rim

Results 226 - 250 of 1439Sort Results By: Published Date | Title | Company Name
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : 
mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices, networking, security, wireless
    
CDW-Trend Micro
Published By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : 
talent risks, talent issues, talent management, development roi, human resources
    
CEB
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
We live in an era of increased business risk and while news headlines focus on threats to business such as cyber-crime and global terrorism, there is a more pervasive and immediate issue in the form of security and continuity of the energy supply of every business.
Tags : 
energy, impact, resilience, strategy
    
Centrica Business Solutions
Published By: Centrify     Published Date: May 26, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : 
security, endpoint security, access control, authentication, security management
    
Centrify
Published By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
    
Centrify Corporation
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"If you’re an online retailer, you’re already familiar with the selling power of Amazon. With more than 304 million active user accounts and 43% of all online retail sales in the US going through the marketplace, this e-commerce giant’s influential position continues to expand. In this eBook, we reveal seven Amazon secrets that we’ve seen online retailers use to help them succeed on Amazon, including: - Optimizing search terms - Taking advantage of Amazon Prime - Using a repricing tool And four more!"
Tags : 
ecommerce, retail, amazon, advertising, selling online, online shopping, online advertising, marketing, marketplace
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"To consumers, Amazon is a land of plenty. A place where you can find anything. It’s easy to understand why shoppers start more than half of their online product searches on Amazon — and why more than 100 million people pay for premium Prime memberships to unlock access to exclusive deals. As the marketplace that’s set the standard for remarkable ease in browsing and buying, Amazon serves up millions of indexed search results to purchase ready shoppers every single day. That’s why it’s so important to step back and see where your listings stand from your consumer’s point of view. How does the results page break down? Do your products stand out? Or are they easy to miss? Most importantly, do your products even show up? In this eBook, we break down the essential components you need to address to get your products ready to compete for page one search results: - Your product data - The Amazon Buy Box - Amazon advertising"
Tags : 
    
ChannelAdvisor
Published By: Chatsworth     Published Date: Oct 22, 2016
By using intelligent and scalable platforms, your organization can improve resource consumption, cloud utilization and more. Solid data center management platforms help empower your business and data center to consume less energy and trim infrastructure costs.
Tags : 
chatsworth, data centers, data center management, infrastructure, energy, power and cooling, servers, blade servers, storage virtualization, it spending, data center design and management
    
Chatsworth
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4, ipv6, security, video traffic, cloud infrastructure, network performance, networking
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
With maturity comes clarity, and the choice between public, private or hybrid cloud deployments is a prime example. According to a recent IDG Research Survey, private and hybrid cloud adoption is gaining strength at organizations of all sizes, and has the power to serve as a competitive advantage. However IT leaders must address certain barriers to fulfilling the promise of a private or hybrid cloud initiative.
Tags : 
cisco, private cloud, idg research survey, hybrid cloud, networking
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, security, web service security
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, firewall, optimize, security, web service security, productivity
    
Cisco
Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network, disruption, operations, organizations, national, security, data management
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The data center has gone through many major evolutionary changes over the past several decades, and each change has been defined by major shifts in architectures. The industry moved from the mainframe era to client/server computing and then to Internet computing. In 2011, another major shift began: the shift to a virtual data center. This has been the primary driver in enabling customers to transition to the cloud and ultimately IT as a service. The shift to a virtual data center will be the single biggest transition in the history of computing. It will reshape all the major data center tiers: applications, storage, servers and the network.
Tags : 
data center, consolidation, server virtualization, new applications, it management, data management
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : 
attacks, viruses, protection, networks, threats, arms race, vulnerabilities, macroviruses, worms, spyware, rootkits, defenders, security, data management
    
Cisco
Published By: Cisco     Published Date: Jun 03, 2015
As demands for “right here, right now” information sharing continue to rise, today's organizations are taking a hard look at their branch and remote locations, where performance and service enablement have always been a primary indicator of companywide productivity. In this episode, the TechWiseTV team takes a dive deep into the innovations and opportunities made possible by Cisco's new 4000 family of Integrated Services Routers. Learn how the architecture and new features that make up this exciting addition to Cisco's router portfolio are bringing more exciting new levels of integration, performance, and productivity to the branch office than ever before.
Tags : 
cisco, techwise, routers, wan, productivity, performance, network architecture, network performance, wide area networks
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The data center has gone through many major evolutionary changes over the past several decades, and each change has been defined by major shifts in architectures. The industry moved from the mainframe era to client/server computing and then to Internet computing. In 2011, another major shift began: the shift to a virtual data center. This has been the primary driver in enabling customers to transition to the cloud and ultimately IT as a service. The shift to a virtual data center will be the single biggest transition in the history of computing. It will reshape all the major data center tiers: applications, storage, servers and the network.
Tags : 
cisco, zk research, data center, itaas, migration, cloud computing, applications, servers, network, service management, virtualization, infrastructure, design and facilities
    
Cisco
Published By: Cisco     Published Date: Jun 10, 2015
As demands for “right here, right now” information sharing continue to rise, today's organizations are taking a hard look at their branch and remote locations, where performance and service enablement have always been a primary indicator of companywide productivity.
Tags : 
wifi, wireless, technology, network, 802.11, wan, design, convergence, network performance, mobile computing, wireless application software, wireless service providers, wlan, cloud computing
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : 
cisco, public safety, disaster response, networking, security
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
Group video systems primarily serve the need for high-quality video interaction across a range of meeting room sizes.
Tags : 
video, system, high quality interaction, sip, network management, network performance, network security, wide area networks, best practices
    
Cisco
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps, small business, finance
    
Cisco
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.