abs

Results 226 - 250 of 484Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
    
Citrix Systems
Published By: Quorum Labs     Published Date: Nov 10, 2011
Download this paper to learn about virtual recovery solutions that SMBs need to bring an application back online in a matter of minutes.
Tags : 
backup, recovery, recover, best practices, quorum, smb, small and medium business, application, virtualization, on-site appliances, customers, online backup, disaster recovery, high availability, disaster recovery solutions, it recovery plan, online recovery solution
    
Quorum Labs
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
Answer a few questions about your database management practices, and get a better understanding of your organization's ability to ensure highly available database services.
Tags : 
database, database assesment tool, database services, customer confidence, database availability, database management, database management practices, orcale database appliance, intel xeon processors, database deployment, databse maintenance
    
Oracle Global Marketing
Published By: Joyent     Published Date: Jul 16, 2012
Does Your Cloud Support A Mobile-First Strategy? A Joyent White Paper - Abstract
Tags : 
cloud support, joyent, mobile, strategy, cloud computing
    
Joyent
Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor, mcafee risk & compliance
    
McAfee
Published By: McAfee     Published Date: Jan 24, 2013
This paper reports on the findings when testing McAfee's Risk Management solution from a holistic risk management and vulnerability life-cycle management perspective. Download this white paper to learn more.
Tags : 
miercom lab test report, mcafee risk management, vulnerability life cycle management, security and compliance, mcafee epolicy orchestrator, mcafee global threat intelligence, mcafee labs, malware, asset inventory, mcafee vulnerability manager, vulnerability detection, mcafee gti
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : 
anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark, windows 7 anti malware benchmark, anti malware protection comparison, west coast labs
    
McAfee
Published By: Cisco     Published Date: Dec 21, 2016
The Cisco 2016 Annual Security Report—which presents research, insights, and perspectives from Cisco Security Research—highlights the challenges that defenders face in detecting and blocking attackers who employ a rich and ever-changing arsenal of tools. The report also includes research from external experts, such as Level 3 Threat Research Labs, to help shed more light on current threat trends. We take a close look at data compiled by Cisco researchers to show changes over time, provide insights on what this data means, and explain how security professionals should respond to threats.
Tags : 
    
Cisco
Published By: STARLIMS     Published Date: Apr 16, 2014
Learn how Laboratory Information Systems (LIS) are becoming outdated and see how they are being replaced by Information Management Systems that can provide flexible management capabilities that provide informatics solutions.
Tags : 
starlims, lims, laboratories, lis systems
    
STARLIMS
Published By: Tharpe Robbins     Published Date: Jun 23, 2014
Looking for cost-effective benefit alternatives that increase productivity and reduce absenteeism? It’s time to look at workplace wellness programs. These programs are no longer a trend — they are here to stay. Providing employees with incentives to get healthy and stay healthy can have a positive impact on engagement and the bottom line. This white paper from TharpeRobbins shows you the advantages of an employee wellness program and how you can get started with one in your organization.
Tags : 
employee engagement, rewards, awards, recognition, performance recognition, length of service recognition, organization performance, attract talent, retention, social recognition, sales performance, career recognition, retirement recognition, employee incentives, recognition software, engagement platform, career, performance, social, service award
    
Tharpe Robbins
Published By: Workforce Software     Published Date: May 26, 2015
Inform your HR and labor practices with this list of issues to watch, compiled and analyzed by WorkForce Software’s Director of Compliance. Honing in on U.S. wage, hour, and absence regulations, this paper runs the gamut of compliance factors, including: • Legislative developments • Key court decisions • Enforcement actions • Common employer mistakes • Emerging trends
Tags : 
labor practices, hr practices, compliance, compliance update, human resources
    
Workforce Software
Published By: MuleSoft     Published Date: Jul 06, 2017
DevOps has become not only trendy, but an important rethink of the IT culture at many organizations. And with good reason the benefits to adopting DevOps are well-documented. A recent study, conducted by Utah State University and sponsored by Puppet Labs, revealed that DevOps practices can boost IT performance and ultimately improve a business’s bottom line.
Tags : 
it culture, it performance, customer, experience
    
MuleSoft
Published By: AWS     Published Date: Oct 30, 2018
Enhance the Availability & Performance of SAP HANA Apps Abstract: SAP HANA delivers powerful analytics capabilities that can help you improve business performance and drive digital transformation. You can more easily build reliable and performant SAP HANA-powered landscapes with SUSE Linux Enterprise Server for SAP Applications and Amazon Web Services (AWS). That’s because SUSE can help you achieve near zero downtime and sustain high-performance levels, while AWS delivers a broad and deep set of cloud services that are certified to fulfill the compute, memory, and storage requirements of SAP HANA.
Tags : 
availability, performance, sap, hana, apps
    
AWS
Published By: AWS     Published Date: Nov 26, 2018
How Cambridge University Press Automates SAP Workloads on AWS Abstract: In this webinar, Lemongrass will demonstrate the business opportunities presented by automating SAP workloads on AWS. They will also show you how they helped Cambridge University Press achieve the first stage of automation and the benefits that it’s delivering for them.
Tags : 
cambridge, university, press, automation, sap, workloads
    
AWS
Published By: LogRhythm     Published Date: Aug 08, 2016
It feels as if these folks have been around forever. They started life as a SIEM with a heavy emphasis on log management. Today they are all that plus a solid suite of next-generation attributes. They have many of the attributes of next-gen SIEMs: artificial intelligence, sophisticated log correlation, sophisticated pattern recognition and behavioral analysis. Their strength is, as it always has been, log management. But “log management” has taken on an entirely new dimension with this product. As is absolutely necessary today, it has the intelligence to analyze, correlate and make sense of huge amounts of data.
Tags : 
security, technology, best practices, information technology, business intelligence
    
LogRhythm
Published By: Kronos     Published Date: Jul 26, 2017
Learn about HCM strategies such as using mobile technology to optimize communication; offering flexible working hours for work-life balance; managing employee absences for stronger compliance, cost control, and employee well-being; and using analytics for workforce insights.
Tags : 
mobile technology, work life balance, cost control, employee satisfaction, workforce insights
    
Kronos
Published By: Apstra     Published Date: Feb 25, 2019
This in-depth white paper explains how service providers are capitalizing on Intent-Based Networking — a new and effective networking model that provides a way of abstracting an application, feature, network, or resource in such a way that the intent is exposed, but the implementation is hidden.
Tags : 
apstra, intetn-based networking
    
Apstra
Published By: McAfee EMEA     Published Date: Nov 15, 2017
NSS Labs performed an independent test of the McAfee Endpoint Security v10.5 product. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v1.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com.
Tags : 
mcafee, endpoint, security, product, technology
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security and risk management leaders should know that while IDPSs are being absorbed by firewall placements at the perimeter, they give the best protection. They're also responding to pressure from uptake of other threat defense solutions, and providing credible internal and cloud placement options.
Tags : 
magic quadrant, intrusion, detection, prevention, systems, cloud, internal
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The Software-Defined Data Center (SDDC) is an overarching philosophy for implementing better data centers. The most basic way to think about an SDDC is as a combination of virtualized computing resources, plus software-defined storage and networking. In addition, SDDC often includes overarching security aspects: in other words, SDDC abstracts and automates all the compute, storage and networking aspects that are traditionally physical, and it can put that automation and abstraction to use in enhancing security.
Tags : 
data center, software, defined, sddc, implementation, automation, security
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Das war ein heißer Winter für die Cyber-Sicherheit! Im vergangenen Herbst betrat Cyber-Sicherheit ernsthaft politisches Territorium. In den USA gab es Angriffe auf Gruppierungen, die mit beiden großen politischen Parteien in Verbindung stehen, was auf Beeinflussungsversuche auf die US-Präsidentschaftswahl hinweist. Das Problem wurde auch bei einer der Präsidentschaftsdebatten aufgegriffen, als einer der Moderatoren fragte: „Unsere Institutionen werden mit Cyber-Attacken angegriffen und unsere Geheimnisse gestohlen. Daher stellt sich mir die Frage: Wer steckt dahinter? Und wie können wir uns zur Wehr setzen?“
Tags : 
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Die Nutzung von Cloud Computing-Services nimmt weiterhin stark zu, da Unternehmen ihre Geschäftsanwendungen und Daten zu Cloud-basierten Software-, Plattformund Infrastrukturdiensten migrieren. Gartner geht davon aus, dass die Ausgaben für öffentliche Cloud-Dienste im Jahr 2017 um 18 % steigen und bis 2020 mehr als 50 % der IT-Ausgaben in Zusammenhang mit der Cloud-Implementierung stehen werden. Deloitte Global sagt voraus, dass bis Ende des Jahres 2022 mehr als die Hälfte aller IT-Ausgaben auf IT-as-a-Service-Anbieter entfallen werden. Bei der Frage nach den größten Herausforderungen bei der Cloud-Absicherung nannten in der 2016er Ausgabe dieser Umfrage 56 % der befragten Sicherheitsexperten den unzureichenden Zugriff auf die erforderlichen Daten für die Reaktion auf Zwischenfälle sowie für forensische Analysen. 62 % gaben an, dass sie über nicht autorisierte Zugriffe von Außenstehenden besorgt sind, und 59 % machten sich Sorgen über andere Cloud-Mandanten. Von den 10 %, die eine Ko
Tags : 
    
McAfee EMEA
Published By: Intel     Published Date: Jun 10, 2011
Join Intel IT leaders and participating companies HP, Lenovo, Absolute Software, Citrix, and Symantec for a morning packed with the latest technology, expert advice and demos.
Tags : 
business technology, intel, cloud, data, client security, desktop virtualization, kvm, encryption, it infrastructure
    
Intel
Published By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : 
messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking, hosted web security, content filtering
    
Symantec.cloud
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.