cio

Results 76 - 100 of 1268Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: May 16, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs – one using on-premise software and one using Workday.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Cisco     Published Date: Apr 11, 2016
El panorama de amenazas actual no se parece en nada al de hace solamente 10 años. Los ataques simples que provocaban daños controlables han dado lugar a operaciones modernas de ciberdelito que son sofisticadas, están bien financiadas y son capaces de generar interrupciones importantes en las organizaciones y en la infraestructura nacional. Estos ataques avanzados son difíciles de detectar, además permanecen en las redes por mucho tiempo y acumulan recursos de red para lanzar ataques a todas partes.
Tags : 
    
Cisco
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
The data maturity curve As companies invest more and more in data access and organization, business leaders seek ways to extract more business value from their organization’s data. 92 percent of business leaders say that to compete in the future, their organization must be able to exploit information much more quickly than it can today.1 Chief Information Officers (CIO) need solutions that will allow them to evolve their organization’s approach to data and drive real value with strategic decisions. This journey can be depicted in a data maturity curve.
Tags : 
    
Group M_IBM Q2'19
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
If your business is like most, you are grappling with data storage. In an annual Frost & Sullivan survey of IT decision-makers, storage growth has been listed among top data center challenges for the past five years.2 With businesses collecting, replicating, and storing exponentially more data than ever before, simply acquiring sufficient storage capacity is a problem. Even more challenging is that businesses expect more from their stored data. Data is now recognized as a precious corporate asset and competitive differentiator: spawning new business models, new revenue streams, greater intelligence, streamlined operations, and lower costs. Booming market trends such as Internet of Things and Big Data analytics are generating new opportunities faster than IT organizations can prepare for them.
Tags : 
    
Hewlett Packard Enterprise
Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application
    
Forcepoint
Published By: SAP SME     Published Date: Apr 10, 2018
La industria de los productos de consumo está experimentando una gran transformación. Los consumidores demandan experiencias que ofrezcan confianza, alegía y protección – aunque son menos tangibles– estos son los impulsores que definirán el exito. Es por eso que las compañías de productos de consumo necesitan reimaginar todo, desde el compromiso del consumidor y las operaciones hasta la innovación de los productos. Las tecnologías emergentes como el Internet de las Cosas, Machine Learning e Inteligencia Artificial, pueden ayudar a guiar el rumbo de este cambio e impulsar el éxito del mismo.
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: Apr 10, 2018
Las empresas de servicios públicos, en respuesta a las presiones competitivas y de los clientes, se están embarcando rápidamente en el cambio hacia la digitalización. Y si bien muchas apenas están comenzando este recorrido, otras están muy avanzadas en el proceso, experimentando con diferentes tecnologías con la esperanza de impulsar las innovaciones para que sean más ágiles, competitivas y rentables dentro de la industria.
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: Apr 10, 2018
La industria de manufactura discreta es un facilitador clave de éxito en otras industrias, es por eso que necesitan reconocer y adoptar nuevas prioridades estratégicas para triunfar. Obtener una ventaja digital requiere la adopción de nuevas tecnologías, el aprovechamiento de los datos y la optimización de los procesos de negocio necesarios para impulsar la innovación y el valor central del negocio. Nuevas tecnologías como IoT e Inteligencia Artificial pueden ayudar a aprovechar la gran cantidad de datos que generan las empresas de fabricación y convertirlos en impulsores de éxito.
Tags : 
    
SAP SME
Published By: Adobe     Published Date: Jul 04, 2016
Of course customers want great content, but understanding what defines great isn’t so easy. Adobe surveyed 12,000 customers worldwide about their content cravings and learned what it takes to make content irresistible.
Tags : 
content, content management, customer experience, customer interaction
    
Adobe
Published By: HP     Published Date: Jul 22, 2010
As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks.
Tags : 
network security, dns, botnet command and control (cnc), malware; phishing, hp tippingpoint, tippingpoint digital vaccine, tippingpoint n-platform ips, tippingpoint security management, ips platform, access switches, reputation database, security management system
    
HP
Published By: Cisco     Published Date: Jun 29, 2015
Ron the CIO challenges IT operations to cut 70% off of the application deployment schedule. Are his application, security, and network teams up to the task? How can SDN in the data center provide a powerful answer?
Tags : 
cisco, cisco aci, technology, security, data center, apic, security data, cio
    
Cisco
Published By: Cisco     Published Date: Jun 29, 2015
Ron the CIO is getting complaints about slow application response time during peak ordering season. Is the problem with the application or in the SDN infrastructure?
Tags : 
cisco, cisco aci, technology, security, data center, apic, security data, cio
    
Cisco
Published By: Symantec     Published Date: Oct 25, 2012
Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention and more.
Tags : 
symantec, security, threat detection, fud, malware
    
Symantec
Published By: McAfee     Published Date: Apr 25, 2014
McAfee® Threat Intelligence Exchange and the McAfee Security Connected Platform can help integrate workflows and data to overcome siloed operations and shift the security model to agile, intelligent threat prevention. This paper describes three use cases to illustrate the benefits.
Tags : 
advanced malware, security, suspicious files, dynamic sandboxing, static analytics, threat prevention, mcafee network security, mcafee web gateway, mcafee email gateway
    
McAfee
Published By: Extreme Networks     Published Date: Feb 14, 2017
La tecnología es hoy día el mejor aliado de cualquier Administración Pública para acercarse al ciudadano. Muchos organismos públicos están desplegando tecnologías de “edificación inteligente” tanto para para ofrecer al ciudadano una amplia gama de servicios on-line en sus sedes como para gestionar de forma más eficiente sistemas y servicios dentro de los edificios públicos. En este documento se analizan los retos y estrategias más adecuadas para el despliegue de este tipo de tecnologías.
Tags : 
    
Extreme Networks
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Published By: McAfee     Published Date: Sep 04, 2014
Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.
Tags : 
arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs, siem, seguridad
    
McAfee
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Cisco     Published Date: Apr 11, 2016
En este documento se identifican las funcionalidades esenciales necesarias en una solución de protección contra malware avanzado y las preguntas clave que debe formularle a su proveedor, y se muestra cómo Cisco combate los ataques de malware avanzado actuales mediante una combinación de cuatro técnicas
Tags : 
    
Cisco
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance
Published By: HP and Intel ®     Published Date: May 06, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtual technologies, the expected and realized benefits, ensuing infrastructure decisions,future outlook of the data center, and best practices for deployment.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure, desktop virtualization
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 02, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtualization technologies, the expected and realized benefits, ensuing infrastructure decisions, future outlook of the data center, and best practices for deployment.
Tags : 
    
HP and Intel ®
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: McAfee     Published Date: Nov 07, 2014
Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).
Tags : 
siem, big security data, segurança do big data, informações de segurança, ameaças avançadas, ameaças persistentes avançadas, apt, inteligência de segurança, segurança
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.