net iq

Results 26 - 50 of 215Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial Internet of Things (IIoT) technologies and concepts can transform and enhance process safety practices if appropriately applied. Download the white paper for guidance on leveraging IIoT tools and techniques to deliver industrial safety in a profitable manner.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric
Published By: NetIQ     Published Date: Jun 11, 2012
Learn about SIEM and Log Management use cases, differences, best practices and common mistakes. Receive Your Complimentary White Paper NOW!
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Published By: NetIQ     Published Date: Jun 11, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture. Receive your complimentary whitepaper NOW!
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Published By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Published By: NetIQ     Published Date: Jun 12, 2012
This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity-as-a-service, authentication, authorization, open web, iam, saml, oauth, openid, scim, spml, xacml
    
NetIQ
Published By: Clustrix     Published Date: Sep 04, 2013
Online advertising is a highly competitive and innovative market being driven to new levels by the rise of ad exchanges, real-time bidding alongside traditional ad networks. With advertisers increasingly buying one impression at a time, advertising market growth is soaring. If your database is the bottleneck limiting the growth of your advertising business, this is the white paper for you. Find out how Clustrix will give you access to functionality, such as ad segmentation and targeting based on up-to-the minute campaign performance, as well as instant access to smart data, so your clients can make the right buy decisions. This free whitepaper considers the technical challenges this rise presents for the database, and discusses the unique technology that enables Clustrix to solve these challenges and give your advertising business a competitive advantage.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics
    
Clustrix
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Small and midsize businesses (SMBs) need – and want – cybersecurity. However, with limited resources, they often have to look for outsourced solutions. ISPs are well positioned to address SMBs’ security needs with their ongoing IT relationships, established contacts, and billing connections. Security offerings can help providers improve subscriber engagement, drive incremental revenues, and increase service provider affinity. This white paper will explore the following: • SMB exposure on the internet, and unique challenges they face dealing with security threats • How ISPs can help SMBs address their security exposure • The market opportunity for SMB security, and how providers can build a business case
Tags : 
    
Akamai Technologies
Published By: Intel     Published Date: May 19, 2017
Intel is accelerating Network Functions Virtualization (NFV) with unique capabilities that enable optimal use of data center resources to deliver communications services.
Tags : 
nfv, security, virtualisation, data
    
Intel
Published By: Google     Published Date: Aug 05, 2019
Moving existing enterprise workloads to the cloud has always been challenging as companies struggle to adapt and migrate applications to run in a cloud environment. IT managers must understand application dependencies, change drivers and networking configurations, and learn new management interfaces. This white paper will provide a deeper understanding of Migrate for Compute Engine's technology for mass migrations into GCP unique technology and architecture, and will explore how these capabilities improve current mass migration practices.
Tags : 
cloud applications, cloud as a service, velostrata, migration, google cloud
    
Google
Published By: Attunity     Published Date: Feb 12, 2019
This technical whitepaper by Radiant Advisors covers key findings from their work with a network of Fortune 1000 companies and clients from various industries. It assesses the major trends and tips to gain access to and optimize data streaming for more valuable insights. Read this report to learn from real-world successes in modern data integration, and better understand how to maximize the use of streaming data. You will also learn about the value of populating a cloud data lake with streaming operational data, leveraging database replication, automation and other key modern data integration techniques. Download this whitepaper today for about the latest approaches on modern data integration and streaming data technologies.
Tags : 
streaming data, cloud data lakes, cloud data lake, data lake, cloud, data lakes, streaming data, change data capture, cloud computing, modern data integration, data integration, data analytics, cloud-based data lake, enterprise data, self-service data
    
Attunity
Published By: Cisco     Published Date: Nov 18, 2015
The Internet of Everything (IoE) is a continuous interaction among people, processes, data, and things. Sensors, networks, and smart devices are ubiquitous, providing a torrent of streaming data or big data. The Internet of Things (IoT), which is a network of physical objects accessed through the Internet that can sense and communicate, is a component of IoE. Cisco is helping customers and strategic partners leverage the full potential of IoE to achieve radical results across all sectors and industries. Indeed, IoE is capable of helping public safety and justice agencies increase cost efficiency, improve safety and security, provide better response times, and increase productivity.
Tags : 
ioe, public safety, justice, emergency response, networking
    
Cisco
Published By: SAP     Published Date: Nov 22, 2017
To keep up with sweeping global economic and societal changes, public services organizations are undergoing significant technology-driven transformation. Aging populations, rapid urbanization, political instability, concerns about sustainability and resiliency, and changing worker and resident expectations are driving public services organizations to radically improve operations and service delivery. At the core of this transformation is the ability to collect and process vast amounts of data to help to improve outcomes and services. One way to generate this data is through the Internet of Things (IoT) — which IDC defines as a network of networks of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity. The IoT is a transformational technology that can reshape the public sector, enabling improved outcomes and new services such as remote patient monitoring, advanced traffic solutions and predictive policing.
Tags : 
global, economic, societal, technology, driven, transformation, political
    
SAP
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: Box     Published Date: Nov 14, 2014
According to the American Community Survey, tele-commuting jumped 79 percent between 2005 and 2012. More than 9 million American workers did their jobs exclusively from home in 2010, according to the U.S. Census, and 30 million work from home at least once a week. And TechCast at George Washington University estimates as many as 30 percent of U.S. private sector workers could be working from home by 2019. For sales professionals, that proportion is certainly higher. The Telework Research Network found in 2011 that 70 percent of those working from home are in management, professional, sales and office jobs. If you’re in sales, you probably spend a considerable amount of time on the go. And why shouldn’t you? Smartphones offer constant, pocket-sized connectivity. Ubiquitous Wifi threatens to render the cubicle obsolete, and the right social networking strategy can sup-plant a hundred individual pitch meetings.
Tags : 
sales, connectivity, smartphones, social networking strategy
    
Box
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Every good story needs a villain — and the world of network security has plenty of them. We’ve got a fun new diversion for you for when you need a break from fighting the bad guys. Test your malware IQ (and your knowledge of fairy tales) by taking our quiz, Malware or Maleficent?
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Telecom Italia (TIM) Headquarters: Milan, Italy Users: 600,000 Objective: As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider TIM sought an innovative solution to effectively and efficiently protect the network and data of its business users. Solution: Cisco Umbrella for Service Providers (SPs) Impact: • Rolled out TIM Safe Web to more than 600,000 customers, with less than 1 in 10,000 customers opting out of the service • Provided TIM with a unique competitive differentiator • Created an incremental revenue stream for TIM
Tags : 
    
Cisco Umbrella EMEA
Published By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : 
botnet, bot, messagelabs, email security, malware, virus
    
MessageLabs
Published By: NetIQ     Published Date: Oct 25, 2012
An organization that excels at automating, standardizing and monitoring its systems and access controls can comply not only with PCI DSS, but with many other state and federal regulations that have similar mandates. Download this paper to learn more.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security
    
NetIQ
Published By: NetIQ     Published Date: Oct 25, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
security, compliance, it security, sustainable compliance, security management
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper for an in-depth look at how enterprises view compliance over
Tags : 
security compliance, user access management
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper to learn how you can meet the growing needs of both your Identity Management systems and Access Governance systems by bringing business and IT together.
Tags : 
iag, identity and access governance, identity management, compliance
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
iag, identity management, access governance, it security
    
NetIQ
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: