ibe

Results 351 - 375 of 1109Sort Results By: Published Date | Title | Company Name
Published By: Extreme Networks     Published Date: Feb 14, 2017
En este documento, se describen casos de uso concretos de cómo una solución de análisis de red e inteligencia de negocio ayuda a gestionar eficientemente las operaciones de TI de hospitales y centros sanitarios
Tags : 
    
Extreme Networks
Published By: Extreme Networks     Published Date: Feb 14, 2017
En este documento, se describen casos de uso concretos de cómo una solución de análisis de red e inteligencia de negocio ayuda a gestionar eficientemente las operaciones de TI de cualquier organización, obteniendo un conocimiento exhaustivo y en profundidad de cómo se utilizan los recursos de red
Tags : 
    
Extreme Networks
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This paper is the second in a series. The first, Acceleration 101, describes acceleration features and terms. This paper focuses on topology options for deploying acceleration features in an Application Delivery Network (ADN).
Tags : 
acceleration, application delivery network, application acceleration solution, acceleration deployment
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
One of the unfortunate effects of the continued evolution of the load balancer into today's application delivery controller (ADC) is that it is often too easy to forget the basic problem for which load balancers were originally created-producing highly available, scalable, and predictable application services. This White Paper describes the Evolution of load balancing devices to Application Delivery Controllers.
Tags : 
application delivery controller, load balancer, load balancing
    
F5 Networks Inc
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
John outlines the concept of Perfect Forward Secrecy and describes what it takes to achieve this level of security.
Tags : 
security, forward secrecy
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
John outlines the concept of Perfect Forward Secrecy and describes what it takes to achieve this level of security.
Tags : 
security, forward secrecy
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Fiberlink     Published Date: Feb 08, 2007
This white paper looks at some of the key issues facing enterprises that might need to turn office workers into mobile workers, rapidly and in large numbers.
Tags : 
business continuity, mobile workers, mobile computing, disaster planning, pandemics, fiberlink, disaster plan
    
Fiberlink
Published By: FIBRWRAP     Published Date: Jan 08, 2016
This paper will explore the advancements made in retrofitting unreinforced masonry walls with fiber reinforced polymer (FRP) systems to withstand the lateral loading induced by a seismic event.
Tags : 
fibrwrap, fiber reinforcedpolymer, frp, urm, unreinforced masonry, structure, engineering
    
FIBRWRAP
Published By: FICO     Published Date: Aug 27, 2012
In this white paper, FICO describes how to use business rules management systems as a core technology to improve revenue while controlling costs.
Tags : 
cost control, underwriting, insurance, pos, point of sale, revenue generation, analytics, decision management
    
FICO
Published By: FICO     Published Date: May 11, 2017
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : 
customer experience, credit, credit policies
    
FICO
Published By: FICO EMEA     Published Date: Jan 25, 2019
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA
Published By: Financial Force     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
Financial Force
Published By: FinancialForce     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
FinancialForce
Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD). The white paper describes: The widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers; How organizations can better protect data centers.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: Flexential     Published Date: Jul 17, 2019
The hybrid cloud has arrived for the enterprise, but it comes with a complication: the speed of light. Between the cloud and the end user (including IoT devices that count as ‘users’), there is an emerging need for an intermediate environment that can satisfy real-time compute requirements without incurring the latency of reaching all the way to the cloud. ‘Edge compute’ is the phrase used to describe what covers this middle ground, but the optimal location for edge compute resources remains open to question.
Tags : 
    
Flexential
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: Flimp Media     Published Date: Jan 21, 2010
This report, which describes the emergence of Intelligent Digital Collateral (IDC) as a valuable top-line segment of the overall rich media and video marketing category, discusses how rich media marketing isn't just for advertising anymore.
Tags : 
flimp, b2b, idc, intelligent digital collateral, digital sales, analytics, rich media, social media
    
Flimp Media
Published By: Flimp Media     Published Date: Feb 02, 2010
This report, which describes the emerging web video direct marketing category, discusses how online video marketing isn't just for advertisers anymore; explains the applications and benefits of interactive web video and in particular video landing pages for direct marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective email video marketing campaigns without programming or advanced technical skills.
Tags : 
flimp, b2b, idc, intelligent digital collateral, digital sales, direct marketing, analytics, rich media
    
Flimp Media
Published By: Forcepoint     Published Date: Apr 19, 2016
As consequências financeiras e jurídicas dos ciberincidentes de alta visibilidade ocorridos no passado enviam uma mensagem incontestável: o furto de dados é importante demais para que o conselho de administração não se envolva. O relatório "Cibersegurança e Prevenção contra Furto de Dados" fornece uma visão geral não técnica que todo conselho de administração pode usar para avaliar a abordagem de segurança da organização.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datensätze durch Verletzungen der Datenintegrität kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschätzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorfälle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, während Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper first describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Tags : 
fortinet, fortigatet, ipv6 migration, network security, ipv6 transition, ipv6 translation, performance management, threat management
    
Fortinet, Inc.
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
    
Fortinet, Inc.
Published By: foxtailmarketing     Published Date: Oct 15, 2014
This eBook describes, in detail, the methods and systems required to generate sales ready B2B leads by using several different types of digital marketing.
Tags : 
foxtail marketing, b2b leads, social, google, content creation, lead nurturing, search marketing
    
foxtailmarketing
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.