mad

Results 1 - 25 of 582Sort Results By: Published Date | Title | Company Name
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE has made a significant investment into AI and ML techniques that are embedded into its core workforce management solution, NICE WFM. Recent advancements include learning models that find hidden patterns in the historical data used to generate forecasts for volume and work time. NICE WFM also has an AI tool that determines, from a series of more than 40 models, which single model will produce the best results for each work type being forecasted. NICE has also included machine learning in its scheduling processes which are discussed at length in the white paper.
Tags : 
    
Nice Systems
Published By: IBM APAC     Published Date: May 14, 2019
The perceived x86 benefits of lower acquisition cost and standardizing on are often made at the expense of performance, reliability, scalability and manageability. Moreover, many are driven by the impression that x86-based systems will solve all their computing challenges—when often that is not the case. This eBook looks at companies that chose to invest in IBM® Power Systems™ rather than continuing to run on or migrate to x86-based systems — and why.
Tags : 
    
IBM APAC
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in today’s software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises can’t risk security slowing this down.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: SailPoint Technologies     Published Date: May 08, 2019
In our 26-criterion evaluation of identity management and governance (IMG) providers, we identified the nine most significant ones — CA Technologies, IBM, Ivanti, Micro Focus, Omada, One Identity, RSA Security, SailPoint Technologies, Saviynt — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
    
SailPoint Technologies
Published By: Pure Storage     Published Date: Apr 15, 2019
This year, businesses will increasingly turn to AI to power their business transformation. Machine learning and deep learning workloads are quickly becoming a mission-critical workload in the enterprise data center. As an IT leader, are you ready for the impending wave of AI applications that will demand new approaches to computing, storage and networking? Do you have the right strategy for scaling AI workload in your data center? We’ll introduce you to the IT visionaries who have made it happen. In this webinar we’ll explore how one IT leader accelerated his company’s success with an AI infrastructure strategy, sharing their best practices and insights. By watching this webinar, you'll learn: - Why it’s now critical for enterprise IT to have an AI infrastructure strategy that supports the business - Explore one IT leader’s experience developing and implementing a best-of-breed platform for scaling AI workload in the data center - Gain insights that can drive your AI infrastructur
Tags : 
    
Pure Storage
Published By: 123Together     Published Date: Dec 04, 2008
Microsoft Exchange Server has been a crucial technological breakthrough in advanced corporate communication systems. Companies who utilize an enterprise-class email server like Exchange believe that email is mission critical, and value the productivity it enables. But an in-house migration to Exchange 2007 from an earlier version of Exchange or another email program will not be an easy task. Complexity, time and cost issues loom large over the IT department and are causing IT directors to search for an alternative solution.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, migration, osterman, collaboration, mobile services, business management, collaborative commerce, messaging, colocation and web hosting
    
123Together
Published By: Extensis     Published Date: Jun 08, 2010
Metadata Management is the process of ensuring that all metadata associated with a digital asset is captured, organized, stored and made available for use by and within other applications. Metadata Management begins at the moment the digital asset is created by an application or captured by digital imaging.
Tags : 
metadata, management, extensis, digital asset management', business intelligence, configuration management
    
Extensis
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Veritas     Published Date: Sep 30, 2016
This paper summarizes the trends that have made modernizing backup and recovery an urgent priority, the key requirements for solution offerings, and the unique capabilities of Veritas NetBackup™ Appliances in delivering a simple, complete, and cost-effective solution.
Tags : 
    
Veritas
Published By: Veritas     Published Date: Sep 30, 2016
This paper provides a structured approach to assessing the advantages of the appliance model. It summarizes the trends that have made modernizing backup and recovery an urgent priority, the key requirements for solution offerings, and the unique capabilities of Veritas NetBackup™ Appliances in delivering a simple, complete, and cost-effective solution.
Tags : 
    
Veritas
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Modern storage arrays can’t compete on price without a range of data reduction technologies that help reduce the overall total cost of ownership of external storage. Unfortunately, there is no one single data reduction technology that fits all data types and we see savings being made with both data deduplication and compression, depending on the workload. Typically, OLTP-type data (databases) work well with compression and can achieve between 2:1 and 3:1 reduction, depending on the data itself. Deduplication works well with large volumes of repeated data like virtual machines or virtual desktops, where many instances or images are based off a similar “gold” master.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Mar 05, 2018
When thinking about how the workforce is evolving, you need to think about what really matters to employees and how you can integrate technology in the workplace for the digital nomads of today. Corporate real estate, IT, and HR executives need to do a lot to meet those needs and achieve their HR goals. Cisco has the expertise needed to deliver high-quality mobility and collaboration solutions. We make business-critical communications possible in real time, across multiple channels. Cisco Workforce Experience offers are complete, enterprise-class solutions designed to scale smoothly and make your vision of the digital workspace a reality.
Tags : 
workforce, corporate, real estate, executives, employees
    
Cisco EMEA
Published By: HPE     Published Date: Mar 02, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : 
    
HPE
Published By: Cisco     Published Date: Jul 30, 2015
Based on hands-on testing and the verified representations made by Cisco, Miercom confirms that the Catalyst 2960-X and the 2960-XR are highly energy-efficient Layer 2 and Layer 3 switching solutions
Tags : 
    
Cisco
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications, data management
    
Commvault
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity, application performance management, content integration, project management
    
Hewlett Packard Enterprise
Published By: Red Hat     Published Date: Aug 22, 2018
Unlike surveys that just look at what respondents say at a specific point in time, the BPTrends survey has been asking questions of process practitioners for over a decade. Thus, we are in a good position to generalize about ongoing trends in process work. Broadly speaking, the interest in business process change has evolved slowly. For some organizations the progress has been dramatic, but for most, their process initiatives are best described by the phrase “two steps forward; one step back.” An amazing number of organizations have focused on process work for several years, made significant progress, then, seemingly forgotten all about their process work, regressed, and then, a few years later, started up again.
Tags : 
    
Red Hat
Published By: HERE Technologies     Published Date: Dec 06, 2018
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. U.S. marketers are poised to double their spend on location-targeted mobile ads between 2017 and 2021 to $32 billion, according to research firm BIA/Kelsey. Understanding location is key to gaining insights and making change. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them. This gives them well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Dec 06, 2018
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer – including bridging the journeys between digital and physical worlds – you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: SAS     Published Date: Jan 17, 2018
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 17, 2018
Delivering exceptional customer experiences has become a key differentiator for top organizations today. Now you can see where your peers and competitors stand in the new Forbes Insights report Data Elevates the Customer Experience. This report is a comprehensive follow-up to an October 2015 preliminary pulse survey conducted among 105 executives of large global organizations. It identifies three categories of organizations – leaders, explorers and laggards – and measures the progress they have made with the data-driven customer experience based on three key pillars: organization (people), openness (data) and orchestration (processes). Read the results, find out where you stand and glean some new ideas from your peers about how to elevate the customer experience.
Tags : 
    
SAS
Published By: Epicor     Published Date: Sep 20, 2017
Selecting the right enterprise resource planning (ERP) software often poses a challenge for many businesses in the manufacturing industry. With so many options out there, it’s difficult to break down each potential application and choose the one that’s the best fit for your business. This Gartner report explains how ERP selection teams can come to a consensus and establish an understanding of all options by jointly populating and prioritizing a hierarchical, weighted ERP evaluation model. A structured evaluation model helps put all the cards on the table by explaining and justifying to internal stakeholders, external auditors, and vendors how and why an ERP software decision was made. Read the Gartner report and establish your own ERP evaluation model to see if the Epicor ERP solution is the right fit for your manufacturing business.
Tags : 
    
Epicor
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.