rim

Results 126 - 150 of 1440Sort Results By: Published Date | Title | Company Name
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance
Published By: Adobe     Published Date: Jun 26, 2019
Take the guesswork out of TV media buying with Adobe Programmatic TV. With our automated approach, you can ensure less waste by better defining your audience and by speaking to them wherever they’ll best receive your content. Instead of spending hours trying to find the best reach and value, our data does the work for you. Fill out the form to read the article Advanced TV goes prime time.
Tags : 
    
Adobe
Published By: Crimson Hexagon     Published Date: Mar 06, 2013
In this white paper, learn how to account for missing metric in financial reporting and valuations. How can we perform aggregate analysis of online consumer opinion to complement traditional marketing analysis and due diligence?
Tags : 
aggregate consumer voice, no longer on mute, social media, due diligence, financial institutions, voice of the consumer
    
Crimson Hexagon
Published By: SAS     Published Date: Mar 01, 2012
The traditional managed reporting approach to BI is challenged to keep up with changing demand for business information. This research finds that providing business users with highly visual/interactive tools can help ensure they get what they need.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management, business activity monitoring, business integration, business management, business metrics, business process automation
    
SAS
Published By: Delphix     Published Date: Mar 24, 2015
With the recent spike in data theft and cybercrime, data masking is becoming an invaluable element of organization's security strategies. Delphix Agile Masking transforms secure data delivery, and enhances compliance and security while accelerating data management processes across the board.
Tags : 
    
Delphix
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
Deep-dive analytics tools have completely transformed the way many organizations do business—helping remove the guesswork from major areas of operations, and provide everybody with the clear, actionable answers they need to make informed business decisions. The benefits of sophisticated analytics are being reaped across the business. But according to Deloitte, HR is lagging behind— with only 14 percent of companies using analytics in HR, compared to 77 percent using these tools in Operations1.
Tags : 
human resources, employee engagement, talent management
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: SAS     Published Date: Apr 10, 2019
Durante bastante tiempo, la Inteligencia Artificial ha tenido un atractivo para mejorar los procesos, aumentar la productividad y generar impactos de primera y última generación en las organizaciones. Los avances en datos y analítica han permitido a los primeros en adoptar la IA a nivel mundial en todas las industrias a crecer más allá de los experimentos y los éxitos rápidos, así como a proporcionar ejemplos de éxito con esta tecnología.
Tags : 
    
SAS
Published By: NetApp     Published Date: Dec 05, 2016
"All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all-flash storage in the enterprise. Originally used to accelerate performance for dedicated, mission-critical applications, all-flash arrays are now replacing disk and hybrid-flash systems as the preferred storage systems for virtualized environments. At the same time, scale-out solutions have emerged that are designed to power the new cloud services of the future. The book examines various elements of all-flash storage: how it evolved, and why you should now consider it for all of your primary applications. You get acquainted with the NetApp portfolio of all-flash storage solutions and learn how each is designed to meet the needs of a specific type of application environment. You’ll also learn five strategies for making smart decisions about all-flash arrays for your next storage project. In that classic Dummies style, you’ll walk away with useful tips on how to select and deploy all-flash
Tags : 
netapp, database performance, flash storage, storage for dummies, data management, cost challenges
    
NetApp
Published By: Allscripts     Published Date: Oct 14, 2015
Download this Chronic Care Management Infographic to see the current state of patients with chronic conditions, the healthcare they are receiving, and healthcare spending.
Tags : 
chronic care management, chronic conditions, healthcare spending, comprehensive primary care initiative, cpci
    
Allscripts
Published By: Marketo     Published Date: Feb 29, 2016
This white paper revelas how Account-based marketing (ABM) can be an effective alternative approach to marketing for many businesses. Download this
Tags : 
abm, account-based marketing, demand generation techniques, abm, benefits of account-based marketing, roi, marketo, marketing, return on investment, customer experience management
    
Marketo
Published By: F5 Networks Inc     Published Date: Apr 15, 2016
As enterprises evolve to the 3rd Platform of IT, they will reap many benefits and face many challenges. Meeting the rapid pace of business and taking control of the customer experience must be balanced with keeping assets secure as the enterprise perimeter expands or dissolves altogether.
Tags : 
application, transformation, cloud, enterprise, mobile, social, technology, networking, it management, enterprise applications, data management, telecom
    
F5 Networks Inc
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
As the world emerges from global recession, it’s clear that today’s talent management challenges are dramatically different from the ones businesses faced even a few years ago. PwC’s annual global survey of CEO found that a full 63 percent of those surveyed are concerned about the future availability of key skills.
Tags : 
talent management, cloud, talent acquisition, employee retention
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: HP Inc.     Published Date: Jul 03, 2019
hile Bitcoin took a bit of a beating in August 2018, it did little to dampen interest in the obviously volatile cryptocurrency market. Bitcoin lost 20 percent of its value in just two weeks in August, according to some reports1 , and yet there appears to be substantial optimism in the currency. According to one report2 , there were 96 new crypto hedge funds launched in the first seven months of 2018 and when the Turkish Lira plummeted 20 percent in August 2018, there was a surge in Bitcoin trading3 . Cryptocurrency is clearly here to stay and while that may whet the appetite of brave investors, it’s also a magnet for crime. Unsurprisingly perhaps, hackers are targeting4 cryptocurrency exchanges but what many businesses and individuals may not realize is that there is serious money to be made in actually performing admin functions for the currencies themselves. Called cryptomining, it can be big business. Some reports5 have suggested that profits from mining have hit over $4 billion b
Tags : 
    
HP Inc.
Published By: SAS     Published Date: Jun 05, 2017
Data professionals now have the freedom to create, experiment, test and deploy different methods easily – using whatever skill set they have – all within one cohesive analytics platform. IT leaders gain the ability to centrally manage the entire analytics life cycle for both SAS and other assets with one environment. Organizations get faster results and better ROI from analytics efforts.
Tags : 
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
This collection is part of the ANA Magazine Thought Leadership Series sponsored by SAS. The articles explore the variety of ways to use analytics to create marketing functions that are more accountable and profitable.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management, business activity monitoring, business integration, business management, business metrics, business process automation
    
SAS
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: SAS     Published Date: Aug 27, 2010
Forget spreadsheets. Organizations that are winning in this down economy are using automated analytical tools to take a more scientific approach to decision making through observation, experimentation and measurement to improve their business processes.
Tags : 
sas, analytics software, business intelligence, data mining, automated analytical tools, computerworld, business analytics, business management, business process automation
    
SAS
Published By: Crimson Hexagon     Published Date: Jan 14, 2013
Political humor and political memes have represented a significant portion of political engagement on Twitter throughout the 2012 presidential campaign. This white paper analyzes how satire has propagate political messages.
Tags : 
social media, messaging, political messaging, satire, memes, crimson hexagon
    
Crimson Hexagon
Published By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
    
Oracle Linux
Published By: Enterprise Mobile     Published Date: Dec 04, 2014
Employees today want more—and they need more—if they’re going to stay productive from anywhere, which is usually the primary goal of having mobile devices in the first place. The right apps can enhance employee productivity, reduce expenses, and increase profitability which means that the decisions you make about the apps your organization uses are among the most important decisions your organization makes. No pressure, right? Our Mobile Application Development solution brief covers: App delivery Providing support for apps Securing apps
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile applications, mobile apps, application management, wireless, it management, knowledge management, enterprise applications, data management
    
Enterprise Mobile
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
This no-nonsense primer covers the benefits and basic principles of good testing, offers practical advice for getting the most out of your testing efforts, and pinpoints several areas where automation will help you achieve the most cost-effective results.
Tags : 
software testing, quality assurance, application testing, test and measurement, database development, quality assurance, scripting, software testing, web services, web service security, softlanding, soft landing, software development
    
SoftLanding Systems
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security, social media security, network security, email security, hacker detection, web service security, data protection
    
Palo Alto Networks
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Evaluating and managing the media buying processes for advertisements Warner Bros. purchases from its six sister companies can be time consuming and complicated. Generating reports for media purchased by each of Time Warner’s 2,500 media suppliers and comparing Warner Bros.’ spend decisions with competitors creates the need for internal resources dedicated specifically to focus on it – taking time away from other activities.
Tags : 
aprimo, financial system, auditing process, prioritize marketing programs, it management, it spending, marketing automation, project management, spend management
    
Aprimo, Inc.
Published By: Infinidat EMEA     Published Date: May 15, 2019
Le soluzioni enterprise di INFINIDAT® sono basate su un’architettura di storage unica e brevettata INFINIDAT – Un insieme completo di funzioni di software-de?ned storage (SDS) integrate con il migliore hardware commerciale presente sul mercato. Attraverso l’integrazione del software con una piattaforma hardware di riferimento ampiamente testata, INFINIDAT fornisce la prima vera soluzione SDS di classe enterprise.
Tags : 
    
Infinidat EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.