seg

Results 376 - 400 of 519Sort Results By: Published Date | Title | Company Name
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Se prevé que los ciberataques tendrán un coste de 6 billones de dólares para la economía mundial en 2021, en comparación con los 3 billones de dólares de 2016. Algunos los describen como «la mayor amenaza para empresas de todo el mundo». La preocupación pública por la seguridad de los datos está aumentando, no solo por los delitos que se cometen con los datos sustraídos, sino también por cómo usan nuestros datos personales las empresas con las que interactuamos.
Tags : 
rgpd, repercusion, entorno, gestion, datos
    
AstuteIT_ABM_EMEA
Published By: Flimp Media     Published Date: Jan 21, 2010
This report, which describes the emergence of Intelligent Digital Collateral (IDC) as a valuable top-line segment of the overall rich media and video marketing category, discusses how rich media marketing isn't just for advertising anymore.
Tags : 
flimp, b2b, idc, intelligent digital collateral, digital sales, analytics, rich media, social media, online video
    
Flimp Media
Published By: Veeam '18     Published Date: May 01, 2019
Il ransomware è al primo posto nei pensieri dei leader di molte organizzazioni poiché queste ultime devono affrontare le conseguenze potenzialmente disastrose degli attacchi riusciti. ESG ha intervistato i leader e le organizzazioni IT per scoprire la reale portata del problema ransomware, quali sono le conseguenze economiche delle interruzioni causate da questi attacchi e quali sono le best practice e le capacità che le organizzazioni devono applicare per essere protette. Secondo la ricerca ESG, quasi i due terzi delle organizzazioni intervistate in tutto il Nord America e l'Europa occidentale hanno subito un attacco ransomware a un certo punto dell'anno scorso, e il 22% ha riportato attacchi settimanali. Gli attacchi hanno contribuito a rendere la sicurezza informatica un obiettivo dell'investimento IT e la spesa in questo senso sta accelerando. Ciò che è necessario per respingere questa epidemia sono le best practice e gli strumenti per: • Prevenire o almeno mitigare gli attacchi •
Tags : 
    
Veeam '18
Published By: HP VMware     Published Date: Mar 03, 2008
Blades are one of the fastest-growing segments in the IT industry. This white paper examines the requirements for servers, storage, and blade systems in the midmarket; describes the features and capabilities of the HP c3000; and outlines some of the challenges and opportunities HP will face as it seeks to extend its innovative HP BladeSystem c-Class product line to serve the needs of the midmarket.
Tags : 
blades, blade server, bladesystem, blade system, storage, virtual storage, hp vmware
    
HP VMware
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Forcepoint     Published Date: May 03, 2016
Quanto mais tempo os atacantes permanecerem em sua rede, mais movimento lateral é possível e maior o risco de furto de dados. Parar a exfiltração de dados, em vez de tentar impedir as violações de dados, é a abordagem mais realista para a segurança de dados e a redução do tempo do comprometimento à reparação de ameaças.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 03, 2016
Quanto mais tempo os atacantes permanecerem em sua rede, mais movimento lateral é possível e maior o risco de furto de dados. Parar a exfiltração de dados, em vez de tentar impedir as violações de dados, é a abordagem mais realista para a segurança de dados e a redução do tempo do comprometimento à reparação de ameaças.
Tags : 
    
Forcepoint
Published By: OneSource     Published Date: Jan 29, 2009
This benchmarking report examines how best-in-class sales organizations incorporate sales intelligence into their sales efforts to produce tangible gains in productivity and revenue generation. By offering practical tips on using sales intelligence and addressing some barriers to sales productivity, readers will gain actionable insights from this informational paper.
Tags : 
sales intelligence, crm, sfa, leads, pipeline, industry news, trigger events, segmentation, marketing, aberdeen group, sales automation, contacts
    
OneSource
Published By: McAfee     Published Date: Sep 04, 2014
SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.
Tags : 
siem, sans, endpoint, red, correlación, integración, seguridad
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
Saiba como é possível evitar ataques de rede utilizando uma plataforma de SIEM que combina dados históricos com dados em tempo real de origens de rede e políticas de segurança para oferecer contexto sobre o uso de aplicativos, comportamentos dos usuários e outras operações com o objetivo de produzir relatórios otimizados e mais precisos.
Tags : 
siem, sans, terminal, endpoint, rede, correlação, integração, segurança
    
McAfee
Published By: Business.com     Published Date: Oct 09, 2012
GPS vehicle tracking has gained popularity in many segments of the business world. Two main reasons account for this increase in popularity: a maturing technology with falling prices, and the desire for increased employee productivity.
Tags : 
gps vehicle tracking, tracking, gps, technology, mileage
    
Business.com
Published By: MobileIron     Published Date: Feb 26, 2018
El reto de la seguridad móvil en la nube
Tags : 
    
MobileIron
Published By: Conductor     Published Date: Oct 21, 2013
Conductor's research of more than 380 enterprise search marketers and interviews with numerous SEO professionals finally reveals what separates the 'best-in-class' from the 'laggards.' Best-in-class cite early SEO involvement in content, greater maturity in reporting with the use of advanced techniques such as keyword segmentations, data mash-ups and the use of advanced technology in their reporting workflow, and a stronger commitment to organizational evangelism than their laggard colleagues.
Tags : 
seo, search engine optimization, natural search, successful seo, seo initiatives, seo strategies
    
Conductor
Published By: ArborNetworks     Published Date: Feb 12, 2016
Security Analytics is one of the two fastest growing product categories in security.
Tags : 
arbor networks, insegment, security analytics, data protection, cyber defense, cyber security
    
ArborNetworks
Published By: Akamai Technologies     Published Date: Nov 13, 2018
The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is because security services and the vital tools they encompass can be empowered through the adoption of a carrier cloud model. This, in turn, better positions CSPs to meet the demands of their customers, including those in the small to medium-size business (SMB) market segment. The timing of this migration is optimal, since many SMBs now recognize the threats they face and realize that given their limited IT budgets and lack of security expertise, CSPs are well positioned to protect them from cyberattacks. While the opportunity for CSPs is significant, many are hesitant to make a move in this area because they want to ensure they can address SMBs’ needs and maintain control of the service in a car
Tags : 
    
Akamai Technologies
Published By: Webtrends     Published Date: Apr 21, 2010
Change the way you approach customer targeting forever. Segments is a new add on to Webtrends Visitor Data Mart that makes building a customer segment drag-and-drop simple. Use it to quickly explore your data and uncover new targeting opportunities. And then easily export your segment to the marketing tool of your choice.
Tags : 
webtrends, targeting, data mart, marketing tools, segmentation, segments
    
Webtrends
Published By: Webtrends     Published Date: May 05, 2010
You don't have to look far to find research that shows targeted marketing is most effective. Spray-and-pray tactics barely produce much more than annoyed customers.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics
    
Webtrends
Published By: Infinidat EMEA     Published Date: May 15, 2019
2017 no fue un año fácil para los CIO/CISO, y 2018 tampoco da muestras de serlo. Con tantas brechas en los datos acaecidas tan solo en 2017 y capaces de acabar con la carrera de cualquiera, (Equifax, Uber, Yahoo son algunos ejemplos), y los requisitos normativos reforzados a nivel mundial, los CIO/ CISO tienen la responsabilidad corporativa de replantearse su enfoque sobre la seguridad de los datos.
Tags : 
    
Infinidat EMEA
Published By: Acquia     Published Date: Feb 26, 2015
The impact of commerce on modern business is undeniable. From changing the retail experience to the introduction of pure pricing transparency, online shopping is now the primary way that brands interact with loyal and prospective customers. In this ebook, we’ll look at the trends sweeping over the commerce landscape and show you how you can take advantage of the content and commerce combination to sell your story.
Tags : 
audience segmentation, commerce-content connection, online shopping, acquia
    
Acquia
Published By: McAfee     Published Date: Aug 15, 2014
As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw, firewall de próx ger, segurança, gerenciamento de ti
    
McAfee
Published By: Cisco     Published Date: Dec 27, 2017
Flexible work arrangements (FWAs) can come in many forms, including telecommuting, compressed workweeks and flexible scheduling that allows employees to perform tasks outside of core business hours. Improvements in technology have made FWAs possible for a broader segment of the labor force, but some of these arrangements have yet to achieve widespread acceptance in many organizations’ workplace cultures. However, SHRM research shows that participation in some FWAs has risen in recent years, and these measures have yielded positive results for companies’ recruitment and retention efforts, as well as their employees’ development and productivity.
Tags : 
    
Cisco
Published By: Infinidat EMEA     Published Date: May 15, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
    
Infinidat EMEA
Published By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, next gen firewall, security, it management
    
McAfee
Published By: Anaplan     Published Date: Sep 10, 2019
A poor sales planning process can severely reduce the effectiveness of your sales team and keep high-level business goals from being implemented in the field. In this paper, SiriusDecisions describes how to take a structured approach to the yearly sales planning process and ensure that your sales goals inform your territories, quotas, account segments, and other sales planning deliverables. In this SiriusDecisions paper, you’ll learn: The three crucial stages of the annual sales planning process How to ensure that all relevant stakeholders participate in the sales planning process How sales ops can help sales leaders set realistic goals for the year
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Sep 11, 2019
A poor sales planning process can severely reduce the effectiveness of your sales team and keep high-level business goals from being implemented in the field. In this paper, SiriusDecisions describes how to take a structured approach to the yearly sales planning process and ensure that your sales goals inform your territories, quotas, account segments, and other sales planning deliverables. In this SiriusDecisions paper, you’ll learn: The three crucial stages of the annual sales planning process How to ensure that all relevant stakeholders participate in the sales planning process How sales ops can help sales leaders set realistic goals for the year
Tags : 
    
Anaplan
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.