overview

Results 151 - 175 of 669Sort Results By: Published Date | Title | Company Name
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Zscaler     Published Date: May 15, 2019
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them.
Tags : 
    
Zscaler
Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: NetApp     Published Date: Feb 19, 2015
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications. This technical report provides an overview of workload characterizations performed on NetApp EF-series all-flash arrays across a wide variety of I/O types - with best practices and observations based on extensive test data. Characterizations include IOPS, throughput, and latency under varying block loads and RAID levels, SSD rebuild times, EF540 and EF550 performance comparison, and usable capacity sizing guidelines for various protection levels. If you are considering deploying an EF-series flash storage array in your environment, this is an essential technical resource to insure proper configuration and maxim
Tags : 
    
NetApp
Published By: IBM     Published Date: Jul 12, 2016
This video provides an overview as to how governments can provide better services to citizens with IBM Case & Capture. Watch to learn more.
Tags : 
ibm, ecm, analytics, government, big data, ibm case and capture
    
IBM
Published By: IBM     Published Date: Nov 17, 2016
This webcast will help you understand how your business can benefit from the IBM MQ Appliance, and where it can fit into your business today.
Tags : 
ibm, middleware, mq appliance, ibm mq appliance, hardware
    
IBM
Published By: Oracle     Published Date: Jan 28, 2019
This report provides an overview of the Oracle Cloud at Customer portfolio (this includes Oracle Exadata Cloud at Customer, Oracle Big Data Cloud at Customer, Oracle SaaS at Customer and Oracle Cloud at Customer) and analyzes its capabilities to satisfy the need of enterprises for a next-generation computing platform. A next-generation computing platform allows enterprises to deploy workloads across the premises and the public cloud. For enterprises running their next-generation applications on a next-generation computing platform, Oracle Cloud at Customer does very well because of Oracle’s vision of the “chip-to-click” integrated technology stack (i.e., from the CPU silicon, across all OSI layers and all the way to the end-user mouse click). With Oracle using the same technology stack and machines both in its cloud and on premises, it has the highest degree of identicality across these offerings from all vendors that are part of Constellation Research’s Market Overview on next-genera
Tags : 
    
Oracle
Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro
Published By: CA WA     Published Date: May 12, 2008
This IDC White Paper presents an overview of key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. The paper traces evolutionary trends in job scheduling software, which is growing from traditional batch job schedulers to cross-platform and event-driven capabilities. It also explores the role of job schedulers in providing automation capabilities.
Tags : 
roi, soa, job scheduling, ca wa, workload automation
    
CA WA
Published By: Pentaho     Published Date: Aug 22, 2016
This white paper provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals.
Tags : 
big data, data integration, bi systems, hadoop
    
Pentaho
Published By: Brightcove     Published Date: Sep 17, 2014
OVERVIEW: THE STATE OF B2B CONTENT MARKETING IN NORTH AMERICA
Tags : 
content marketing, content marketing tactics, documented content strategy, b2b trends
    
Brightcove
Published By: Citrix Systems     Published Date: Jul 25, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2016 Cyberthreat Defense Report.”
Tags : 
    
Citrix Systems
Published By: IBM     Published Date: Jul 13, 2012
This white paper provides an overview of how IT organizations can optimize across the entire life cycle of their data centers and build a strong foundation for future IT operations.
Tags : 
ibm, technology, datacenter, organization, white paper, optimization, cio
    
IBM
Published By: SunGard     Published Date: Oct 18, 2012
This whitepaper provides an overview of various ways you can improve effectiveness and costs with a Managed Recovery Program.
Tags : 
managed recovery program, resiliency, cloud provider, application recovery
    
SunGard
Published By: Scalebase     Published Date: Mar 08, 2013
Technology analyst firm 451 Research offers a brief overview of ScaleBase’s Data Traffic Manager software for dramatic scaling of MySQL databases beyond the capabilities of MySQL 5.6.
Tags : 
shard, cluster, high availability, failover, mariadb, mysql, read/write, scalability, capacity planning, scalebase, 451 group overview, research
    
Scalebase
Published By: MarkLogic     Published Date: Mar 17, 2015
You’ve probably heard about NoSQL, and you may wonder what it is. NoSQL represents a fundamental change in the way people think about storing and accessing data, especially now that most of the information generated is unstructured or semi-structured data — something for which existing database systems such as Oracle, MySQL, SQLServer, and Postgres aren’t well suited. NoSQL means a release from the constraints imposed on database management systems by the relational database model. This free eBook, Enterprise NoSQL for Dummies, MarkLogic Special Edition, provides an overview of NoSQL. You’ll start to understand what it is, what it isn’t, when you should consider using a NoSQL database instead of a relational database management system and when you may want to use both. In addition, this book introduces enterprise NoSQL and shows how it differs from other NoSQL systems, as well as explains when NoSQL may not be the right solution for your data storage problem. You’ll also learn the NoSQ
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable
    
MarkLogic
Published By: MarkLogic     Published Date: Jun 19, 2017
Integrate your data silos to finally navigate the data maze. This comprehensive white paper addresses a key element in any GRC program: regulatory compliance. Download this paper to learn about the costs, current practices, and associated risks. We’ll also recommend a technologically-enabled approach and highlight its main business benefits for financial services, insurance, and energy companies. Overview Executive Summary Compliance Requirements A Recommended Approach Business Benefits Regulatory Compliance Solution Architecture Related Materials
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting, energy, insurance
    
MarkLogic
Published By: MarkLogic     Published Date: Jun 19, 2017
There is opportunity in the ongoing turbulence throughout the financial industry; however, regulatory and compliance challenges absorb resources and distract focus away from growth. Download white paper to learn about a smart approach to data and innovative tools that build resilience into a business looking to not just weather the storm, but seize the advantage. Overview: - Executive Summary - Challenges of Financial Markets Today - The Need for a 360-View of Data - How to Deliver: Increased Transparency Adapt to Evolving Regulations Improve Compliance and Lower Cost - Solution Architecture for Regulatory Reporting - Case Study: Adapting to Regulatory Complexity "Disparate systems led to frequent cycles spent correcting errors within the data”.
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: NetApp     Published Date: Jun 01, 2017
This SolidFire Definitive Guide provides an overview on storage Quality of Service and its importance in the Next Generation Data Center.
Tags : 
netapp, solidfire, next generation data center
    
NetApp
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
Today, businesses pour Big Data into data lakes to help them answer the big questions: Which product to take to market? How to reduce fraud? How to retain more customers? People need to get these answers faster than ever before to reduce “time to answer” from months to minutes. The data is coming in fast and the answers must come just as fast. The answer is self-service data preparation and analytics tools, but with that comes an expectation that the right data is going to be there. Only by using a data catalog can you find the right data quickly to get the expected insight and business value. Download this white paper to learn more!
Tags : 
    
Waterline Data & Research Partners
Published By: ServiceNow     Published Date: Jan 17, 2017
Learn how automation is the key to saving time and boosting satisfaction This eBook, “Accelerate Service Delivery with Automation,” will help you reclaim lost productivity with: An overview of the objectives and benefits of automation Best practices for transforming your ITSM into a modern, reliable experience Useful measurements for gauging progress and demonstrating the success of your automation efforts
Tags : 
it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management, service, automation, productivity
    
ServiceNow
Published By: ServiceNow     Published Date: Jan 17, 2017
Learning ITIL is not easy. If memorizing ITIL terminology has made you either: 1. Comatose 2. Caffeine addicted 3. Repeatedly Google the term “coping strategies” … Then clearly, you have not read our ITIL eBook series. This series will help you learn ITIL in a way that is actually (gasp!) fun. You’ll learn all about the five stages of ITIL and get: • A deeper understanding of what ITIL is and why it’s so important to keep everything running at work • Translations of ITIL terms (the digestible kind) to put you on the path to get ITIL certified • Useful diagrams and processes to facilitate the smooth and efficient delivery of IT services What are you waiting for? Dive in!
Tags : 
it management, it automation, it ticketing, help desk, service desk, itil, itsm, it service management, management, service, infrastructure, itil, ebook
    
ServiceNow
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management
    
Okta
Published By: Okta     Published Date: Jul 25, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable.
Tags : 
okta, best practices, technology, optimization, identity governance, cloud computing
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.