tools

Results 226 - 250 of 2370Sort Results By: Published Date | Title | Company Name
Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity
    
BitSight Technologies
Published By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning
    
Black Duck Software
Published By: Black Duck Software     Published Date: May 18, 2016
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, security, security testing tools, software
    
Black Duck Software
Published By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : 
black duck, open source, security, security testing tools, software
    
Black Duck Software
Published By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : 
blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
Equipping staff with the right tools can enhance productivity, motivation and staff retention. Highly secure mobile email and data applications help mobile workers stay in touch and up-to-date with a wide range of business issues. Extending that streamlined anytime, anywhere access to mobile voice applications is the next frontier in worker empowerment.
Tags : 
blackberry, fixed mobile convergence, fmc, pbxvoip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 23, 2010
Mobility is the future of business; more business is conducted in real time and between geographically dispersed situations than ever before. Also, mobility ties closely into important collaboration trends including the increasing use of social networking tools such as Facebook, LinkedIn and Twitter. The smartphone- a symbol of an increasingly mobile and interconnected population-is a familiar piece of technology for most employees.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
When it comes to the office of the future, what many people envision is not an office at all -- it's access to the tools and resources they need without going to an actual office. This white paper discusses how to deliver this level of access today.
Tags : 
mobile computing, mobile workforce, mobile office, blackberry
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Learn about tools and applications available that make the development platform BlackBerry® WebWorks SDK, the perfect fit for work, home and life.
Tags : 
tablet, tablet applications, software development, sdk, enterprise management, mobile security
    
BlackBerry
Published By: BlackBerry     Published Date: Dec 20, 2012
This webcast features key trends in enterprise mobility, innovative tools and technology to help you, and a BlackBerry Software and Services road map.
Tags : 
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 11, 2013
Find out about innovative tools for Enterprise Mobility Management (EMM) including BlackBerry® Enterprise Service 10, and get all the details on the BlackBerry® software and services roadmap.
Tags : 
blackberry 10, vision and roadmap, enterprise vision, enterprise service 10, software, services
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
Find out how to take advantage of special services, tools and offers – so your organization can make the most of BlackBerry® 10 from day one.
Tags : 
ready program, blackberry, making the transition seamless, blackberry 10, tools, offers, services, transition
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
Find out about innovative tools for Enterprise Mobility Management (EMM) including BlackBerry® Enterprise Service 10, and get all the details on the BlackBerry® software and services roadmap.
Tags : 
innovative tools, emm, blackberry 10, enterprise service 10, software and services road map
    
Blackberry
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
Learn to elevate and integrate security into your overall risk management calculations, incorporating the new generation of tools available within the context of the modern IT and business landscape.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: Blackboard     Published Date: Jan 24, 2017
This video reveals the 7 great ways universities are using learning technology and pushing themselves up the rankings.
Tags : 
learning technology, tech for education, education, mobile apps, analytics tools, digital learning
    
Blackboard
Published By: Bloomberg     Published Date: Jun 11, 2012
Bloomberg Government (BGOV) is a unique online service that helps business and government leaders understand the business impact of government actions through a combination of in-depth analysis, best-in-class data, analytical tools, and award winning journalism, enabling better decisions. bgov.com
Tags : 
bloomberg government insider, bgov, demo, free trial, policy analysis, data breakdowns, editorial expertise, news aggregator, policy research, government contract database, congressional staff database, personal finance, investing, small business, finance
    
Bloomberg
Published By: Blue Medora     Published Date: Oct 24, 2016
a recent Forrester Consulting research report shows that tools creep and lack of visibility are big problem areas for companies. Additionally, the research showed that only 24 percent of companies could provision infrastructure in a matter of hours instead of days or weeks.
Tags : 
it operations, blue medora, visibility, cloud management, open-source databases, infrastructure provisioning
    
Blue Medora
Published By: Blue Medora     Published Date: Oct 24, 2016
Download this report to learn more about Blue Medora's new SELECTStar platform which provides new levels of visibility into the data tier that multiple tools can utilize.
Tags : 
blue medora, selectstar, data tier, database virtualization, data tier management, vmware, virtual monitoring consoles, data layer platform
    
Blue Medora
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.