profile

Results 276 - 285 of 285Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Apr 01, 2016
To understand your organization’s risk profile: “You should start with a simple question: What are your digital assets and the cyber threats facing them,” says HPE Security Services CTO, Andrzej Kawalec. Watch the insight Kawalec and Marshall Heilman of FireEye Inc. share in order to protect your organization from what has become daily, even hourly, attacks for many.
Tags : 
    
Hewlett Packard  Enterprise
Published By: AWS     Published Date: Oct 30, 2018
How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Abstract: Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
snapper, data, amazon, cwp, storage
    
AWS
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
This IDC Vendor Profile summarizes the state of the flash-optimized enterprise array market and then takes a closer look at Nimble Storage as one of the market leaders in this space.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
This IDC Vendor Profile summarizes the state of the flash-optimized enterprise array market and then takes a closer look at Nimble Storage as one of the market leaders in this space.
Tags : 
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
    
Veracode
Published By: Microsoft     Published Date: Apr 05, 2018
Im April kündigte Microsoft die Lösung Microsoft Relationship Sales an, die Microsoft Dynamics 365 for Sales mit LinkedIn Sales Navigator kombiniert. Vertriebsmitarbeiter haben Zugriff auf Informationen aus dem weltweit führenden professionellen Netzwerk, damit sie einfacher Interessenten finden und Beziehungen zu stärken. Die Lösung bietet: -Zugriff auf 500 Millionen LinkedIn-Profile mit Fotos sowie Informationen zu aktuellen und früheren Tätigkeiten der Mitglieder. Damit können Vertriebsmitarbeiter einen besseren Eindruck von ihren aktuellen Kunden erhalten und über das Netzwerk neue Leads finden. -Empfehlungen für die nächsten Schritte der Benutzer in Dynamics 365 auf Basis von Signalen aus E-Mail, Customer Relationship Management (CRM)-Software und LinkedIn. Diese basieren auf künstlicher Intelligenz (KI) und enthalten Vorstellungs- und Vernetzungsvorschläge sowie Vorschläge für InMail und Nachrichten.
Tags : 
crm strategy, crm-strategie, linkedin, dynamic sales
    
Microsoft
Published By: Pure Storage     Published Date: Mar 19, 2018
The content for this excerpt was taken directly from IDC MarketScape: Worldwide All-Flash Array 2017 Vendor Assessment (Doc #US43310017). All or parts of the following sections are included in this excerpt: IDC Opinion, IDC MarketScape Vendor Inclusion Criteria, Essential Guidance, Vendor Summary Profile, Appendix and Learn More.
Tags : 
    
Pure Storage
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: