upc

Results 1 - 25 of 77Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Oct 09, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
When determining the best way to protect their applications and data on Amazon Web Services (AWS), organizations are often challenged by the high total cost of ownership and threat dwell times found in other security solutions. Armor can help your organization overcome these barriers and increase awareness of what is being deployed, and where, so you can better control your security policies. Attend our upcoming webinar to see how Armor helps customers reduce their time to market, accelerate development timeline, and gain quick, secure application access.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
    
AWS
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
    
Akamai Technologies
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
¿Está usted planificando en forma activa para la revolución digital de RR. HH.? La revolución digital de RR.HH. ha llegado y está avanzando a gran velocidad, y las organizaciones están buscando formas nuevas, efectivas y productivas de cumplir con las crecientes exigencias del negocio: agilidad, acceso global 24x7, velocidad y precisión. Las organizaciones líderes saben que necesitan generar disrupción o verse afectados por ella, por lo tanto han comenzado a crear entornos de trabajo completamente nuevos a los que llamamos la revolución digital en el trabajo. Está cambiando la forma en que pensamos y nos relacionamos con el trabajo cotidiano.
Tags : 
    
SAP SuccessFactors
Published By: Dell EMC Storage     Published Date: Dec 18, 2018
La transformación de la TI es un concepto que ahora resulta aún más atractivo para las empresas que hace 12 meses. Parece ser similar a otro término actual: “transformación digital”. Pero, en realidad, una transformación digital eficaz no ocurre sin la transformación de la TI. Una empresa que se somete a la transformación de su infraestructura de TI ya no tiene que depender de tecnologías existentes rígidas, manuales y basadas en sistemas aislados. Observa un aumento en la velocidad operacional, la eficiencia, la escala y la rentabilidad de la TI, ya que se automatizan las tareas, se optimizan los procesos y se liberan los recursos. Esas mejoras en el nivel de la TI impulsan una transformación digital de mayor escala, lo que permite que la empresa prospere en la economía digital actual. Puede superar a la competencia en innovación, mentalidad y avances, lo que en última instancia le permitirá convertirse en una empresa innovadora en lugar de sufrir interrupciones. Obtenga más informaci
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Dec 18, 2018
La transformación de la TI es un concepto que ahora resulta aún más atractivo para las empresas que hace 12 meses. Aunque este término no es sinónimo de la transformación digital, los dos conceptos están estrechamente vinculados, porque una transformación digital eficaz no puede ocurrir sin la transformación de la TI. Una empresa que transforma su infraestructura de TI ya no tiene que depender de tecnologías existentes rígidas, manuales y en sistemas aislados. Observa un aumento en la velocidad operacional, la eficiencia, la escala y la rentabilidad de la TI, ya que se automatizan las tareas, se optimizan los procesos y se liberan los recursos. Esas mejoras en el nivel de la TI impulsan una transformación digital de mayor escala, lo que permite que la empresa prospere en la economía digital actual. Puede superar a la competencia en innovación, mentalidad y avances, lo que en última instancia le permitirá convertirse en una empresa innovadora en lugar de sufrir interrupciones. Obtenga
Tags : 
    
Dell EMC Storage
Published By: Nokia     Published Date: Nov 08, 2016
The company tells you to get a new store operational within weeks for an upcoming launch. Instantly you get that sunken feeling in your stomach.
Tags : 
alcatel-lucent, wide area networking, nuage network, virtualized network services, networking, wireless, enterprise applications
    
Nokia
Published By: Entrust Datacard     Published Date: Jun 29, 2017
Customers are the ones in control. And they give their business to the businesses keeping pace. To learn how you can keep pace, get a sneak peek into the upcoming webinar – “The Bottom Line About Instant Card Issuance” by downloading the new insight infographic.
Tags : 
    
Entrust Datacard
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: Oracle     Published Date: May 05, 2017
Los comerciales venden. Los clientes compran. Lo digital transforma. En el entorno actual de los negocios, cada persona debe saber gestionar el impacto de la “disrupción digital”.
Tags : 
    
Oracle
Published By: Cisco     Published Date: Apr 11, 2016
El panorama de amenazas actual no se parece en nada al de hace solamente 10 años. Los ataques simples que provocaban daños controlables han dado lugar a operaciones modernas de ciberdelito que son sofisticadas, están bien financiadas y son capaces de generar interrupciones importantes en las organizaciones y en la infraestructura nacional. Estos ataques avanzados son difíciles de detectar, además permanecen en las redes por mucho tiempo y acumulan recursos de red para lanzar ataques a todas partes.
Tags : 
    
Cisco
Published By: Infinidat EMEA     Published Date: May 15, 2019
La disrupción digital, la inestabilidad económica, las convulsiones políticas y la escasez de talentos han sido señalados en algún momento de los dos últimos años como los culpables del fracaso empresarial o, al menos, de la pérdida de rentabilidad y ganancias.
Tags : 
    
Infinidat EMEA
Published By: Workforce Software     Published Date: May 26, 2015
New labor laws are a regular occurrence these days… and yet they’re just a small slice of your compliance demands. To help you stay informed and effective, our Director of Compliance takes an annual look at some of the biggest upcoming challenges and lets you know how to prepare.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor
    
Workforce Software
Published By: Riverbed     Published Date: Apr 12, 2017
AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That’s where Riverbed comes in. Riverbed’s SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Register for the upcoming webinar to experience a fundamentally new approach to networking, with real users sharing their experience in addition to a joint customer, OpenEye that has saved time and money by utilizing this approach to cloud networking. OpenEye Scientific Software leveraged Riverbed SteelConnect to very quickly and easily establish secure connections to and between AWS VPCs, saving hours of network administration time.
Tags : 
    
Riverbed
Published By: SAS     Published Date: Nov 10, 2014
Learn how this upcoming year should be the year you make your big data actionable and see what else you should be doing to maximize its potential.
Tags : 
sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling
    
SAS
Published By: Skillsoft     Published Date: Mar 13, 2015
Most companies are well aware of the risks bribery and corruption pose when operating in the global marketplace. However, what companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives. With the recent up-tick in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in other areas of the globe, including upcoming legislation in Ireland, knowledge of bribery rules and regulations has never been more critical.
Tags : 
skillsoft, corruption, bribery, foreign corrupt practices act, fcpa, compliance, compliance initiatives, human resources
    
Skillsoft
Published By: McAfee     Published Date: May 22, 2014
Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet
Tags : 
vpn, red privada virtual, firewall de próxima generación, mpls, bgp, vpn de alta disponibilidad, conmutación de capa multiprotocolo, seguridad
    
McAfee
Published By: Avi Networks     Published Date: Mar 06, 2018
Vendors such as F5 Networks and Citrix NetScaler have done little to keep up with the needs of modern applications. Learn how deploying the Avi Vantage Platform resulted in TCO savings for global enterprises in our free whitepaper.
Tags : 
    
Avi Networks
Published By: CBRE     Published Date: Aug 02, 2017
Scoring Tech Talent is a comprehensive analysis of labor market conditions, cost and quality for highly skilled tech workers in the U.S. and Canada. The 50 largest markets were ranked according to their competitive advantages and appeal to tech employers and tech talent. The analysis also provides insight into the quality of tech talent, their demographics and how tech talent growth patterns are impacting cities and real estate markets. Download the report to see the full ranking of the top-50 tech talent markets in the U.S. and Canada. Below, explore the markets using our new Tech Talent Analyzer or sign up for our upcoming webinar.
Tags : 
workforce, recruitment, tech recruitment, labor market
    
CBRE
Published By: Alight Solutions     Published Date: Aug 09, 2018
Download this webinar to learn more about how to prepare for your company's upcoming Workday release! During this webinar, Alight's panel of Workday experts will focus on the steps we recommend you take during each phase of your testing schedule, highlighting specific considerations for: • Configuration, including a focus on Payroll and Financial Management • Integrations and reports • Test management
Tags : 
    
Alight Solutions
Published By: Cisco     Published Date: Apr 22, 2010
Please join us for an informative session as we demonstrate how organizations are increasing efficiencies, improving performance, minimizing risk, and reducing TCO using SAP Solution Manager and Tidal Intelligent Automation for SAP. Also, learn more of how this capability will be delivered as a solution extension with Solution Manager.
Tags : 
cisco live webinar, book automation, sap solution manager, operational support, tidal intelligent automation, tco
    
Cisco
Start   Previous   1 2 3 4    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.