cio report

Results 1 - 25 of 65Sort Results By: Published Date | Title | Company Name
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
CIOs and other senior IT leaders have a growing responsibility to ensure that the right steps for cost savings and optimization are understood and applied. This report focuses on the clear and practical steps you can take to optimize cloud spend and get the most value for your dollar.
Tags : 
dell, iaas, cloud computing, cloud services, cloud budget, cloud spending, it budget, backup and recovery, best practices, it spending, return on investment, total cost of ownership, data center design and management, colocation and web hosting
    
Dell Cloud Marketplace
Published By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey, cloud computing
    
CloudEndure
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: ALE     Published Date: Jan 10, 2019
Campus Cybersecurity is a perennial ‘top of mind’ topic for Higher Education. For the second time in three years, information security topped Educause’s annual Higher Ed CIO Top 10 IT Issues survey. This should come as no surprise according to the latest Verizon Data Breach Investigations Report (DBIR). The report, which shows cybercriminal activity trending upwards, identifies the three most targeted industries as Financial and Insurance, Healthcare, and Education. To find out more, download this whitepaper today.
Tags : 
    
ALE
Published By: QTS Data Centers     Published Date: Mar 31, 2015
To keep pace with new business demands, rising customer expectations, and emerging technologies, IT leaders are realizing an important opportunity: infrastructure outsourcing. These services, including colocation, hosting, and cloud computing, give IT organizations the flexibility and agility to better serve the needs of the business.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management, cloud computing, infrastructure
    
QTS Data Centers
Published By: Cisco     Published Date: Dec 23, 2014
Read how cloud technologies can help IT team’s transition from tactical systems administrators to strategic service brokers. In doing so, they can redefine their roles, transform their relationships with business groups, and help move organizational priorities forward.
Tags : 
cloud, cloud computing, role of it, it relationships
    
Cisco
Published By: Cisco     Published Date: Jun 10, 2015
IT organizations are focusing on supporting growth, boosting revenue, advancing innovation, and delivering new customer experiences. Their mission is no longer about managing and troubleshooting technology. It’s about transforming business processes and driving new business outcomes.
Tags : 
converge, infrastructure, servers, networking, virtualization, cio, management, employee performance, itil, productivity, project management, cloud computing
    
Cisco
Published By: Cisco     Published Date: Jul 30, 2015
Enabling the Internet of Everything.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 28, 2015
Viewing this video you will learn: What is impeding many organizations from adopting cloud–based service delivery How to apply automation across all organizational layers using a stepwise, pragmatic approach with Cisco ONE Enterprise Cloud Suite.
Tags : 
cloud, hybrid, iot, public cloud, service, automation, application integration, service management, cloud computing
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
Forward-thinking IT departments are using the cloud as a transformative engine, helping them transition from tactical systems administrators to strategic service brokers. In doing so, they have an opportunity to redefine their partnership with business groups and become more influential, effective leaders of revenue and growth.
Tags : 
cloud, hybrid, iot, public cloud, service, automation, application integration, cloud computing
    
Cisco
Published By: Red Hat     Published Date: Jan 08, 2014
This executive brief provides results of a CIO Magazine Quick Pulse poll sponsored by Red Hat which highlights the industry move to private cloud technology and hybrid cloud environments through dual-source virtualization wherein companies value security, performance and support in a quest to build the new IT paradigm.
Tags : 
red hat, virtualization, storage, cloud, cloud data, hybrid cloud, cloud management, platform as a service, paas, cloud data access storage, cloud applications, scalability, deployment, cloud technologies, it management, platforms, servers, cloud computing, infrastructure
    
Red Hat
Published By: Red Hat     Published Date: Jan 08, 2014
This executive brief provides results of a CIO Magazine Quick Pulse poll sponsored by Red Hat, which highlights the industry move to OpenStack and benefits of moving to OpenStack cloud technology, wherein companies see promise and a need for implementation expertise.
Tags : 
quickpulse, red hat, open stack, infrastructure, infrastructure as a service, isas, workload, cloud, virtulization, data center, cloud computing, virtualization
    
Red Hat
Published By: Cisco     Published Date: Feb 13, 2015
Get CIO perspectives on the changing roles and relevance of IT teams in this report.
Tags : 
cloud computing, security, compliance vulnerabilities, visibility, service level agreements, cloud technologies, data management, data center
    
Cisco
Published By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : 
webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences, collaboration applications, online training, online meetings, portals, instant messaging, online webinars/events, human resources technology, enabling knowledge workers, erp, crm, external audiences, vendor solutions
    
WebEx
Published By: Workday     Published Date: Mar 02, 2018
Many CIOs are wary of moving data out of on-premise systems and into the cloud. But the cloud is the best choice for agility, flexibility, and data security. Read this report from CIO.com to learn about the benefits your business could experience by moving to the cloud.
Tags : 
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
: Many CIOs are wary of moving data out of on-premise systems and into the cloud. But the cloud is the best choice for agility, flexibility, and data security. Read this report from CIO.com to learn about the benefits your business could experience by moving to the cloud.
Tags : 
cloud, data, data security, flexibility
    
Workday
Published By: Amazon Web Services EMEA     Published Date: Oct 07, 2019
Application development has become core to business success. As a result, application developers have emerged as precious assets not just inside their companies, but across the global economy. According a report from Stripe, these developers have the potential to collectively raise worldwide GDP by $3 trillion over the next decade—which is why keeping them productive and professionally fulfilled is more important than ever
Tags : 
    
Amazon Web Services EMEA
Published By: DocuSign     Published Date: Mar 23, 2016
Download this CIO report and learn how you can seamlessly enable DTM in your organization directly using DocuSign from Office 365 to: -Send documents directly from Word, Outlook, and Sharepoint -Sign securely from anywhere on your Office 365 apps so you can keep business moving forward
Tags : 
    
DocuSign
Published By: StrongMail     Published Date: Sep 28, 2010
Break through consumer consciousness with lessons from the Q3 2010 Email Breakthrough Report's featured best-in-class email campaigns. Read about the top five trends to watch and read expert commentary on each featured campaign, ranging from effective application of movement in email, to leveraging subscribers' word of mouth to promote your brand.
Tags : 
strongmail, email breakthrough, report, email campaigns, emarketing
    
StrongMail
Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software
    
ESET
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: Mimecast     Published Date: Apr 18, 2017
"Email-borne insider threats both accidental and malicious are a real and ongoing problem for organizations. A recent commissioned study conducted by Forrester Consulting reveals many firms have experienced some form of insider security incident in the past 24 months. Download this report to get the findings. Discover Forrester’s perspective on internal threats and how organizations are responding and how they should be responding."
Tags : 
forrester, insider security, cyber security, internal threats, email fraud
    
Mimecast
Start   Previous   1 2 3    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.