addresses

Results 276 - 289 of 289Sort Results By: Published Date | Title | Company Name
Published By: HP - Intel®     Published Date: Oct 19, 2012
This paper discusses the challenges and solutions on how HP addresses the security and management of multiple Wi-Fi devices being introduced into the wireless/wired network.
Tags : 
byod, healthcare, bring your own device, mobile devices, security risk, security compliance
    
HP - Intel®
Published By: IBM     Published Date: Sep 10, 2013
This guide discusses the benefits of each capability and provides checklists to help you evaluate whether or not a particular vendor's solution addresses each of these areas effectively. You will also find a list of attributes and capabilities yous should look for in selecting a provider that can support the full breadth of your endpoint management requirements.
Tags : 
endpoint management, endpoint, security, ibm, it management, capabilities, vendor solutions, endpoint solutions
    
IBM
Published By: Riverbed     Published Date: Apr 14, 2017
"Applications are at the core of digital transformation. Intrinsically linked to the success of digital initiatives and the apps that power them are the areas of DevOps and Continuous Delivery. Underpinning all of these is the area of application performance management (APM). Read this study from Enterprise Management Associates to discover: 10 key factors impacting APM practices in the digital economy. APM requirements for DevOps and Continuous Delivery. How APM addresses other top challenges in a cloud- and digital-centric business."
Tags : 
    
Riverbed
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses
    
Mimecast
Published By: NetApp     Published Date: Mar 05, 2018
This independent report addresses some common GDPR myths. Learn the facts about the new obligations and liabilities faced by companies that manage data in the EU and how to assess your risks.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: ServiceNow     Published Date: Jan 13, 2017
The End of Now. The Beginning of Now. Your IT service desk is swamped from the moment work begins. It’s unclear how to gain control without the right tracking, prioritization and reporting. But with the right guidance, you can improve IT service delivery and demonstrate how IT is performing to support the business. This eBook, the first in a series that addresses key aspects of IT Service Management, provides best practices on how to: Accelerate incident resolution with automation and prioritization Improve change management processes with better controls and visibility Optimize reporting for setting goals, aligning priorities, demonstrating results
Tags : 
    
ServiceNow
Published By: Thomson Reuters     Published Date: Mar 08, 2018
Although AI and big data have delivered advances in technology these past years which make remediation more manageable and more efficient, it’s important ensure that the solution you select, meets your particular requirements, addresses and meets your needs. Some jurisdictions require technology dealing with certain types of data to be hosted on-site; data hosting, exchange, protection and privacy can all affect the choice of solution or vendor. It’s common for companies to call out these specifics in their RFPs. Other considerations include the level of precision and recall (e.g., the accuracy) required to meet project needs, the setup time for a system, its implementation and the ability to support globally dispersed team members.
Tags : 
technology, financial, sector, database, thomson, reuters
    
Thomson Reuters
Published By: Genesys     Published Date: Jul 13, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with MicroApps
Tags : 
    
Genesys
Published By: VMware     Published Date: Sep 13, 2017
Download this infographic to learn how VMware Workspace™ ONE™ helps more organizations compete in the mobile cloud era by providing productivity-enhancing capabilities that are simply better. Tailored to uniquely provide both end-user mobility and IT control, VMware mobile-cloud architecture addresses the needs of today’s organizations more effectively than Citrix.
Tags : 
vmware, workspace one, mobile
    
VMware
Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"Whether you call yourself a company, brand, brand manufacturer, manufacturer, wholesaler, branded manufacturer or one of the other myriad of categorizations out there, there’s never been a better time to focus on direct-to-consumer (D2C) marketplaces as part of your go-to market strategy. Some 60% of consumers are already visiting your website instead of your retailers’ sites, and more than half will opt to buy directly from brand manufacturers when given the option. After years of relying on marketplaces to handle so many mission-critical activities, it can be challenging to build a successful D2C model that thoroughly addresses them all. This process will require a new way of thinking for you, a cultural shift for your employees and a lot of logistics for everyone involved. But how can you know when it’s time to start selling on e-commerce marketplaces? While the benefits of transitioning to a D2C marketplace model are undeniable, it also requires a significant investment of time
Tags : 
    
ChannelAdvisor
Published By: Bluecore     Published Date: Dec 10, 2018
Bluecore helped evo: Move from batch and blast to 1:1 email marketing Replace one-size-fits-all promotional emails with automated emails that feature targeted content and send based on customers taking certain actions or changes to products. Scale the email program and results without scaling the team Introduce 15 high performing email campaigns and expand the email program reach to support a growing business without adding new headcount. Add new value for shoppers and the marketing team Launch a series of emails that proactively notify customers about changes to products with which they’ve engaged, including price and stock changes, while simultaneously adding a new opportunity to capture email addresses.
Tags : 
    
Bluecore
Published By: Box     Published Date: Jun 22, 2018
• As the needs of organizations grow more complex, delivering enterprise content that addresses the shift to mobility, usability and flexibility are key. Enterprise SaaS applications are creating demand for a new "inside-out" view of content management, extending capabilities to organizations and users who never had access. Until now. • Download the latest AIIM Tip Sheet, 5 Reasons Why the SaaS Revolution Needs a Unified Content Strategy to learn: o Why you should reexamine traditional ECM-defined processes o How to optimize your SaaS processes o Why SaaS should be part of your content management strategy
Tags : 
    
Box
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12     Next   End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.