cio

Results 126 - 150 of 1236Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
gateway, web, security
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view himself or herself as a business enabler. He or she must focus on continuously aligning with business objectives, improving delivery capability to support business processes that bring new products and services to market more quickly, fostering innovation, and reducing costs through improved performance. In this custom Technology Adoption Profile (TAP), the data confirms this trend.
Tags : 
security, technology, business technology, cio
    
Blue Coat Systems
Published By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : 
fireeye, spear phishing attacks, cybercriminals, malware, malicious activities
    
FireEye
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: SAP     Published Date: Nov 06, 2015
Este relatório sobre a pesquisa global com executivos financeiros examina como as finanças devem transformar processos e sistemas discretos em cadeias de valor em rede e plataforma de tecnologia comum e ainda automatizar intervenções manuais. Com o Ariba Network, a SAP proporciona visibilidade completa e em tempo real dos dados-chave e conecta finanças a suprimento, tesouraria e muito mais.
Tags : 
    
SAP
Published By: SAP     Published Date: Nov 06, 2015
Leia a pesquisa da CFO Research com executivos financeiros de grandes companhias e saiba como eles estão se adaptando ao ritmo acelerado das empresas, dos mercados e da tecnologia.
Tags : 
    
SAP
Published By: SAP     Published Date: Nov 16, 2015
Lea el plan de cinco puntos para darle a su negocio una ventaja competitiva con una eficacia y efectividad aumentadas dentro de GRC. Descargue el informe de investigación para saber más sobre el futuro de la estrategia de manejo de riesgo.
Tags : 
    
SAP
Published By: Oracle     Published Date: Dec 17, 2015
View this on demand webcast to learn how the head of eCommerce and CIO of Carolina Biological partnered together to successfully make the switch to digital eBusiness, increase customer loyalty, and reduce costs and time to market.
Tags : 
oracle, webinar, digital ebusiness, customer loyalty, b2b ecommerce, internet retailer
    
Oracle
Published By: HP Inc.     Published Date: Feb 03, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Feb 03, 2016
IT decision-makers weigh in Securing computers and their data against cyber-attacks and malicious applications is imperative in today’s business environments. IT professionals know this. But which methods are they using to secure laptops and desktops, and just how effective are these methods? See what 650 IT decision-makers had to say.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
    
HP Inc.
Published By: FusionOps     Published Date: Jun 15, 2016
Download this white paper to learn why Merck Animal Health's Dave Williams is striving for self service supply chain analytics with the help of cloud software.
Tags : 
    
FusionOps
Published By: FusionOps     Published Date: Jul 25, 2016
Life science companies are adopting innovative cloud technology to provide a single source of truth for end-to-end supply chain decision-making. Read this CIO interview to learn how H.D. Smith is using FusionOps supply chain intelligence software to improve efficiency, cost, and quality. Interview Highlights: • How to improve time to actionable insights using a cloud platform • How to improve service levels and forecast accuracy through deeper intelligence into the supply chain • How to enable cross-functional collaboration to make better business decisions and drive performance improvement
Tags : 
    
FusionOps
Published By: IBM APAC     Published Date: May 18, 2017
Technological advances are transforming the way we connect, disrupting the status quo and creating huge turbulence. Industries are converging, and new opportunities and threats are emerging, as never before. So how are CIOs managing their way through the mayhem? In the first installment of our latest C-suite Study, we interviewed 5,247 top executives to find out what they think the future holds and how they’re positioning their organizations to prosper in the “age of disruption.” This report delves more deeply into the views of the 1,805 CIOs who contributed to our research – and what the IT gurus of the most successful enterprises do differently.
Tags : 
insights, technology, cios
    
IBM APAC
Published By: QAD     Published Date: Jan 19, 2018
A solução de gestão empresarial - ERP- ajuda a indústria a operar mais eficientemente, gerenciar redes de fornecimento mais efetivamente, melhor atraindo e retendo clientes. A maioria na indústria também acha que a empresa com a solução de gestão empresarial na nuvem (cloud ERP) resulta em melhores êxitos nos negócios por causa da facilidade de uso, em qualquer lugar a qualquer momento, facilitando negócios globais.
Tags : 
    
QAD
Published By: QAD     Published Date: Jan 19, 2018
Desde ferramentas de automatização para oficinas até soluções empresariais globais, a QAD se converteu num sócio tecnológico de confiança, ajudando a reduzir as ineficiências e a incrementar a produtividade das empresas de manufatura em todo o mundo. Isto se deve às aplicações empresariais QAD estarem focadas e otimizadas especificamente para as seis indústrias altamente competitivas onde temos: automotivo, produtos de consumo, alimentos e bebidas, produtos industriais, eletrônica e farmaceutico.
Tags : 
    
QAD
Published By: QAD     Published Date: Jan 19, 2018
QAD anticipa los problemas que pueden afectar a sus clientes y provee soluciones antes de que se den cuanta de que tienen un problema. Nos aseguramos de que nuestro producto no solo se ocupe de los principales retos si no que recomendamos soluciones para sus problemas, aparte de nuestras soluciones y servicios. Nuestro objetivo es ayudar a nuestros clientes a formar la Empresa Efectiva.
Tags : 
    
QAD
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.