ber

Results 1 - 25 of 2805Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
Imagine the benefits that a VDI environment could realize during a boot storm. All the VMs are based on the same template, and therefore they all have the same set of files during initial boot. Normally, 100 VMs all booting at the same time would require a significant number of HDDs, but with this hyperconverged infrastructure platform, the first VM to boot reads the block off the HDD, which promotes that block into cache. Now the next 99 VMs can all access that same block from cache. That’s a 100:1 IOPS reduction on the IOPS-bound disks.
Tags : 
hardware, policy, scaling challenges, technical, employees, business, hyperconverged
    
Hewlett Packard Enterprise
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: Oracle     Published Date: Nov 08, 2017
Pour réussir dans le contexte concurrentiel actuel, les entreprises doivent se liberer des limites inhérentes à leurs infrastructures informatiques existantes. L’époque de l’achat de matériel et de la gestion d’énormes centres de données pour faire fonctionner les systèmes informatiques est en train de prendre fin. La gestion et la maintenance des infrastructures sont tout simplement trop coûteuses.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : 
detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Microsoft     Published Date: Jan 09, 2018
Relationship Selling beruht auf dem Konzept, langfristige Beziehungen zu Ihren Kunden aufzubauen, die für künftigen Umsatz sorgen. Dieses Konzept erfordert ein Umdenken bezüglich der Art und Weise, wie Sie als Verkäufer kommunizieren. Dabei geht es nicht nur um die verwendeten Tools, sondern vielmehr darum, wie Sie diese Tools nutzen, um Kunden zu erreichen, zu binden und engere Beziehungen zu ihnen aufzubauen.
Tags : 
herausforderung, lösung, automatisierung, geschäftsbeziehungen, microsoft
    
Microsoft
Published By: Quick Base     Published Date: Dec 18, 2017
Spreadsheets are good for number crunching – but many professionals use them to do things they were never meant for. The result? Long office hours, chasing down status updates, and compiling data manually. Learn the 5 signs of spreadsheet misuse and how to overcome them in this webcast.
Tags : 
audit, insights, accounting, ap management, compliance, finance, spreadsheets, collaboration
    
Quick Base
Published By: Cisco     Published Date: Dec 27, 2017
Among your primary responsibilities as a board member is providing advice on both business strategy and enterprise risk. A general understanding of risk management is essential when looking at cyber risk specifically. Ultimately, an enterprise should consider adding cybersecurity expertise to its board membership, but all members can benefit from increasing their understanding about how cyber risk affects corporate strategy and the overall enterprise risk profile. To provide effective strategic advice to company leadership on cyber risk, you must ask the right questions, including whether a company does ongoing cyber risk assessment and management, and how.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Digital transformation is reshaping the business landscape faster than at any time in history. It used to take decades to disrupt a market, but natively digital companies such as Uber and Airbnb have disrupted their industries in just half a decade. Digitization is creating new winners and losers at an unprecedented rate. Organizations that adopt a digital strategy will leapfrog the competition, while those that do not will risk becoming irrelevant within five years. One important step in becoming a digital enterprise is becoming an agile organization—that is, having the ability to take advantage of market opportunities faster than the competition. This shift to being an agile business has now become a top initiative for IT and business leaders. However, business agility cannot be achieved without having an agile IT infrastructure to enable it. This is why businesses spent more than $12 billion on technology to make IT more agile in 2014, according to ZK Research.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 17, 2018
As the region is poised to take its position amongst the world’s top digital economies, the doors are wide open for cyberattacks. A radical agenda can help policy makers and industry leaders defend and capture a wealth of value.
Tags : 
    
Cisco
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diebstahl und Missbrauch sensibler administrativer Anmeldeinformationen verursachen Sicherheitsverletzungen und Betriebsunterbrechungen. CA Privileged Access Manager verbessert die IT-Security, Unternehmenseffizienz und Compliance durch den Schutz privilegierter Anmeldeinformationen und Ressourcen sowie durch die effiziente Überwachung, Kontrolle und Verwaltung der Aktivitäten privilegierter Anwender.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
CA Live API Creator enthält die drei Dinge, die für jeden Anwendungsprototyp erforderlich sind: • Datenbank • Geschäftslogik • Benutzeroberfläche Datenbank – Ihre oder unsere Sie können Ihre vorhandene Datenbank oder eine von CA Live API Creator für Sie erstellte Cloud-Datenbank verwenden. In beiden Fällen sind Sie schnell einsatzbereit.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
In der digitalen Wirtschaft sind Anwendungsprogrammierschnittstellen (APIs) unerlässlich, um Ideen schnell umzusetzen und neue Geschäftschancen zu nutzen. Sie sind die Bausteine der digitalen Transformation und ermöglichen es Unternehmen, eine herausragende Customer Experience bereitzustellen, neue Umsatzquellen zu erschließen und Mitarbeiter, Partner, Anwendungen und Geräte jederzeit und überall mit Daten zu verbinden.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Banken, Vermögensberater, Zahlungsanbieter und andere Finanzinstitutionen erleben tief greifende Veränderungen in Form von sich entwickelnden Marktanforderungen und neuen Vorschriften. Diese Unternehmen müssen ihre etablierten Prioritäten, Prozesse und Produkte überdenken, um das Fundament für den künftigen Erfolg zu legen. Software ist der Schlüssel.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 26, 2017
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so starting May 25, 2018.
Tags : 
gdpr, data protection, right to access, data breach, personal data
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : 
risk-based application security, security management, application security, software applications
    
Group M_IBM Q1'18
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
Ein Überblick über die gesamte Bandbreite der mobilen Risiken für Unternehmensdaten Es ist an der Zeit, das unternehmensweite Risikomanagement zu ändern. Mobilgeräte spielen in unserem privaten und beruflichen Leben eine zentrale Rolle. In der überwiegenden Mehrheit aller Unternehmen liegt der Schwerpunkt jedoch nach wie vor auf dem Schutz traditioneller PC-Endgeräte. Um diese Entwicklung zu fördern, hat Lookout die Matrix für mobile Risiken entwickelt. Sie dient dazu, Sicherheitsorganisationen für das Risikospektrum von Mobilgeräten zu sensibilisieren und Daten bereitzustellen, die die Häufigkeit von Sicherheitsrisiken für mobile Plattformen veranschaulichen.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
Cloudoptimierte, gerätegestützte Abwehr mobiler Bedrohungen Bei der Lookout Security Cloud handelt es sich um eine cloudbasierte Plattform, die sowohl breit angelegte als auch hochentwickelte mobile Bedrohungen erkennt und stoppt. Sie schützt mobile Endgeräte und Infrastrukturen vor Bedrohungen aus dem Spektrum mobiler Risiken, ermöglicht eine detaillierte Untersuchung der Bedrohungen und unterstützt eine große Anzahl an Lookout-Produkten:Was macht die Lookout Security Cloud so besonders? Die Lookout-Plattform unterscheidet sich in vier wesentlichen Punkten von anderen Herstellern aus dem Bereich „Abwehr mobiler Bedrohungen“ (Mobile Threat Defense): 1. Einzigartig umfangreiches globales Gerätenetzwerk 2. Branchenführender Mobildatensatz & Maschinelle Intelligenz 3. Umfangreiche Sicherheitsfunktionen 4. Cloudoptimierter, gerätegestützter Sicherheitsansatz
Tags : 
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
A report from CERT-UK and Lookout Mobile Security Mobile malware is increasingly sophisticated and as such presents a growing threat to organisations as well as consumers. The volume of malware targeting mobile devices in the UK quadrupled in 2015, with Q1 2016 already reaching 50% of 2015 numbers. Read the whitepaper to learn what factors must be accounted for to make effective mobile security policies.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.