romi

Results 176 - 200 of 835Sort Results By: Published Date | Title | Company Name
Published By: Barracuda     Published Date: May 29, 2019
Spear phishing is a threat that’s constantly evolving as cybercriminals find new ways to avoid detection. This report takes an in-depth look at the three most prevalent types of attacks: brand impersonation, business email compromise, and blackmail.
Tags : 
    
Barracuda
Published By: Barracuda     Published Date: Oct 14, 2019
In its guide for buyers considering email-security solutions—a detailed analysis of products and services—Forrester’s evaluation gave Barracuda the highest score possible in the cloud integration, deployment options and support and customer success criteria. Get full report and see all the details for yourself, including innovative solutions for email authentication and incident response and for preventing account takeover, business email compromise (BEC) and spear-phishing. Claim your complimentary copy right now!
Tags : 
    
Barracuda
Published By: Workable     Published Date: Oct 09, 2019
Do you need an ATS? Broadly speaking, we’ve found three common scenarios driving the search for a better way to hire: Growing pains - companies with growing pains are typically looking for some predictability and structure across candidate sourcing and hiring. Drowning in email and spreadsheets - companies are looking for more efficient ways to manage candidates and collaborate as a team Outdated software - companies are looking for a modern, efficient approach to deliver on the original promise of an ATS A modern ATS, chosen with the right criteria, will relieve these common pain points. Take a step back and think about how your recruiting could be improved with the right tool.
Tags : 
    
Workable
Published By: Ensign InfoSecurity     Published Date: Feb 05, 2020
"The pressure on the Banking, Financial Services & Insurance (BFSI) industry to perform has never been greater as the digital world struggles to deal with the onslaught of more prevalent and pernicious threats. To drive growth and increase customer trust, financial institutions are taking advantage of various platforms such as mobile, cloud and social, exposing them to further cybersecurity risks. The recent news has flagged flaws in mobile and web applications as the major routes of intrusions. The Equifax incident was prominently singled out with massive amounts of its customer data being compromised due to a web-application vulnerability. Third-party vendors, including FinTech partners, continue to pose great risk to the financial industry. The 2016 Bangladesh Bank breach cost some USD81 million due to a vulnerability in SWIFT, a shared banking system. As customers continue to move away from physically transacting with banks and other institutions, more enhanced investment in se
Tags : 
    
Ensign InfoSecurity
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
Accountability in marketing means one thing: Can you deliver on what you promised? The good news is that using a data management platform and data-driven marketing can help you improve accountability—especially when it comes to revenue. Because the more you know about your prospects, the more precisely you can market to them at the moment they’re ready to buy. Get this guide to see how revenue accountability can help you cut marketing costs by reducing waste and dramatically improving your ROI.
Tags : 
    
Oracle Marketing Cloud
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
A recent Argyle survey found that nearly 60% of marketing organizations currently use some form of Account-Based Marketing (ABM), while 28% plan to use it in the near future. This shows the rising importance of ABM in the marketing mix. However, ABM does have its challenges. Almost 30% of the same respondents claimed that maintaining personalized, but consistent interactions with prospects was the most prominent challenge in ABM. For more insight on how marketing executives are optimizing ABM, download this survey.
Tags : 
    
Oracle Marketing Cloud
Published By: VMWare EMEA     Published Date: Oct 23, 2017
Digitalization has spurred new opportunities for how business gets done. With the emergence of big data and mobility, enterprises see the promise of making employees more productive and keeping customers more engaged. And they recognize that efficient, prompt application development and delivery are instrumental for taking advantage of these new opportunities. In this unforgiving era of digitalization, you need to be first to market if you want to flourish.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
    
Cisco
Published By: Kaspersky     Published Date: Apr 06, 2020
Public cloud usage is growing because it provides so many benefits, including instant scalability, automation, configurability and flexibility.All those engaged in managing public cloud deployment, both Information Security teams and those outside this discipline (such as Dev Ops or Web Dev) need to ensure that the security of corporate assets is seen as a planning cornerstone. This White Paper is designed to arm InfoSec Specialists with the information and evidence needed to ensure that Cloud Workload Security, i.e. the security of the Operating System that the workload is running, is treated as a fundamental consideration in cloud deployment scenarios. It is, after all, your problem – if your security is breached in the cloud, whoever is technically to blame, you’re always going to have to handle the consequences. We aim to counteract the erroneous view that things like software vulnerability exploitation (login bypass, remote code execution, etc), update repo poisoning, network conn
Tags : 
    
Kaspersky
Published By: Pure Storage     Published Date: Apr 18, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits. For those able to put data to good use, there’s much to be excited about. Data is transforming not only businesses, but entire industries, and the world as we know it. Today organizations are harnessing big data to do things like transform healthcare, provide eyesight for the visually impaired, and bringing us closer to autonomous cars
Tags : 
    
Pure Storage
Published By: Zscaler     Published Date: Oct 30, 2018
A Microsoft Office 365 deployment can be daunting. From a fast user experience, to a cost-cutting productivity platform, your users and CIO are expecting amazing things from Office 365. While it’s your job to deliver on the promise, you’re not going to get very far unless your network has been properly set up for the experience. To learn more about how Zscaler can enable your Office 365 deployment with a fast user experience, download this whitepaper today!
Tags : 
    
Zscaler
Published By: Mimecast     Published Date: Nov 28, 2017
Does your organization have a plan for complying with the European Union’s General Data Protection Regulation (GDPR)? If email isn’t a part of that plan, you could face significant challenges, including severe financial penalties. Download now to get the facts about: • Why you can’t compromise when it comes to protection of email data • The challenges presented by Subject Area Requests • How noncompliance could cost your organization more than just money
Tags : 
gdpr, email compliance, data protection, compliance
    
Mimecast
Published By: Mimecast     Published Date: Aug 16, 2018
Email. You use it constantly. And it’s the number-one application to keep your organization functioning, lines of communication flowing, and productivity seamless. Organizations need email to stay up-and running all the time. After all, it’s supposed to just work, right? This is where trouble often sets in. Cybercriminals use email constantly, too. It’s the number-one vector used to initiate attacks like malware delivery (think ransomware), impersonations and phishing attacks. In fact, almost 90% of organizations* have seen the volume of phishing attacks either rise or stay the same over the past 12 months. Internal threats have also been on the rise: Most organizations have encountered internal threats driven by careless employees (88%), compromised accounts (80%) or malicious insiders (70%) over the last year.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: IBM     Published Date: Jul 05, 2016
This white paper is written for SAP customers evaluating their infrastructure choices, discussing database technology evolution and options available.
Tags : 
ibm, always on business, analytics, database, database platform, sap, blu, db2, networking, knowledge management, enterprise applications, storage, data management, business technology
    
IBM
Published By: SAP     Published Date: Nov 22, 2017
The digital transformation (DX) of industries is well under way — a transformation that is enabled by the Internet of Things (IoT). The IoT allows organizations to reinvent existing industry processes, augment how they engage with their customers, and accelerate the speed at which they deliver their products and services. This white paper looks at how these digital strategies facilitated by the IoT are reshaping those industry segments that are both asset rich and focused on services rather than products. The paper then explores IoT scenarios that hold great promise and how companies are approaching investment to optimize business outcomes.
Tags : 
digital transformation, industries, iot, internet of things, customers, products, services, companies, investment
    
SAP
Published By: IBM     Published Date: Apr 24, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM
Published By: Lenovo - APAC     Published Date: Oct 11, 2018
Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. Download this premium guide to understand how HCI can • Provide the resilience, scalability and performance to run all your applications without compromise. • Design the data center as a fluid resource that can immediately adapt to the evolving needs of the business. • Enable agility with scale-out architecture that eliminates the need to rip and replace for seamless growth and scale.
Tags : 
    
Lenovo - APAC
Published By: Schneider Electric     Published Date: Feb 13, 2020
Digital remote monitoring services provide real-time monitoring and data analytics for data center physical infrastructure systems. These modern cloud-based platforms offer the promise of reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved energy efficiency for power and cooling systems. However, with the cost of cyber security crime projected to quadruple over the next few years reaching $2 trillion by 20191, there is concern these systems could be a successful avenue of attack for cyber criminals. This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : 
    
Schneider Electric
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Virtualization promises to boost efficiency and cut costs, making it an important element in your IT department’s efforts to do more with less. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk.
Tags : 
virtualization, cyberthreats, security software, security solutions, security, it management, knowledge management
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security. In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.
Tags : 
it security, it security investments, cyber threats, malware detection, security, it management, knowledge management
    
Kaspersky Lab
Published By: NetApp     Published Date: Sep 24, 2013
"Flash technology is becoming more prominent in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives – flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments. This ebook explores the many uses and benefits of flash storage technology in the enterprise. Check it out to discover and learn all you need to: * Optimize storage performance * Leverage server flash as storage cache * Reduce the footprint of your storage infrastructure in the data center "
Tags : 
flash technology, storage industry, superior speed, cost effective, cloud, optimization, storage cache, data center, enterprise applications, storage
    
NetApp
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.