rsa

Results 1 - 25 of 428Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
    
Cisco
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diebstahl und Missbrauch sensibler administrativer Anmeldeinformationen verursachen Sicherheitsverletzungen und Betriebsunterbrechungen. CA Privileged Access Manager verbessert die IT-Security, Unternehmenseffizienz und Compliance durch den Schutz privilegierter Anmeldeinformationen und Ressourcen sowie durch die effiziente Überwachung, Kontrolle und Verwaltung der Aktivitäten privilegierter Anwender.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Polycom     Published Date: Dec 18, 2017
With the increase in mobility and the growth of distributed teams, it’s essential that you select audio devices that offer the best flexibility, quality and reach needed to support collaboration anywhere on any device. To meet these requirements, Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. The phones support crystal-clear conversations and seamlessly integrate with a wide range of communication environments including open-SIP and Skype for Business and Office 365. This comprehensive guide will provide you: Guidance on selecting devices for different workspaces Information on the newest collaboration features and benefits Overview and comparison of the latest Polycom desk phones and conference phones
Tags : 
voice collaboration, communication environments, polycom, microsoft office 365, skype for business
    
Polycom
Published By: LifeLock     Published Date: Jan 18, 2018
Regardless of the workforce demographic, LifeLock is a universally relevant benefit for all employees because everyone has an identity to protect.
Tags : 
    
LifeLock
Published By: StrongMail     Published Date: Sep 08, 2010
With more than 500 million active users, Facebook can be an extremely effective channel for engaging customers around your brand. However, before you rush out to build a fan page, you need to first understand the best way to interact with them based on conversations about your brand that are already happening on the social web.
Tags : 
strongmail, email, facebook, channel, social networking
    
StrongMail
Published By: Big Bang LLC     Published Date: May 31, 2012
Cost-effective and fully automated device driver management for Microsoft SCCM with the Universal Imaging Utility System Deploy Plug-in. The UIUSD completely eliminates the need for SCCM admins to manage and package drivers.
Tags : 
    
Big Bang LLC
Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
security analytics platforms, ibm security, security analytics, security and risk
    
Group M_IBM Q1'18
Published By: Freshdesk     Published Date: Aug 15, 2016
When 76% of consumers say they view customer service as the true test of how much a company values them, you have to make sure that your strategy, and tool, are top notch. Here's a collection of best practices, drawn from our conversations with customers, to help you improve your agents' productivity and win customer love. In this whitepaper, we detail how you can - Provide your agents with complete context by pulling data from your third party systems into your helpdesk - Reduce ticket volume and help customers help themselves by setting up a knowledge base - Automatically assign tickets to the right team with ease thus reducing your agent's workload and many more!
Tags : 
    
Freshdesk
Published By: Freshdesk     Published Date: Aug 15, 2016
While email is perfect for one-to-one communication, it doesn't work half as well for managing many-to-many conversations like a helpdesk would. When businesses use email to support customers, they leave room for conversations to get lost, ignored or forgotten. Not to mention, the lack of accountability and metrics to gauge the process and figure out what's working and what's not working. In this whitepaper, we discuss, for those businesses, the advantages a helpdesk has over email and lay out just how easy it can be to win customer love.
Tags : 
    
Freshdesk
Published By: Commvault     Published Date: Jul 06, 2016
Data conversations continue to change as all businesses are trying to figure out today's reality of the move to the cloud, anywhere/anytime computing, and the explosive growth of data. These trends have drastically reshaped the IT industry and data management forever. With continued market innovations in storage, cloud, and hyper-converged infrastructures, there are six key modern IT needs that are increasingly the focus of CIO and technology leaders.
Tags : 
commvault, modern data protection, data security, storage, cloud, hyper converged infrastructures, access and collaboration, new recovery mandates
    
Commvault
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: Cisco     Published Date: Jun 21, 2016
The demands on IT today are staggering. Most organizations depend on their data to drive everything from product development and sales to communications, operations, and innovation. As a result, IT departments are charged with finding a way to bring new applications online quickly, accommodate massive data growth and complex data analysis, and make data available 24 hours a day, around the world, on any device. The traditional way to deliver data services is with separate infrastructure silos for various applications, processes, and locations, resulting in continually escalating costs for infrastructure and management. These infrastructure silos make it difficult to respond quickly to business opportunities and threats, cause productivity-hindering delays when you need to scale, and drive up operational costs.
Tags : 
    
Cisco
Published By: SAP SME     Published Date: May 09, 2017
A transformação digital está diretamente relacionada à mudança em curso da economia digital, que se traduz na interconexão em tempo real de indivíduos, empresas e sociedade, com respaldo da tecnologia. Pense nos recursos avançados que estão modificando a natureza dos negócios: » Hiperconectividade –decorrente das comunicações a qualquer hora e lugar. » Poder computacional ilimitado, disponibilizado pelas diversas plataformas. » Computação em nuvem, com acesso facilitado a softwares e serviços hospedados. » Proliferação de sensores e dispositivos móveis, que oferecem novas e contínuas fontes de informação, bem como meios de acessá-las. » Avanços na segurança cibernética, que garantem acesso confiável e uso de informações essenciais, minimizando vulnerabilidades internas e externas.
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: May 09, 2017
A transformação digital está diretamente relacionada com a mudança em curso da economia digital, que se traduz na interconexão em tempo real de indivíduos, empresas e sociedade, com suporte da tecnologia. Pense nos recursos avançados que estão modificando a natureza dos negócios: » Hiperconectividade – decorrente das comunicações em qualquer tempo e lugar » Poder computacional ilimitado, disponibilizado pelas diversas plataformas » Computação em nuvem, com acesso facilitado a software e serviços hospedados » Proliferação de sensores e dispositivos móveis, que oferecem novas e contínuas fontes de informação, bem como meios de acessá-las » Avanços na segurança cibernética, que garantem acesso confiável e uso de informações essenciais, minimizando vulnerabilidades interna e externa
Tags : 
    
SAP SME
Published By: Cisco Spark     Published Date: Jun 22, 2017
The most successful businesses are greater than the sum of their parts. When individuals work together well, they fill in each other's blind spots and build on each other's great ideas. These conversations ultimately help teams be more productive, reduce time-to-market and come up with more innovative ideas. But if your teams are spread across different offices, or working from home, can you create the same collaborative magic? Web-based collaboration tools claim to break down the collaboration barriers that distance can build. Everyone agrees they can reduce the time and cost of travel. And yes, these tools can stream your colleagues' voices, facial expressions, and slide decks into your meeting room, so you can get a clearer picture of verbal and behavioral signals. But if you're researching collaboration platforms, you'll hear skepticism, too. Naysayers declare that: People won’t participate because they’re afraid of digital change. You just can’t trust the security of collaborati
Tags : 
    
Cisco Spark
Published By: Dell EMC     Published Date: Nov 02, 2015
For remote offices and branch offices (ROBOs), effective server performance is critical. This white paper introduces a server solution featuring Intel® Xeon® processors that provides simplicity, efficiency, and versatility for these office environments.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 02, 2015
To help users achieve these goals and attain greater simplicity, efficiency and versatility in ROBO sites, Dell engineered the PowerEdge VRTX shared infrastructure platform. Download this white paper to learn more about Dell PowerEdge VRTX.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 02, 2015
Enterprises with remote or branch offices and small to midsized businesses face very specific infrastructure challenges. Dell PowerEdge VRTX addresses these by providing scalable servers, storage, and networking in a compact, converged, easy-to-manage platform. Here’s how it brings simplicity, versatility and efficiency to ROBO or SMB environments.
Tags : 
    
Dell EMC
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: SAP     Published Date: May 22, 2012
Business intelligence technology must meet the demands of tomorrow's "digital natives"; integrate seamlessly with cloud data and platforms; align people, conversations, and data with business strategy; and make the most of the infrastructures we have today.
Tags : 
sap, business intelligence, business analytics, technology, business technology
    
SAP
Published By: Polycom     Published Date: Sep 04, 2012
This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Tags : 
firewall traversal, polycom, unified communications, security solutions, uc devices
    
Polycom
Published By: Polycom     Published Date: Sep 04, 2012
While different industries have their own set of optimal applications for going mobile with video, an array of benefits ring true universally and are more important today than ever.
Tags : 
mobile video, video collaboration, real-time video, mobile video deployment, video conferencing
    
Polycom
Published By: Infor     Published Date: Jan 03, 2011
Taking full advantage of each customer interaction has become a strategic imperative. And customer-oriented companies in a wide range of industries must focus on developing a contact center that drives effective, consistent customer interactions and builds long-term customer loyalty. In this white paper, learn how leading organizations empower the contact center.
Tags : 
infor, customer interaction, contact center, customer loyalty, roi
    
Infor
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.