asp

Results 1 - 25 of 565Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
City leaders around the world are working to improve the quality of life and increase the number of useful services for their citizens, businesses, and visitors. Smart city initiatives are gaining attention in several countries, as administrators, industry, and citizens are working together to enhance their communities, cities, regions, and nations. After more than ten years of smart city hype, innovative projects have emerged, but few have provided a disruptive impact on the city system itself. Because every city is different, few of the existing models apply universally. An effective response requires leaders to consider a series of prerequisites: • Consider the local culture and the people • Prioritize basic needs and requests • Work at overcoming silos and encourage collaboration across departments • Consider each “smart” initiative as an integral part of an overall city system A smart city reflects a number of aspirations: efficiency, resiliency, connectedness, innovatio
Tags : 
    
Amazon Web Services EMEA
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
Get a step-by-step walkthrough of what it takes to take your organization to the next level of compliance, focused on ASPICE for automotive engineering. Join Michael Halder from IBM to learn how you can integrate ASPICE compliance into your engineering workflow
Tags : 
    
Group M_IBM Q4'19
Published By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Right now, consumers are driving two seemingly opposing trends: Accenture calls the first trend ‘From Me to We.’ As people grasp the importance of sustainable living, they are shifting from a purely selfish focus (give me what I want) towards actively pushing brands to become more responsible for their global footprint and the health of our planet (support the ideals we believe in).1
Tags : 
    
Selligent Marketing Cloud
Published By: GoCardless     Published Date: Oct 14, 2019
Die bald in Kraft tretende SCA zwingt Unternehmen einen Großteil ihrer Online-Zahlungen mit zusätzlichen Sicherheitsmaßnahmen zu versehen. Wir wissen: Kunden neigen dazu, einen komplexen Bezahlvorgang abzubrechen. Wie werden sie also auf die kommenden Änderungen reagieren? Wir haben 4.000 Kunden in Großbritannien, Frankreich, Deutschland und Spanien zu ihrer Einstellung zu Sicherheit und Komfort beim Online-Einkauf befragt. Wir stellten ihnen auch Fragen zu bestimmten Aspekten der neuen SCA-Gesetzgebung und darüber, wie sich eine erhöhte Sicherheit an der Kasse auf ihr Kaufverhalten auswirken würde. Werden beispielsweise abgefragte biometrische Daten wie ein Fingerabdruck Ihre Kunden verschrecken oder mehr Sicherheit vermitteln? Und würden sich die Befragten für das Lastschriftverfahren entscheiden, um den Komfort zu gewährleisten? Füllen Sie das Formular aus und erhalten Sie noch heute unseren kostenlosen Leitfaden mit allen detaillierten Umfrage-Ergebnissen.
Tags : 
    
GoCardless
Published By: Ricoh     Published Date: Sep 17, 2019
We do business in the age of information. The amount of data, the number of sources, the uses for data, and the routes that it travels have all been growing at an exponential rate. The importance of managing, securing, sharing and measuring information is the core of Information Governance. IG enables organizations to extract the value of information to make better business decisions, but how to go about the massive task is harder to grasp.
Tags : 
    
Ricoh
Published By: Adobe     Published Date: Oct 10, 2019
2019 may be the year where a strong CIO-CMO relationship moves from aspiration to imperative. The notion that marketing and IT should aim to strategically align themselves is not ground-breaking. But the reality of the CIO-CMO relationship is more complex, the route toward its success harder to traverse. When large enterprises are faced with digital transformation and customer-facing initiatives; too often, IT and marketing fail to collaborate well enough to create a competitive advantage. Or even enough to keep up with competitors. This whitepaper takes a deep dive into the CIO-CMO relationship. It was created to help marketing and IT decision makers learn how, together, they can make a realistic and immediate impact on the customer journey.
Tags : 
    
Adobe
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: Adobe     Published Date: Sep 23, 2019
Data is a company’s most valuable asset. Just look at Forbes’ World’s Most Value Brands list. No longer is a company’s worth evaluated by its tangible assets — data has changed all of that. Every business today relies on data. The ability to filter through volumes of data to capture true insights is critical to gaining a competitive advantage. Companies aspiring to deliver the best possible customer experiences must be able to unify different types of information, including behavioral, transactional , and operational data
Tags : 
    
Adobe
Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS
Published By: MissionMode     Published Date: Jun 20, 2012
A new way to streamline crisis management and focus on the key aspects of crisis response.
Tags : 
    
MissionMode
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
    
Akamai Technologies
Published By: Lenovo UK     Published Date: Sep 10, 2019
Wissen Sie, wo Sie am meisten gefährdet sind? Im Wettrennen mit Ihren Mitbewerbern um die digitale Transformation Ihres Unternehmens treten neue Bedrohungen auf. Mit ThinkShield von Lenovo erhalten Sie eine anpassbare, umfassende Lösung, die Ihr Unternehmen rundum schützt. Eine Datensicherheitsverletzung kostet durchschnittlich über 4 Millionen USD. Erfahren Sie, wie sich Investitionen in die Sicherheit auf das Unternehmenswachstum auswirken. Infografik herunterladen > 2 Kaspersky: “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Hinweis: in der Quelleninformation im Leitfaden fehlt das s in Kaspersky]
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. With 48% of breaches caused by human error2, find out how you can protect your business against employee mistakes. Download our infoguide > 2 Kaspersky: “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Note: s is missing from Kaspersky on source information on infoguide]
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
¿Sabes por dónde corres más peligro? En la carrera por adelantarte a la competencia y transformar digitalmente tu empresa, surgen nuevas amenazas. Con ThinkShield de Lenovo tienes una solución completa y totalmente personalizable que protege tu negocio de forma integral. Un 48 % de las filtraciones se deben a errores humanos2. Averigua cómo proteger tu negocio de los despistes de tus empleados. Descarga nuestra guía informativa > 2 Kaspersky: «Guía práctica de seguridad de TI para pequeñas empresas». https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 [Nota: Falta la ese de «Kaspersky» en el texto de la guía informativa. ]
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Savez-vous où vous courez le plus de risque ? Dans la course à la compétitivité et à la transformation digitale, les entreprises font face à de nouvelles menaces. Avec ThinkShield de Lenovo, vous bénéficiez d’une solution de sécurité complète et personnalisable qui vous protège de bout en bout. Dans un contexte où 48 % des compromissions sont dues à des erreurs humaines2, découvrez comment protéger votre entreprise contre les menaces internes. Téléchargez notre infoguide > 2 Kaspersky : “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Remarque : il manque un "s" à "Kaspersky" dans les références de l’infoguide]
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Sai identificare le tue aree più a rischio? Competere sul mercato e attuare la trasformazione digitale dell'azienda comporta la gestione di nuove minacce. Con ThinkShield di Lenovo hai una soluzione completa e realmente personalizzabile che protegge il tuo business a 360°. Considerando che il 48% delle violazioni è causato da errori umani2, come proteggere il tuo business dagli errori dei dipendenti? Scarica la guida informativa > 2 Kaspersky: "Small Business IT Security Practical Guide" https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Nota: nella guida informativa manca una s in Kaspersky nelle informazioni sulle fonti]
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Weet je wanneer je het meeste risico loopt? In de race om je concurrenten voor te blijven bij de digitale bedrijfstransformatie doemen nieuwe gevaren op. Met ThinkShield van Lenovo beschik je over een totaaloplossing die je geheel kunt aanpassen aan de beveiligingsvereisten van jouw bedrijf. 48% van inbreuken wordt veroorzaakt door menselijke fouten2. Ontdek hoe je je bedrijf kunt beschermen tegen fouten van medewerkers. Download onze infogids > 2 Kaspersky: “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Opmerking: s ontbreekt in Kaspersky in brongegevens over infogids]
Tags : 
    
Lenovo UK
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Cities are changing at a pace never before possible, bringing smart features online daily. But smart features don’t equal smart cities. That’s why aspiring smart cities are shifting from siloes of smart features to a more holistic approach that connects and makes sense of all people and things. This shift demands technology solutions that are edge-centric, cloud-enabled and data-driven, able to deliver citizen-centric outcomes now and into the future.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
The bar for success is rising in higher education.  University leaders and IT administrators are aware of the compelling benefits of digital transformation overall—and artificial intelligence (AI) in particular. AI can amplify human capabilities by using machine learning, or deep learning, to convert the fast-growing and plentiful sources of data about all aspects of a university into actionable insights that drive better decisions. But when planning a transformational strategy, these leaders must prioritize operational continuity. It’s critical to protect the everyday activities of learning, research, and administration that rely on the IT infrastructure to consistently deliver data to its applications.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and assess aspects of campus-scale, wireless and wired network infrastructures from Cisco and Huawei Technolgies. Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer. To find out more download this whitepaper today.
Tags : 
cisco, power, radio, wi-fi, network, architecture
    
Cisco EMEA
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
La sécurité est une préoccupation permanente pour les entreprises Le paysage des menaces ne cesse de se développer et les attaques sont de plus en plus complexes. Si les technologies émergentes telles que l'Internet des objets (IoT), la mobilité et les environnements informatiques hybrides font apparaître de nouvelles opportunités commerciales, elles introduisent également de nouveaux types de risques. Protéger les serveurs au niveau logiciel n'est plus suffisant ; pour garder un temps d'avance sur les menaces, les entreprises doivent se protéger au niveau des systèmes physiques. Avec la multiplication des contraintes réglementaires, la conformité joue un rôle de plus en plus critique à la fois sur l'augmentation de la sécurité et sur la réduction du coût des non-conformités. Ces différents aspects étant extrêmement critiques, il est très important de définir des niveaux de protection matérielle et d'appliquer les mesures de sécurité jusqu'à la chaîne d’approvisionnement. À cet effet,
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.