combat

Results 1 - 25 of 147Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
We have conditioned patients not only to expect opioids for pain relief, but to utilize more and more of them, and the addiction is both psychological and physical. To remedy the situation, a lot of policies and practices and behaviors must change around how the health care system approaches pain. But we do not yet have the data and analytics we need to determine what specifically to do at the patient level or the policy level. Download this whitepaper to learn more about the resources available and how we can fix this issue.
Tags : 
    
SAS
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Combattere contro il costo e la complessità della gestione dei PC lascia al reparto IT poco tempo per l’innovazione. La rapida evoluzione delle tecnologie e delle esigenze aziendali equivale a minori opportunità per sfruttare le nuove tendenze che stanno cambiando il modo in cui la tecnologia viene erogata e consumata. Inoltre, la tecnologia hardware non dura per sempre. Ha un ciclo di vita, un periodo misurabile di inizio e di fine in termini di produttività e valore. Il reparto IT ha il compito di ottimizzare il ciclo di vita dei PC mentre promuove svolte strategiche per la propria organizzazione. Scopri di più sulle soluzioni Dell in collaborazione con Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : 
lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless, classroom, media-rich apps, school
    
Ruckus Wireless
Published By: Pega     Published Date: Aug 11, 2016
Citizens rely on government social services programs to help combat poverty, disease, disabilities, and economic and physical hardships. Governments are also tasked with providing healthcare, security, and infrastructure services.
Tags : 
    
Pega
Published By: FireEye     Published Date: Nov 27, 2012
Combating the Attack of Choice for Cybercriminals
Tags : 
cybercriminals, fireeye, phishing attacks, apt, advanced persistent threat
    
FireEye
Published By: Riverbed     Published Date: Jul 17, 2013
Your business is complex. Big data promises to manage this to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, causing delays and downtime. Forrester predicts this will worsen. To combat this onslaught, you need machines to analyze conditions to invoke automated actions. To perform adaptive automation, you need IT analytics, a disruption to your monitoring and management strategy. This report helps leaders prepare for IT analytics that turn big data efforts inward to manage the technology services that run your business. Register to get the full report.
Tags : 
analytics, big data, forrester
    
Riverbed
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Combattere contro il costo e la complessità della gestione dei PC lascia al reparto IT poco tempo per l’innovazione. La rapida evoluzione delle tecnologie e delle esigenze aziendali equivale a minori opportunità per sfruttare le nuove tendenze che stanno cambiando il modo in cui la tecnologia viene erogata e consumata. Inoltre, la tecnologia hardware non dura per sempre. Ha un ciclo di vita, un periodo misurabile di inizio e di fine in termini di produttività e valore. Il reparto IT ha il compito di ottimizzare il ciclo di vita dei PC mentre promuove svolte strategiche per la propria organizzazione. Scopri di più sulle soluzioni Dell in collaborazione con Intel®
Tags : 
ottimizzazione, ciclo, dell, intel
    
Dell PC Lifecycle
Published By: Keas     Published Date: Sep 17, 2013
The start of the Affordable Care Act has been delayed to January 2015 and now is the time to get educated on provisions for Corporate Wellness Programs which are critical to combatting rising healthcare costs.
Tags : 
aca, affordable care act, employee wellness, health and wellness programs, wellness programs
    
Keas
Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron
Published By: IBM     Published Date: Oct 26, 2016
In this paper, you’ll explore how business analytics can form the foundation for a proactive threat management strategy. - See examples of how different types of organizations are applying analytics. - Learn practical steps you can take to combat threat and fraud in your own organization.
Tags : 
ibm, analytics, predictive analytics, risk management
    
IBM
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
The number of employees still engaged after their first six months on the job is roughly 40%. As the workplace continues to evolve, it’s more important than ever to develop an engagement strategy that will combat the fatigue you’ll see among the other 60% of your employees. You can’t rely on 20th-century strategies for 21st-century challenges. Download our article to learn the top 6 workplace trends you’ll experience in 2015, as well as best practices to follow to drive engagement.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, employee programs, recognition ideas, employee motivation, recognition program ideas
    
BI WORLDWIDE
Published By: CA Technologies     Published Date: Jul 13, 2015
It’s not exactly breaking news that cardholder security is front and center of the payments ecosystem “to do” list. And, with that, the search for a solution that keeps cardholder data secure without compromising the consumer experience at checkout. Nowhere is this more important than online, where the incidences of fraud are increasing, and it becomes harder to authenticate the user.
Tags : 
3d secure, ca technologies, mobile
    
CA Technologies
Published By: LifeLock     Published Date: Mar 02, 2015
Mobile devices enable workers to take care of business from virtually anywhere, at any time. But, what’s the catch? Mobile, social media-savvy employees and customers may be more likely to become identity fraud victims.
Tags : 
    
LifeLock
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Cisco     Published Date: Apr 11, 2016
En este documento se identifican las funcionalidades esenciales necesarias en una solución de protección contra malware avanzado y las preguntas clave que debe formularle a su proveedor, y se muestra cómo Cisco combate los ataques de malware avanzado actuales mediante una combinación de cuatro técnicas
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 11, 2016
A través de los años, todos hemos escuchado hablar de soluciones simples y aparentemente mágicas que permiten resolver problemas de seguridad, incluido el uso exclusivo de la tecnología de sandboxing para combatir el malware avanzado y las amenazas dirigidas.
Tags : 
    
Cisco
Published By: illusive networks     Published Date: May 18, 2016
Today's cyber attackers are more specialized, targeted and innovative when it comes to seeking new attack vectors and circumventing perimeter defenses and old-school honeypot traps. Download this whitepaper and learn why Honeypots fail in comparison to Deceptions Everywhere™ Technology, how to mimic real-world scenarios to catch cyber attackers, and leveraging deception technology to combat modern APTs.
Tags : 
    
illusive networks
Published By: illusive networks     Published Date: May 18, 2016
This case study serves as a summary of illusive networks’ Red Team exercise with a global tech leader. The fact that a system employing illusive networks' Deceptions Everywhere® technology can stand up to a highly-trained Red Team, with the odds stacked against it, demonstrates how you can protect your systems against sophisticated attackers. Learn why a threat deception approach to cybersecurity, focused on the humans behind the attacks, is the most effective way to combat modern cyber threats.
Tags : 
    
illusive networks
Published By: Globalscape     Published Date: Nov 14, 2016
Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you’ll learn: - 3 layers most targeted: the network, data & users - Bad security practices - Why Managed File Transfer is a critical component to combat bad practices
Tags : 
globalscape, managed file tracker, data security, data breaches
    
Globalscape
Published By: ServiceNow     Published Date: Aug 20, 2018
Find out how leading healthcare providers are using a proactive approach to keep their EHR and supporting infrastructure continually running and compliant with strict regulations for health data security and privacy. Learn more about keeping critical systems operational and sensitive data secure. Download this white paper to see how eliminating outages and combatting cyberattacks can help improve patient care.
Tags : 
    
ServiceNow
Published By: Dun & Bradstreet     Published Date: Feb 02, 2016
Since when did budgeting become a process that companies dread? Just say the word “budget,” and you’ll elicit at least a few groans or eyerolls from teams outside of finance. It’s daunting: the weight of the next few years rests on a couple of forecasts, financial projections and line-item lists. As a result, cross-functional teams are under a lot of stress to ensure that their cases and arguments are heard. In some ways, the budgeting process almost feels combative.
Tags : 
hoovers, finance, budgeting, cfo, data, risk assessment
    
Dun & Bradstreet
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Start   Previous   1 2 3 4 5 6    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.