target

Results 201 - 225 of 1055Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may also be the reality. The problem is that every single business that pays to recover their files is directly funding the development of the next generation of ransomware. As a result, ransomware is evolving at an alarming rate with new and more sophisticated variants. This makes defending your organization's data against ransomware more critical than ever. But where do you start? Lots of questions come to mind. We've got the answers.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users don’t get the protection of your traditional security stack. Not only are more offices connecting directly to the internet — it’s estimated that 70% of branch offices already have some direct internet access — but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: Jul 26, 2017
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base. High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-centric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
customer analytics, data matching, big data, competitive advantage, customer loyalty
    
IBM
Published By: Juniper Networks     Published Date: Feb 01, 2016
This new report from TechTarget identifies three specific challenges to overcome: Deploying an integrated suite of security services Closing the gap between intelligence and enforcement Centralizing visibility and management
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
In this paper from TechTarget you will examine: The six key considerations for building security into your architecture The value of an integrated and automated security strategy How the Juniper Unite architecture enables it all
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
Download this TechTarget report and learn how to: Improve operational efficiency Strengthen end-to-end enterprise security Find the right automation solution Deliver bottom-line results
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
Juniper’s integrated security solutions are known for successfully protecting some of the world’s most demanding mission-critical environments, based on four core criteria from TechTarget: Breadth of capabilities in one solution Mission-critical performance and reliability Threat intelligence: open source and expertise
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
According to TechTarget, partnering with the right vendor to modernize your network can benefit business in three ways: Simplify the network to make management more efficient Secure the network for total visibility and control Adopt an open framework for agility and scalability
Tags : 
    
Juniper Networks
Published By: Oracle     Published Date: Mar 28, 2017
A loyalty program can deliver a number of important benefits to restaurants, coffee shops or other food and beverage operations. It provides restaurant operators with a way to reward customers and encourage repeat business. It is also an effective, measurable marketing tool – by gathering details about your guests, such as their e-mail address and location or date or birth, you can target them with promotions to help grow your revenue.
Tags : 
recipe, food, restaurant, engagement, loyalty program, oracle
    
Oracle
Published By: IBM     Published Date: Jul 21, 2016
This e-book explores the many uses of client insights for banking and wealth management. By using sophisticated analytics and cognitive capabilities, your organization can gain deep understanding of what matters most to your clients. Knowing them well helps to provide targeted, personalized service that they value and increases their loyalty. It’s a smart pathway for reducing churn and generating new revenue models through meaningful cross-selling opportunities in today’s customer-centric world.
Tags : 
ibm, banking, client insight, financial services, engagement, client insights
    
IBM
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
You’re aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations.
Tags : 
malware threats, cyberespionage, security technologies
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : 
financial profit, economic espionage, it security, risk mitigation
    
Kaspersky Lab
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Neustar     Published Date: Feb 27, 2013
Learn how customer segmentation helped a big brand drive primary research for actionable results and improved campaign performance.
Tags : 
marketing analytics, primary resarch, marketing initiatives, segmentation, targeted marketing campaigns, brand marketing, marketing strategy, market strategy, brc, business to consumer, business to customer, customer segmentation, consumer segmentation, e-commerce
    
Neustar
Published By: Neustar     Published Date: Feb 27, 2013
Neustar® Information Services introduces you to the buying behaviors and patterns of today’s insurance customer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : 
web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization, site customization, web messaging, landing page customization, consumer identification, consumer verification, consumer qualification, score leads, score consumers, verify leads, verify consumers, b2c, business to consumer
    
Neustar
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper, call-back, virtual analysis, zero-day threats, tdl4, stuxnet, spyeye, zeus, malware detection, cyber attacks, cybersecurity, cyber threats, cyber espionage
    
Damballa
Published By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : 
mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
    
McAfee
Published By: OpenDNS     Published Date: Mar 31, 2015
A security strategy centered on preventing identified attacks and threats no longer provides adequate protection. New malware tactics emerge at a rate impossible for security professionals to match. Learn how to become a less appealing target and reduce the potential impact of security breaches.
Tags : 
    
OpenDNS
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis regulatory exams have become increasingly demanding for governance, risk, and compliance professionals. New rules brought about by the Dodd-Frank Act will continue to shape future examinations including safety and soundness, compliance, market conduct, and risk-based targeted exams. We can expect these changes will require examiners to spend more time onsite, request more documents, and extend the scope and/or depth of their examinations. This means it is more important than ever to avoid the classic mistake of sharing examination documents through ad-hoc, manual processes and delivering highly sensitive data through unsecured channels like mail, e-mail, thumb drives, and FTP. In response to these increasing burdens financial institutions are looking to take control with a more structured, collaborative process for collecting, refining, and submitting regulatory information. Download this white paper to learn more about Intralinks VIA.
Tags : 
    
Intralinks
Published By: Waterline Data & Research Partners     Published Date: May 18, 2015
Waterline Data automates the cataloging of data assets and provides an Amazon.com-like guided shopping approach to data discovery that is intended to take the guesswork out of targeting the right data.
Tags : 
waterline, big data, automation, cataloging, processing, analysis, assets, data science, data management
    
Waterline Data & Research Partners
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: