seg

Results 1 - 25 of 581Sort Results By: Published Date | Title | Company Name
Published By: Zscaler     Published Date: Mar 24, 2020
Nel dicembre 2013, Target diventò l'emblema del rischio correlato a terze parti. La violazione della sicurezza di Target comportò la compromissione di 40 milioni di informazioni sulle carte di credito e debito dei clienti, con conseguenti costi di recupero, derivanti dalla violazione, pari a quasi 252 milioni di dollari, insieme al crollo della sua buona reputazione. Questa violazione, sebbene sfortunata, non fu causata da un attacco diretto alla rete di Target. Fu il risultato di un fornitore terzo compromesso, che aveva accesso ai sistemi di Target. Una delle macchine del venditore fu colpita da un attacco di phishing e infettata da malware, che fu utilizzato per rubare le credenziali al portale dei fornitori online di Target. Con le credenziali dei partner in mano, gli hacker furono in grado di accedere facilmente alla rete di Target senza essere rilevati. Target non è l'unica società che è stata vittima di una violazione dannosa correlata a terze parti. Poiché la necessità di par
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Mar 24, 2020
El cifrado de clave pública SSL/TLS es el estándar de la industria para la protección de datos y se utiliza para proteger las transacciones web de gran parte de Internet. Su cifrado seguro protege los datos privilegiados en tránsito y brinda confianza y anonimato a los usuarios. Pero también ofrece cobertura para los malhechores que utilizan SSL/TLS para explotar esa confianza y el anonimato para encubrir sus actividades. Los líderes de TI empresariales deben emplear metodologías completas de inspección SSL/TLS para mitigar los riesgos ocultos en el tráfico cifrado. Este documento técnico examina el riesgo que representan las amenazas cifradas; considera las implicaciones comerciales, de privacidad y de seguridad de administrar ese riesgo; y presenta medidas constructivas para equilibrar las necesidades de seguridad con los derechos de privacidad de los empleados. Al final, la mejor manera para que el liderazgo de TI garantice los derechos de cada empleado es proteger a la organizació
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Mar 24, 2020
En diciembre de 2013, Target se convirtió en el ejemplo perfecto del riesgo procedente de terceros. La violación de seguridad de Target hizo que se viera comprometida información de tarjetas de crédito y débito de 40 millones de clientes, lo que resultó en casi 252 millones de dólares en costos de recuperación por incumplimiento, junto con la caída de su buena reputación.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Mar 24, 2020
El propósito de este documento es proporcionar una guía de seguridad para enrutar el tráfico localmente desde las ubicaciones de su sucursal y permitir así el acceso directo a Internet y a las aplicaciones en la nube. Esbozaremos los cinco requisitos para diseñar la solución ideal. Pero primero, analicemos por qué se han vuelto necesarios los local Internet breakouts seguros.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Mar 24, 2020
Aunque hace mucho que se considera que la tecnología es un motor necesario para que siga evolucionando la empresa, ahora es reconocida como verdadero impulsor de negocio, capaz de crear nuevas eficiencias, capacidades y oportunidades que antes no estaban al alcance de la mayoría de las empresas. El papel del director de TI ha evolucionado de una manera similar. Así, los CISOs, CIOs y CTOs ya forman parte de la cúpula directiva gracias al nuevo enfoque estratégico de la tecnología. Los principales factores de este cambio han sido la explosión de la adopción de la nube pública empresarial, incluyendo Azure y AWS, y el amplio uso de dispositivos móviles pertenecientes a empleados para trabajar (BYOD). Las empresas están aprovechando dichas tecnologías para optimizar los procesos empresariales y ofrecer productos y servicios más rápidamente y a menor coste global. ¿Pero, qué riesgo entrañan? Debido al auge de la nube y de la movilidad, el perímetro de seguridad tradicional que antes proteg
Tags : 
    
Zscaler
Published By: HP Inc.     Published Date: Mar 06, 2020
On behalf of HP Inc., IDC surveyed 500 security decision makers and influencers at organizations in keyNorth American (200 respondents from the U.S. and Canada) and European (300 respondents from the U.K., France, and Germany) markets, across vertical sectors from across the spectrum including banking and finance, telco, and energy. Respondents were questioned on a wide range of key factors related to their organizations’ approach to endpoint security. The results, as described in this IDC InfoBrief, indicate considerable scope for critical improvements in business cybersecurity awareness. Based on responses to key questions, IDC also segmented the respondents into two groups: “Leaders” (defined by a proactive, best practice approach to endpoint security throughout) and “Followers” (often unaware of the risks associated with their endpoint devices and still with a way to go in terms of adopting a safe approach to managing their endpoint estate).
Tags : 
    
HP Inc.
Published By: Anaplan     Published Date: Mar 05, 2020
A poor sales planning process can severely reduce the effectiveness of your sales team and keep high-level business goals from being implemented in the field. In this paper, SiriusDecisions describes how to take a structured approach to the yearly sales planning process and ensure that your sales goals inform your territories, quotas, account segments, and other sales planning deliverables. In this SiriusDecisions paper, you’ll learn: The three crucial stages of the annual sales planning process How to ensure that all relevant stakeholders participate in the sales planning process How sales ops can help sales leaders set realistic goals for the year
Tags : 
    
Anaplan
Published By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : 
zoominfo, sales, marketing, pipeline, conversion rates
    
ZoomInfo
Published By: Neolane, Inc.     Published Date: Sep 17, 2010
With more than three decades in the hotel marketplace, Grupo Posadas operates more than 104 hotels and 19,042 rooms in 50 beach and city destinations in Mexico, Brazil, Argentina and Chile. It's brands include AQUA, Fiesta Americana Grand, Fiesta Americana, Lat 19°, Caesar Park and Caesar Business, making Posadas the leading Mexican hotel operator in Latin America. Posadas selected Neolane's enterprise marketing software to improve segmentation and deliver consistent, personalized customer communications across e-mail and direct mail channels, while streamlining campaign management within its loyalty programs.
Tags : 
neolane, grupo posadas, segmentation, loyalty, email, direct marketing, customer communications, loyalty
    
Neolane, Inc.
Published By: WhatCounts     Published Date: May 05, 2010
Lifecycle marketing is changing the way companies interact with prospects and customers through the email channel. This white paper explores five common questions and some ideas on how to jumpstart your lifecycle marketing efforts.
Tags : 
lifecycle, email marketing, whatcounts, emarketing, roi, segmentation, nurturing, lead generation, compliance
    
WhatCounts
Published By: TargetMarketing     Published Date: Jun 04, 2010
You'll find in this complimentary report from Target Marketing, a breakdown of key segmentation areas, fundamental questions to ask to formulate effective segmentation plans, a six-step road map to a comprehensive segmentation process, three segmentation pitfalls to avoid, and more.
Tags : 
napco, target marketing, customer segmentation
    
TargetMarketing
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
Be proactive in protecting your data center with complete visibility, multilayered segmentation, and threat protection that follow the workload everywhere.
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Jan 15, 2020
"Flash has permeated enterprise storage in small, medium-sized, and large enterprises as well as among webscale customers like cloud and service providers. It is available in a variety of different system architectures, including internal storage, hyperconverged and converged platforms, and shared storage arrays. Revenue driven by shared storage arrays, of both the hybrid flash array (HFA) and the all-flash array (AFA) type, is much larger than from other segments today and will continue to dominate enterprise storage spend through at least 2020."
Tags : 
    
Hewlett Packard Enterprise
Published By: HERE Technologies     Published Date: Jan 16, 2019
Audience segmentation is key for successful ad campaigns. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE Technologies shares insights and solutions to buying location data for better audience segmentation. Find out about the challenges and questions to ask when buying location data and download the Buyers Guide for Marketers.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Lenovo     Published Date: Nov 09, 2018
El aumento de la movilidad está causando un dolor de cabeza a los equipos de TI en todas partes, con el potencial de mayores costos y riesgos. Pero con ThinkPad impulsado por los procesadores Intel® Core™ i7 vPro™, obtiene seguridad 360, durabilidad confiable y productividad sin compromisos en todos y cada uno de los dispositivos. Obtenga más información en nuestro documento técnico. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Nov 09, 2018
Con una computadora portátil robada a cada minuto, ¿cómo se equilibra la amenaza de seguridad con la creciente necesidad de movilidad de la fuerza laboral y una mayor productividad? Con la ThinkPad impulsada por los procesadores Intel® Core™ i7 vPro™, se beneficia del enfoque de seguridad 360 de Lenovo. Además de la durabilidad para mantener a sus usuarios en movimiento y productivos en cada etapa de su jornada laboral. Aprende más en nuestra infografía. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Sep 10, 2019
¿Sabes por dónde corres más peligro? En la carrera por adelantarte a la competencia y transformar digitalmente tu empresa, surgen nuevas amenazas. Con ThinkShield de Lenovo tienes una solución completa y totalmente personalizable que protege tu negocio de forma integral. ¿Sabías que se necesitan 23 días de media para recuperarse de un ataque de ransomware1? Averigua por qué la seguridad informática es lo más importante, y punto. Descarga nuestra guía de soluciones > 1 IBM: 2017 Global CODB Report Final (en inglés) v
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Sep 10, 2019
¿Sabes por dónde corres más peligro? En la carrera por adelantarte a la competencia y transformar digitalmente tu empresa, surgen nuevas amenazas. Con ThinkShield de Lenovo tienes una solución completa y totalmente personalizable que protege tu negocio de forma integral. El coste medio de una filtración de datos es de más de 4 millones de dólares. Descubre cómo afecta a tu crecimiento invertir en seguridad. Descarga la infografía >
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Sep 10, 2019
¿Sabes por dónde corres más peligro? En la carrera por adelantarte a la competencia y transformar digitalmente tu empresa, surgen nuevas amenazas. Con ThinkShield de Lenovo tienes una solución completa y totalmente personalizable que protege tu negocio de forma integral. Un 48 % de las filtraciones se deben a errores humanos2. Averigua cómo proteger tu negocio de los despistes de tus empleados. Descarga nuestra guía informativa > 2 Kaspersky: «Guía práctica de seguridad de TI para pequeñas empresas». https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 [Nota: Falta la ese de «Kaspersky» en el texto de la guía informativa. ]
Tags : 
    
Lenovo
Published By: Hewlett Packard Enterprise     Published Date: Jul 25, 2019
"Flash has permeated enterprise storage in small, medium-sized, and large enterprises as well as among webscale customers like cloud and service providers. It is available in a variety of different system architectures, including internal storage, hyperconverged and converged platforms, and shared storage arrays. Revenue driven by shared storage arrays, of both the hybrid flash array (HFA) and the all-flash array (AFA) type, is much larger than from other segments today and will continue to dominate enterprise storage spend through at least 2020."
Tags : 
    
Hewlett Packard Enterprise
Published By: HERE Technologies     Published Date: Mar 11, 2019
Increasingly sophisticated location technology makes it possible for data scientists to gain a deeper understanding of their target audiences – and how to reach them. Accurate and precise intelligence can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 11, 2019
This is an at-a-glance guide to the key questions to ask when buying data to improve your audience segmentation from HERE, one of the world’s leading location platforms in 2018.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 11, 2019
This is an at-a-glance guide to the key questions to ask when buying data to improve your audience segmentation from HERE, one of the world’s leading location platforms in 2018.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 11, 2019
Audience segmentation is key to any marketing strategy. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.