cio

Results 401 - 425 of 1177Sort Results By: Published Date | Title | Company Name
Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Forrester Research     Published Date: Jun 11, 2018
There’s an alarming digital divide within many companies. Marketers are developing nimble software to give customers an engaging, personalized experience, while IT departments remain focused on the legacy infrastructure. The front and back ends aren’t working together, resulting in appealing websites and apps that don’t quite deliver. We’ve arrived at this misalignment for understandable reasons. Previously, most chief information officers (CIOs) were hired to digitize and bring order to companies’ internal systems and processes. They saw websites as marketing channels and were happy to let chief marketing officers (CMOs) oversee that province of technology. They had, and still have, plenty to do just to keep internal operations running smoothly. Marketers soon got into the habit of developing not just content, but also software programs to better reach and transact with customers. But now that websites and apps are becoming cornerstones of the business, the stakes are too high to al
Tags : 
cio, marketers, business, digital, customers
    
Forrester Research
Published By: PwC     Published Date: Jun 14, 2018
The positive impact of most cost-cutting efforts is short-lived, as individuals revert to past behaviors and spending habits. As normalcy returns, so can costs and head count. How do you keep the spirit alive? How do you make cost consciousness an organizational capability and a shared mind-set, rather than a bunch of rules that are resented and resisted? Look to the following strategic, operational, organizational, and cultural levers to help you sustain the change.
Tags : 
    
PwC
Published By: Splunk     Published Date: Dec 11, 2018
Predictive IT is a powerful new approach that uses machine learning and artificial intelligence (AI) to predict incidents before they impact customers and end users. By using AI and predictive analytics, IT organizations are able to deliver seamless customer experiences that meet changing customer behavior and business demands. Discover the critical steps required to build your IT strategy, and learn how to harness predictive analytics to reduce operational inefficiencies and improve digital experiences. Download this executive brief from CIO to learn: 5 steps to an effective predictive IT strategy Where AI can help, and where it can’t How to drive revenue and exceptional customer experiences with predictive analytics
Tags : 
predictive it, predictive it tools, predictive analytics for it, big data and predictive analytics
    
Splunk
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
Cisco Advanced Malware Protection (AMP) offers an integrated, comprehensive approach to endpoint security. Continuous analysis and telemetry features keep its finger on the pulse of network anomalies, and all suspicious activity is investigated. Contextual reporting highlights trends for administers, helping them reassess network architecture to close vulnerable points of entry. Also important is its flexible deployment, which makes it simple for any organization to tailor its endpoint security.
Tags : 
    
Cisco DWA Security
Published By: ServiceNow     Published Date: Mar 27, 2014
This paper provides CIOs and IT leaders with an insight into three IT imperatives that IT executives used to re-position IT and transform the enterprise.
Tags : 
enterprise transformation, consolidation, self service, automation, visibility, it innovation
    
ServiceNow
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: F5     Published Date: May 12, 2016
This white paper examines what CIOs have to consider when embarking on their hybrid cloud journey.
Tags : 
hybrid cloud, cloud, cloud computing, public cloud, hybrid
    
F5
Published By: Infor     Published Date: Mar 03, 2017
Analysts and industry experts agree: Digital disruption in manufacturing is on the horizon. Technologies like the Internet of Things, dynamic enterprise management, global supply chain visibility, and machine learning are already changing the way manufacturers produce goods and interact with customers. Further changes will continue to intensify issues and reveal opportunities.
Tags : 
cio, finance, digital, manufacturing, enterprise
    
Infor
Published By: Infor     Published Date: Mar 07, 2017
En 2015, la mayoría de los fabricantes obtuvieron unos modestos niveles de rentabilidad debido a los bajos precios de los productos básicos y a la inflación salarial. Este entorno dio lugar a que se empezara a considerar el rol que las nuevas tecnologías ”disruptivas” podrían tener en las empresas manufactureras y posibles estrategias de inversión.
Tags : 
software, manufacturing software
    
Infor
Published By: Infor     Published Date: Mar 07, 2017
El objetivo de las operaciones de un almacén es dar una respuesta perfecta los pedidos: entregar exactamente lo que un cliente pide, a tiempo y con una eficiencia óptima. El módulo de almacenes de una solución de planificación de recursos empresariales (ERP – Enterprise Resources Management) puede ayudar a los almacenes más pequeños. Pero los módulos de gestión de almacenes de los ERP tienen limitaciones y, en el caso de empresas con operaciones más complejas, puede ser más inteligente optar por las capacidades adicionales de un sistema de gestión de almacenes avanzado (WMS, Warehouse Management System).
Tags : 
    
Infor
Published By: Infor     Published Date: Mar 07, 2017
Como responsable de ventas y operaciones, usted tiene importantes responsabilidades, tales como establecer prioridades, planificar e implementar estrategias de la cadena de suministro, impulsar mejoras y, al mismo tiempo, adaptarse rápidamente a los requisitos cambiantes del mercado y de los clientes, y ajustar esos cambios en la demanda y en la oferta, y todo sin olvidar los resultados financieros.
Tags : 
    
Infor
Published By: Infor     Published Date: Jun 13, 2017
Las modificaciones suelen crear polémica entre muchos profesionales del sector informático de la fabricación. El término "estándar" también tiene connotaciones muy diversas, ya que se suele asociar con las antiguas soluciones genéricas para empresas que ofrecían funcionalidades rudimentarias con el pretexto de que su aplicación era muy simple.
Tags : 
    
Infor
Published By: Infor     Published Date: Jun 13, 2017
Por qué necesita un nuevo ERP: identificar los agentes impulsores de su negocio. En estos tiempos, disponer de un ERP es una necesidad, no un lujo. Usted precisa de un sistema que le ayude en las operaciones y gestión de su negocio, ¿pero qué más necesita que haga?
Tags : 
    
Infor
Published By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : 
web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
    
Sophos
Published By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Sophos
Published By: AppDynamics     Published Date: Apr 11, 2017
This white paper reveals the top 10 practices around DevOps your CIO and team need to know about to adopt the best model for success.
Tags : 
devops, infrastructure, cio
    
AppDynamics
Published By: Forcepoint     Published Date: Mar 14, 2019
Get a firsthand account of how Forcepoint’s CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application
    
Forcepoint
Published By: IBM     Published Date: Jul 14, 2016
This video describes how data scientists, analysts and business users can save precious time by using a combination of SPSS and Spark to uncover and act on insights in big data.
Tags : 
ibm, data, analytics, predictive business, ibm spss, apache spark, coding, data science
    
IBM
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.