sophisticated

Results 1 - 25 of 406Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection, secure business
    
F5 Networks
Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow
    
K2
Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware
    
Panda Security
Published By: Lumension     Published Date: Jun 03, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity
    
Lumension
Published By: Cisco     Published Date: Mar 17, 2017
The Cisco 2017 Annual Cybersecurity Report presents research, insights, and perspectives from Cisco Security Research. This research can help your organisation respond effectively to today’s rapidly evolving and sophisticated threats.
Tags : 
cyber security, threat and vulnerability management, security, attacks, threat detection
    
Cisco
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: CA WA     Published Date: May 12, 2008
All things that can be automated will be automated. Beyond the careful choreography of sophisticated workflow, managing myriad simultaneous requests puts unprecedented demand on the software that must schedule and perpetually deliver against well-defined service levels, in real time. Gone are the days of simple batch processing. Welcome to the oh-so-very-flat world that is embracing service-oriented architectures, grid architectures, expansive ecosystems, and end-to-end processing. Workload scheduling has got to grow up.
Tags : 
ca wa, workload automation, soa, service oriented, scheduling
    
CA WA
Published By: GoodData     Published Date: Aug 02, 2013
Salesforce provides a tremendous repository of customer information and interactions that’s organized and easily accessed. But that’s not enough! Once you begin to really use it, the questions you ask your salesforce data become more sophisticated. Then you start to uncover holes in your data, reporting strategy and Salesforce analytics itself. Download this white paper for 4 tips that are a surefire way to improve your salesforce analytics.
Tags : 
sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections, sales kpis, sales prospecting, sales forecasting, sales forecast, sales pipeline, analytics, sales, emerging marketing, internet marketing
    
GoodData
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
    
Cisco
Published By: TradeGecko     Published Date: Aug 15, 2018
2018 is going to a big year for wholesale distribution. Thanks to constant advancements in B2B technologies and capabilities, wholesale is fast catching up with retail, through omnichannel selling, digitalization and global online marketplaces, amongst others. So, what do these predictions mean for the APAC wholesale market? As buyers come to expect instant, sophisticated and customised service as standard, wholesale businesses will need to embrace technologies that allow them to provide a customer experience on par with B2C. Download this eBook to understand the most important trends in wholesale distribution in APAC.
Tags : 
    
TradeGecko
Published By: Microsoft Azure     Published Date: Apr 05, 2018
Securing data and systems is a top priority for organizations. But meeting this challenge gets more difficult every day as attacks grow more sophisticated, employees use a wider array of devices and applications, and data flows into and out of your business in more ways
Tags : 
    
Microsoft Azure
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Today’s B2B buyers are socially sophisticated and informed. Your sales team must be too. Do you have the tactics, tools and training to leverage social media for sales success? Build your funnel and crush your quota with real-world tips on using social to listen, learn and engage.
Tags : 
social media, social media management, enterprise, hootsuite, social selling, sales, marketing
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Apr 15, 2014
Today’s B2B buyers are socially sophisticated and informed. Your sales team must be too. Do you have the tactics, tools and training to leverage social media for sales success? Build your funnel and crush your quota with real-world tips on using social to listen, learn and engage.
Tags : 
social media, social media management, enterprise, hootsuite, social selling, sales, marketing
    
uberVU via HootSuite
Published By: TeamQuest     Published Date: Dec 19, 2014
Businesses are constantly putting pressure on price, performance and reliability of IT services and infrastructure. Recent adoption of technologies such as virtualization, dynamic computing and various forms of cloud computing coupled with changing management paradigms has raised the stakes even more. This ruthless drive for efficiency calls for the use of more sophisticated optimization methods. It is safe to say that if you don’t, chances are you will be “done” by others who do.
Tags : 
infrastructure, virtualization, optimization, guide, descriptive, diagnostic, predictive, prescriptive, analysis, efficiency, risk, white, paper
    
TeamQuest
Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility
    
LogRhythm
Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q4'19     Published Date: Nov 06, 2019
This presentation takes you through the auto industry's move toward more sophisticated levels of compliance among suppliers and OEMs. Learn how achieving ASPICE can be integrated into your engineering 'v' model for improved workflow and built-in tools for achieving compliance.
Tags : 
    
Group M_IBM Q4'19
Published By: MuleSoft     Published Date: Apr 15, 2019
United Kingdom (U.K.) citizens expect fast, connected, and seamless experiences. Government bodies face a growing delta between citizen’s expectations of experience and the reality of how quickly they can deliver now that sophisticated private sector customer experiences are the new standard. Legacy IT stacks, budgetary constraints, and inflexible core systems are only a few of the hurdles government face to overcome the digital transformation imperative. By moving beyond point-to-point integration and embracing reusable microservices, government can increase the speed of delivery without compromising security. Read this whitepaper to learn: Why U.K. government must move beyond point-to-point integration. How API-led connectivity support microservices adoption in government. How government IT teams can use MuleSoft’s Anypoint Platform to better execute against their digital transformation agenda.
Tags : 
    
MuleSoft
Published By: SAS     Published Date: Oct 18, 2017
Health insurers have long been plagued by issues of fraud, waste, abuse, error and corruption. Taking an enterprise approach to payment integrity – one that combines advanced data management and sophisticated analytics – can help payers detect and prevent fraud; effect positive change in how providers, employees and patients behave; and substantially reduce health care costs. Payers can achieve better outcomes when software support for the core disciplines of payment integrity run on a single platform.
Tags : 
    
SAS
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense"
    
McAfee
Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network, disruption, operations, organizations, national
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere.
Tags : 
cisco, threat, cybercrime, infrastructure
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.