abs

Results 326 - 350 of 484Sort Results By: Published Date | Title | Company Name
Published By: Puppet Labs     Published Date: Apr 05, 2011
This paper explores the move away from Web Operations 1.0 - mired in legacy tools, outdated approaches, and low expectations - and into Web Operations 2.0 where tools and procedures are built from the ground up for highly efficient, reliable, and agile operations.
Tags : 
puppetlabs, puppet labs, web ops 2.0, automated provisioning, legacy tool, virtualization, cloud computing
    
Puppet Labs
Published By: Trend Micro Inc.     Published Date: Sep 21, 2011
Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.
Tags : 
trendlabs, trend micro, data storage, small business, technology, security solution
    
Trend Micro Inc.
Published By: Epicor     Published Date: Jul 01, 2014
HR professionals face an absolute requirement for change: creating a compelling business case for HRIS implementations and upgrades
Tags : 
epicor, hris, human resources, hr executives, saas, software as a service
    
Epicor
Published By: IBM     Published Date: Jan 06, 2016
Working for the government is no longer an absolute guarantee of stability and a pension.
Tags : 
workforce, government, talent, ibm, stability
    
IBM
Published By: LifeLock     Published Date: Feb 24, 2017
ID Theft impacts presenteeism, absenteeism, and productivity. Improve employee retention and engagement and help drive greater employee value through a high-touch benefit.
Tags : 
    
LifeLock
Published By: Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
Cylance
Published By: Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : 
predictive, advantage, cylance, protect, cloud, connect
    
Cylance
Published By: SAS     Published Date: Apr 04, 2018
Opioid use grabs headlines when important celebrities overdose. Prince is sadly the most recent. But the problem is persistent and pervasive. The marginally good news is that the number of opioid prescriptions written started to decline last year. Overdose deaths, however, continued to rise. Also in the news have been lawsuits against pharmaceutical companies and distributors for helping to create the astounding oversupply of opioids, but the root causes go deeper. Physicians and their patients, medical policy makers and licensing boards, pharma companies and pharmacies all have played roles. And all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths.
Tags : 
    
SAS
Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: Apple Corporation     Published Date: Jan 04, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
    
Apple Corporation
Published By: Intel Corp.     Published Date: Aug 08, 2012
Evaluator Group worked with HP to access the features, performance and enterprise capabilities of the HP StoreOnce B6200 Backup system. HP labs and equipment were utilized, with testing under the direction of on-site Evaluator Group personnel. Testing focused on validating high availability features, performance, and application integration.
Tags : 
evaluator, group, storeonce, b5200, backup, lab, validation, paper, b6200, backup, system
    
Intel Corp.
Published By: Box     Published Date: Oct 18, 2012
A modern mobile IT strategy is no longer an option, it is an absolute business necessity
Tags : 
box, mobile it strategy, bring your own device, mobile file sharing, collaboration
    
Box
Published By: Dell Software     Published Date: May 28, 2013
In rigorous testing, openBench Labs found that Dell AppAssure 5? offered significant advantages in ease-of-use, backup speed and recovery time. Read their complete findings: Unified Backup: Virtual & Physical.
Tags : 
dell quest, appassure, dell appassure 5Ô, backup solution, openbench labs, unified backup
    
Dell Software
Published By: Olapic     Published Date: Sep 09, 2014
When the numbers get this big, we tend to think of them only in the abstract: 500 million photos were shared per day in 2013 and 1.8 billion photos are being shared per day in 2014. That’s 75 million per hour, 1.25 million per minute and 20,833 per second. Olapic’s new visual commerce white paper places this content explosion in context. We filled it with data that matters, insights from our experience with over 150 brands and retailers, and strategic guidance for companies ready to plan their approach to the visual commerce opportunity. Download From Ripple to Wave: The Ascent of Authentic Visual Content now.
Tags : 
user generated content, visual commerce, visual marketing, visual content
    
Olapic
Published By: K2     Published Date: Jun 10, 2015
Business process management (BPM) needs can vary widely, from top-down business transformation initiatives to smart process applications to enterprise resource planning, marketing, social and more. With this breadth and depth of reach, BPM – and BPA, business process automation – are more than a couple of buzzwords, they are absolutely mission critical.
Tags : 
    
K2
Published By: IBM     Published Date: Apr 09, 2015
Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.
Tags : 
ibm, nss labs, product testing, network security, computer security, application security
    
IBM
Published By: InMage     Published Date: Feb 24, 2009
This paper describes a series of tests run to determine the viability of continuous data protection (CDP) using InMage DR Scout along with Agami Systems AIS 3000 series of unified storage systems.
Tags : 
inmage, dr scout, accenture, cdp, continuous data protection, agami systems ais 3000, backup, data management, disaster recovery, network file systems, nfs, common internet file systems, cifs, raid
    
InMage
Published By: Cornerstone OnDemand     Published Date: Oct 13, 2017
The majority of training and performance management processes don’t lead to more skilled and productive employees. So what’s different about the ones that do? Download our brief, The Absolute Must-Do’s to Build an Agile Organization, and learn: • How to increase employee productivity by 37% • What separates world-class learning and performance from ho-hum • Real business examples of this in action
Tags : 
    
Cornerstone OnDemand
Published By: GoToMeeting     Published Date: Jul 08, 2011
In 2.7 seconds, a prospect will decide whether to read, forward or delete your email. (How are we doing so far?) This new eBook by Jill Konrath, sales strategist and author, explores how to craft an email message that grabs the attention of prospects and compels them to continue the conversation.
Tags : 
citrix, sales, email prospecting campaign, ebook, jill konrath, value proposition, snap factors, credibility, bad email, good email, email blast, crafting effective prospecting emails
    
GoToMeeting
Published By: GoToMeeting     Published Date: Oct 06, 2011
Want to connect with today's phone-averse, time-starved prospects? Use email. Sure, most emails get deleted upon arrival, but that's because most emails aren't written right. Watch this on-demand webinar to learn from sales expert Jill Konrath as she explores how to craft an email message that grabs the attention of prospects and compels them to continue the conversation.
Tags : 
citrix, marketing, prospects, email, email marketing, webinar
    
GoToMeeting
Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network
    
Cisco
Published By: Esker     Published Date: Dec 19, 2016
In today’s highly competitive business environment, many organizations are expanding through mergers and acquisitions (M&As). Unfortunately, success comes at a cost. Growth via M&A activity often involves absorbing disparate ERP applications, which, over time, can create significant inefficiencies — particularly in the accounts payable (AP) department. The good news is, AP automation is emerging as an end-to-end solution that forward-thinking organizations can use to eliminate AP-related silos and maximize their market potential. Businesses with a complex ERP environment have several choices when it comes to AP automation solutions. This white paper is intended to assist AP and finance leaders, along with ERP system administrators, in evaluating their options, simplifying the decision-making process, and getting the absolute most out of their AP automation investment.
Tags : 
    
Esker
Published By: IBM     Published Date: Jan 09, 2014
Simply put, software defined storage is the abstraction of storage services from storage hardware. This term is more than just marketing hype, it’s the logical evolution of storage virtualization from simply being a storage aggregator to the end goal of storage as a service. To achieve this goal, software defined storage needs a platform from which to centralize.
Tags : 
ibm, storage switzerland, storage platform, sds, software defined storage, data center, storage virtualization, data protection, shared storage, storage capacity, centric systems, high performance databases, storage efficiency, range of solutions, vendor options, volume management, software selection, data service, data management, performance loss
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
NSS research indicates that NGFW devices are typically deployed to protect users rather than data center assets, and that the majority of enterprises will not tune the IPS module separately within their NGFW. Therefore, NSS evaluation of NGFW products is configured with the vendor pre-defined or recommended,“out-of-the-box” settings, in order to provide readers with relevant security effectiveness and performance dimensions based upon their expected usage.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: McAfee     Published Date: Feb 08, 2013
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
mcafee, epp, endpoint, protection, threats, malware, nss
    
McAfee
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.