zero

Results 226 - 250 of 264Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, security, software development, it management
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco
Published By: McAfee     Published Date: Feb 12, 2013
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
mcafee, av-test, deep defender, rootkits, detection, network security, email security, intrusion detection, intrusion prevention, phishing, security policies, vulnerability management
    
McAfee
Published By: Equinix     Published Date: Feb 13, 2014
Read our interconnectivity infopaper to find out how tapping into our more than 900 networks and 450 cloud providers can give you secure, high-bandwidth connections with zero latency and ensure your success in the Internet of Everything era.
Tags : 
interconnectivity, data center design, blades, servers, cloud computing, cloud application, green computing, storage, applications, infrastructure, internetworking hardware, blade servers, network attached storage, data center design and management
    
Equinix
Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
When Daniel Shuler joined Phoenix Children’s Hospital (PCH) as CISO in 2016, he knew the hospital would be a tempting target for cyber criminals due to the massive troves of sensitive data it collects to diagnose and treat patients. Over the next three years, Shuler spearheaded a complete overhaul of PCH’s security fabric. First, he decommissioned the legacy AV and engaged BlackBerry Cylance’s ThreatZERO™ consultants to deploy CylancePROTECT® on over 4,000 endpoints. Soon after, CylancePROTECT stopped a ransomware attack that could have disrupted patient care by preventing access to electronic medical record data. Next, he engaged a BlackBerry Cylance Red Team to perform annual penetration testing assignments. Says Shuler, “Our relationship is unique in my experience. BlackBerry Cylance has proven repeatedly that they have our best interests at heart and that they share our commitment to provide the best care possible for children and their families.” Read the case study for the full s
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. That’s not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Jun 26, 2014
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : 
ibm, security, cyber security, cybercrime, cybercriminals, malware, network security, it management
    
IBM
Published By: Eyeblaster, Inc.     Published Date: Apr 02, 2009
One of the big challenges faced by online marketers and agencies that handle large online budgets is maximizing conversions and optimizing online budgets at zero or minimum cost. This issue of the Eyeblaster Analytics Bulletin presents findings on conversions and a multitude of methods that can be deployed to ensure a better yield of successful digital campaigns.
Tags : 
eyeblaster, click-thru rate, conversion rate, format type, conversion rate, rich media, data capture, ctr, automatic optimization, conversion metric, behavioral sequencing, optimization, roi, post-click, post-impression, see-click-convert, see-delay-convert, recall, in-banner, e-commerce
    
Eyeblaster, Inc.
Published By: Oracle     Published Date: Jan 13, 2014
Watch Oracle’s Thomas Kurian and Doug Clemmans as they explain: Why today’s sales processes have rendered many CRM systems obsolete How Oracle Sales Cloud enables smarter selling, leveraging mobile, social, and big data How smarter selling allows reps to sell more, managers to know more and companies to grow more. You’ll also hear from customers and see a demonstration of Oracle Sales Cloud’s “zero training” user interface. Register to watch now.
Tags : 
sales cloud, salesforce.com, mobile sales, social selling, sales analytics, territory management, sales quota management, sales performance management, sales forecasting, sales compensation, sales operations, contact management, opportunity management, sales collaboration
    
Oracle
Published By: Riverbed     Published Date: Sep 08, 2014
In today’s app-centric world, poor performance is bad business. It’s your job to protect the end-user experience—but that’s a tall order without a UNIFIED VIEW of performance that puts your network and application health in crystal-clear focus.
Tags : 
apm, transactions, big data, analytics, performance monitoring, enterprise applications
    
Riverbed
Published By: DataSynapse     Published Date: Feb 26, 2007
High availability (HA) configurations seek to bring downtime to zero - but can increase complexity across the IT organization, often in the form of excess technology, financial, and human capital investments.  Learn how application virtualization can reduce planned and unplanned downtime, and deliver greater flexibility.
Tags : 
high availability, it management, productivity, total cost of ownership, return on investment, configuration management, flexibility, data synapse, datasynapse
    
DataSynapse
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper is intended for Information Security and Information Technology professionals interested in understanding Zero-day Attacks, the various protection schemes available today and how Top Layer Network's Intrusion Prevention System (IPS) solutions provide the best mechanisms for protection from these types of attacks.
Tags : 
network security, intrusion prevention, ips, cso, server protection, toplayer, top layer, security, hacker detection, internet security, security management
    
TopLayer
Published By: PMMI     Published Date: Mar 10, 2009
'Automation Trends' covers robotics and how the packaging industry can speed products to market through changeover acceleration, efficiency improvement and cost reduction.
Tags : 
packaging, pmmi, automation trends, robotics, packaging industry, acceleration, efficiency improvement, robotic industry association, ria, robotic palletizing sector growth, elau’s virtually zero cabinet
    
PMMI
Published By: Subrago     Published Date: Apr 30, 2009
The key objective of this white paper is to highlight the key issues and discuss processes and controls required to build a high performing IT support organization.
Tags : 
it support, subrago, it costs, customer transaction, high performing it support, it dependency, tolerance level, production services, change management, itil, itil v3, efficiency, it infrastructure, cab, change advisory board, segregation of duties, zero down, metrics, hardware performance, database performance
    
Subrago
Published By: BMC ESM     Published Date: Mar 01, 2009
Free utility finds the fragmentation that's crippling your network! New Disk Performance Analyzer for Networks 2.0 takes the guesswork out of tracking networked system performance. This revolutionary utility scans networked systems' performance from one single access point. It equips administrators with an arsenal of performance data, so they can zero in on systems' fragmentation and slows. This second edition comes with a series of improvements which afford users more control and flexibility. Systems can be selected from the Active Directory or IP Address. And this cutting-edge tool supports custom grouping. So, repeated scans are easy to set up and run. Performance reports can also be scheduled for off-peak hours. Results will be automatically sent to your e-mail address. Performance reports are now exported to a MicrosoftT SQL database for easy sorting and querying. Don't let low-functioning systems go unnoticed. Get Disk Performance Analyzer for Networks 2.0 free now!
Tags : 
it management, change management, it spending, itil
    
BMC ESM
Published By: Delphix     Published Date: Apr 15, 2011
See how Delphix database virtualization shrinks nonproduction database storage requirements by up to 10x, and reduces database provisioning and refresh times from days to minutes with zero impact to production systems.
Tags : 
delphix, database virtualization, storage requirement, development, testing, storage virtualization, database development, virtualization
    
Delphix
Published By: Adobe     Published Date: Feb 20, 2014
Download our 2014 Digital Trends report, created in partnership with eConsultancy, to discover the trends that are driving exceptional customer experiences — and the tools you need to gain a competitive edge. Based on a global survey of more than 2,500 marketers, our report found that customer experience, mobile marketing, and content marketing are major business imperatives for 2014. However, only 23% of marketers believe they have the tools they need to maximize their impact in these areas. Get the report now to uncover more insights for the coming year, including: - B2C brands will focus on targeting and personalization - Two-thirds of respondents will experiment with new media - Brands will zero in on mobile customer behavior
Tags : 
adobe, adobe social, social media, marketing, ecommerce, retail, market data, digital trends, benchmarking, user experience, customer experience, content marketing, targeting, conversion, mobile marketing, branding
    
Adobe
Published By: Nutanix, Inc.     Published Date: Oct 17, 2012
Join us for this hands-on, technical VDI Design Workshop where everything from choosing the right broker to zero clients and multi-site design will be discussed and analyzed.
Tags : 
vdi, desktop, technology, workshop, nutanix, storage area networks, storage management, storage virtualization
    
Nutanix, Inc.
Published By: HP-Intel®     Published Date: Jul 22, 2013
White Paper
Tags : 
healthcare, zero downtime, integration, hospital
    
HP-Intel®
Published By: Cisco     Published Date: Mar 03, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking. At the same time, the Internet of Everything (IoE) is accelerating. Opportunities are opening up for businesses and attackers alike as more things come online, along with the people, processes, and data that interact with them.
Tags : 
security, detection, blocking, data, data management, cloud computing, infrastructure
    
Cisco
Published By: GE Healthcare     Published Date: Feb 23, 2015
Southwestern Ontario Diagnostic Imaging Network relies on Centricity™ Clinical Archive to connect 62 hospitals with disparate PACS & RIS systems, resulting in reduced storage costs and data duplication and increased productivity and enhanced quality of care. Learn more in this case study. Centricity Clinical Archive includes the following product components: Centricity Enterprise Archive, Universal Viewer ZFP, Caradigm eHIE, Centricity Clinical Gateway, NextGate MatchMetrix EMPI, PACSGEAR PacsSCANTM
Tags : 
xds, cross enterprise document sharing, unified view of patient images, archive & storage, image sharing & management, vendor neutral archive (vna), centricity clinical archive, mobile image capture, enterprise archive, archiving services, zero footprint viewer, image archive, dicom storage
    
GE Healthcare
Published By: GE Healthcare     Published Date: Feb 23, 2015
Huron Regional Medical Center added Universal Viewer with Zero Footprint (ZFP), a Web-based image viewing strategy that reliably, timely and financially efficiently delivers images.
Tags : 
zero footprint viewer
    
GE Healthcare
Published By: CA Technologies     Published Date: Aug 10, 2015
As organizações ágeis de hoje delegam às equipes de operações um tremendo desafio: implementar novas versões em produção imediatamente depois de completar o desenvolvimento e a prova. Para garantir a implementação exitosa dos aplicativos, se requer um processo automático e transparente. Este proceso é conhecido como Zero Touch Deployment™. Este white paper revisa os dois enfoques de Zero Touch Deployment: uma solução baseada em scripts e uma plataforma de automatização da implementação. O artigo explica como cada um pode resolver os principais desafios tecnológicos e organizacionais que enfrentam as organizações ágeis quando elas se dispõem a por em prática um sistema de implementação automática.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.