zero

Results 176 - 200 of 264Sort Results By: Published Date | Title | Company Name
Published By: Dell Software     Published Date: Jul 14, 2008
Learn best practices for an accurate, efficient and ZeroIMPACT Exchange migration across all major platforms by watching this on-demand webcast.
Tags : 
quest, exchange, migration, zeroimpact, messaging, network management, best practices, microsoft exchange
    
Dell Software
Published By: NetIQ     Published Date: Jan 12, 2011
This report is a deep dive into a potential way in which you could use the concepts of the Zero Trust Model and conceivably implement them in a real-world environment.
Tags : 
netiq, security, network architecture, forrester, auditing, best practices, zero trust model, compliance, encryption
    
NetIQ
Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics, network security monitoring, situational awareness, threat geek, threat intelligence, threat mitigation, enterprise, networks, data, kindervag, forrester, architecture, monitoring
    
NetIQ
Published By: TeamQuest     Published Date: Aug 21, 2012
Verizon Wireless Achieves Business Success with Problem-free iPhone 4 Launch
Tags : 
verizon wireless, teamquest, record sales, performance, iphone, customers
    
TeamQuest
Published By: TeamQuest     Published Date: Apr 09, 2014
Using a simple, easy-to-understand scale from zero to 100, TPI is calculated automatically and provides a simple key performance indicator for overall health. Competitive solutions typically combine several KPIs using simple math to create an overall health KPI. But TPI incorporates more sophisticated analysis that actually understands the queuing behavior of computer systems.
Tags : 
teamquest, tpi, kpi, virtualization, it professionals, optimize software, distributed environment, data center, performance
    
TeamQuest
Published By: IBM     Published Date: Aug 08, 2012
While economic recovery is clearly in process, your capital and operational budgets are still extremely tight. At the same time, your maintenance organization is being pressured to take a stance of zero tolerance toward safety incidents while reducing maintenance costs and minimizing asset downtime. Read this in-depth Aberdeen Group report, based on responses from 117 executives of successful companies, to find out how best-in-class businesses are proactively managing these challenges. You'll learn these techniques for optimizing maintenance and operations-and more: creating a culture of collaboration among teams across your enterprise; empowering decision makers with appropriate, highly accurate metrics; and leveraging predictive management and analytics to manage assets throughout their life cycle.
Tags : 
ibm, technology, software, asset performance management, economic recovery, operational budgets, capital, asset management, maintenance cost, storage management, business management, analytical applications, information management, software compliance, service management
    
IBM
Published By: McAfee     Published Date: Jan 28, 2014
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
av-test, deep defender, rootkits, detection, anti spam, anti spyware, anti virus, application security, hacker detection, internet security, security management
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis, simplifies remediation, security, it management
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
You spoke and we listened. Today’s advanced malware threats have you spending a lot of resources fighting an uphill battle. The answer is McAfee Advanced Threat Defense—so you can find, freeze, and fix threats.
Tags : 
advanced malware, maware threats, malware problems, malware attacks - rootkits, phishing, zero-access, trojans, apts, botnets, social engineering, sandboxing, layered defenses, block and contain malware, security, it management
    
McAfee
Published By: NetApp     Published Date: Jan 21, 2014
When your industry’s revenue projections flatten, how can you break away and continue to grow? Learn how Orange Business Services leveraged NetApp storage to reinvent their company by becoming a cloud services provider and exceeded their revenue goals of zero to €500 million by 2015.
Tags : 
cloud services, revenue projections, business growth, cloud provider, storage, data management
    
NetApp
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security, it management
    
CDW-Trend Micro
Published By: GE Healthcare     Published Date: Oct 14, 2015
Download this Interactive Resource Guide today to learn more about the role GE Healthcare plays in optimizing healthcare organizations’ investment in imaging IT to help streamline healthcare costs, increase diagnostic confidence and enhance the quality of patient care.
Tags : 
gneral electric, ge helathcare, imaging, workglow, centricity, archiving, biometrics, mobile data systems, customer service, collaboration, records management, search and retrieval, email archiving
    
GE Healthcare
Published By: McAfee     Published Date: Mar 31, 2017
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics from diagnostic and descriptive to prescriptive and proactive, leading to faster and more accurate detection.
Tags : 
machine learning, advanced analytics, advanced threats, sandbox, zero-day, malware, mcafee labs, dynamic endpoint
    
McAfee
Published By: Avaya     Published Date: Nov 27, 2017
In an industry like automobile sales and service, responsiveness can easily mean the difference between a service appointment, a large-ticket sale – or a customer taking their business elsewhere. Despite its reputation for meeting and exceeding customer needs, Voss Auto Network was using an aging communications system. The network of dealerships, including eight locations across Ohio, serves over 500 employees. Getting calls even when “walking the lot,” quickly retrieving voicemails, and having the ability to easily track missed calls all proved key to taking customer service, sales, and repeat business to the next level.
Tags : 
    
Avaya
Published By: Oracle     Published Date: Aug 19, 2016
This white paper goes into detail about Oracle's cloud-scale zero data loss recovery appliance.
Tags : 
    
Oracle
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity, zero-day attacks, it systems, security, data security, resiliency layers, hardened assets, identification, network security, application security, hacker detection, internet security, intrusion detection
    
Qualys
Published By: Marathon Technologies     Published Date: Sep 18, 2009
There are many expensive, complex technologies that promise high availability for SQL. Fortunately there are also simple, automated ways to get the highest levels of protection. The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql, availability, infrastructure, network architecture, network management, server hardware, servers, server virtualization, microsoft exchange, windows server, data protection
    
Marathon Technologies
Published By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
This ebook helps you determine whether your company has an access issue and outlines ways to lower your risk of getting breached by increasing your identity and access (IAM) maturity through adopting a Zero Trust approach with the right IDaaS solution. You’ll learn the best practices to establish identity assurance, limit lateral movement, enforce least privilege and audit everything. Discover how to avoid a Password Crisis.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
With compromised credentials as today’s #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This eBook looks at what’s behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach — one that better addresses the needs of the hybrid enterprise. It explores ways to strengthen your company’s identity maturity with a Zero Trust approach and proven best practices that reduce your risk of a security breach.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: May 03, 2018
"Watch the On-Demand webinar to hear Centrify's Chief Product Officer, Bill Mann and Forrester Principal Analyst, Chase Cunningham in a lively discussion how Zero Trust concepts can be applied to Identity and Access Management. "
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: May 03, 2018
Watch this webinar On-Demand: Cybersecurity is broken. Trust is the enemy. An entirely new approach is required — one based on Zero Trust. Championed by industry leaders including Google, Forrester, Gartner and Centrify, Zero Trust Security verifies every user, their device, and gives just enough access and privilege.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
A Zero Trust approach to security requires a combination of Identity Services to deliver identity assurance, trusted endpoints, conditional policy and least privilege. This guide identifies the specific capabilities you need within four key areas of identity and helps you compare capabilities across major vendors with respect to Application Services, Endpoint Services, Infrastructure Services and Analytics Services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
    
Centrify Corporation
Published By: Aerohive     Published Date: Jan 04, 2012
In today's virtual enterprise, access to corporate resources must be secure, reliable, and manageable, with consistently enforced policy while simultaneously allowing access from anywhere at any time. This is why access network strategies are critical to business growth.
Tags : 
aerohive, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services, business continuity, teleworker, remote office, call center, virtual office, disaster recovery, zero touch wireless, retail pci, convergence, infrastructure, interoperability, local area networking
    
Aerohive
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.