pressures of globalization, the use of predictive data analytics and digital technologies, and the industry’s ongoing consolidation. In this challenging environment, confidence in internal controls is crucial.
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 06, 2018
The game is changing. Accounting teams are expected to close the books faster and more accurately than ever before, and what used to be their entire focus is now just the price of admission.
Tags : 
    
BlackLine
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
Blue Coat Systems
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.