target

Results 976 - 1000 of 1006Sort Results By: Published Date | Title | Company Name
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
As more companies compete for business, Original Equipment Manufacturers (OEMs) increasingly demand higher production rates and greater production flexibility from suppliers. If smaller-sized companies want to compete, they need the right tools and latest technology. NC Machining manufactures should ask three primary questions when considering the tools to improve competitiveness and implement Lean practices: • Do the tools provide the means for improved collaboration between engineering and manufacturing, and incorporate manufacturing best practices? • Can all data and program information reside in one database or platform that is accessible concurrently by all enterprise stakeholders—from design engineering to the shop floor? • Is it possible to perform real-time multi-disciplinary simulations to improve performance and manufacturing targets? Discover how to optimize your NC Machine Shop Production, minim
Tags : 
    
Dassault Systèmes
Published By: Google     Published Date: Dec 03, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA Project & Portfolio Management is a comprehensive solution for ensuring your business strategy is on target through planning, execution, and insights. CA PPM enables your organization to plan and prioritize investments in alignment with business strategies, track project execution, and shift funding and resources to ensure success and meet changing priorities.
Tags : 
project, portfolio, management, calculator, execution
    
CA Technologies EMEA
Published By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Published By: Vindicia     Published Date: Oct 04, 2017
The move to subscription and recurring revenue business models is sweeping both business-to-business (B2B) and business-to-consumer (B2C) sectors. There are striking similarities in why— and how—subscription models lead to success for companies targeting businesses or consumers as customers. But there are also differences, and those differences show themselves clearly the impact of billing on customer acquisition and retention success.
Tags : 
    
Vindicia
Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
Successful email marketing, demand generation, and lead management processes hinge on a modern strategy aligned to buyer needs across all phases of the buying process — marketing automation. Using a wide spectrum of digital channels, today’s buyers employ an extensive network of tools and resources to make the most informed purchase decisions. The Modern Marketing era is driven by the self-educated buyer who marketers must engage to achieve a relevant, targeted, and value-based customer experience. Find marketing automation fundamentals here.
Tags : 
    
Oracle Marketing Cloud
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: Cloudian     Published Date: Feb 15, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Cloudian     Published Date: Feb 21, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Bluecore     Published Date: Dec 10, 2018
Bluecore helped evo: Move from batch and blast to 1:1 email marketing Replace one-size-fits-all promotional emails with automated emails that feature targeted content and send based on customers taking certain actions or changes to products. Scale the email program and results without scaling the team Introduce 15 high performing email campaigns and expand the email program reach to support a growing business without adding new headcount. Add new value for shoppers and the marketing team Launch a series of emails that proactively notify customers about changes to products with which they’ve engaged, including price and stock changes, while simultaneously adding a new opportunity to capture email addresses.
Tags : 
    
Bluecore
Published By: KPMG     Published Date: Sep 17, 2018
The leadership of a new, marquee pharma manufacturer approached KPMG with a paradox: It was certainly marquee, but not new. As the highly publicized spin-off of a global health services conglomerate, the company began life with $18 billion in annual revenues, an established product pipeline and instant membership in the S&P 100. Reliant on the back-office functions of its parent, it needed to quickly acquire the back-office sinews of a truly stand-alone company: ERP systems and core processes for finance, operations and human resources. During an intensive three-year engagement, KPMG brought the vision of the company’s leaders to life, working towards a target operating model through the disciplined implementation of new systems, processes, training and staffing. The multidisciplinary approach eventually touched the lives of every one of the company’s 21,000 employees, in 170 countries. And as KPMG’s delivered tangible results, something intangible emerged – a new company culture, inde
Tags : 
    
KPMG
Published By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
    
DigiCert
Published By: KPMG     Published Date: Jun 25, 2019
Business growth. Everyone wants it, but only a few achieve it on a sustainable basis in today’s uncertain climate. This expert guide explores the key pathways that are essential junctures in any business’s growth journey, and shines light on the personal stories and key decisions from the CEOs who have been there and done it. The report offers practical guidance to private businesses from multi-generational family and Private-Equity backed businesses through to owner-managed and fast-growing scale-ups. Read this report to understand: •Going Global: how to navigate and launch an international business •Acquisition: how to identify the right target, assess its value and oversee a successful integration •Innovation and technology: how to enable innovation to flourish and how to harness the power of technology to accelerate your business •Team: how to ensure you have the right people and skills to take your business to the next stage •Investment: how to secure the right type of fundin
Tags : 
    
KPMG
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
With technology being at the center-stage of education today, educators are compelled to figure out how best to combine technology with teaching. There’s just one end-goal – student success! Ensuring that the right infrastructure is in place is an absolute priority. Without it, student learning goals and curriculum targets are at risk. Fujitsu has years of experience in education sectors around the world. We are passionate about every stage of the learning process, supporting educators in uncovering the potential that will help students move onto the next stage of education. As students, teachers and IT departments explore a new era of learning, Fujitsu is by your side – opening up a world of possibilities.
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 21, 2019
With technology being at the center-stage of education today, educators are compelled to figure out how best to combine technology with teaching. There’s just one end-goal – student success! Ensuring that the right infrastructure is in place is an absolute priority. Without it, student learning goals and curriculum targets are at risk. Fujitsu has years of experience in education sectors around the world. We are passionate about every stage of the learning process, supporting educators in uncovering the potential that will help students move onto the next stage of education. As students, teachers and IT departments explore a new era of learning, Fujitsu is by your side – opening up a world of possibilities. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: FICO EMEA     Published Date: Jan 25, 2019
As telecom markets become more saturated and competitive, your customer decisions must become more precise. As regulatory oversight expands, they must be demonstrably fair to consumers and explainable to regulators. Across the credit lifecycle, these more targeted decisions should be aligned with regulatory requirements. Download the Product Sheet and help your company drive performance improvements by making predictably, consistently better decisions across your credit lifecycle.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA
Published By: Loop Commerce     Published Date: Mar 08, 2019
Loop Commerce invented the $600B G-Commerce industry by building the first digital solution that makes it simple to shop for others and partnering with retailers like Target, Uniqlo, and Neiman Marcus along the way. After an acquisition by Synchrony, their deep consumer financial services experience and strong retail partnerships makes this the most exciting innovation in an always changing industry. See how the top retailers on the planet are embracing the huge customer segment shopping for others and seeing spikes in revenue because of it.
Tags : 
    
Loop Commerce
Published By: Loop Commerce     Published Date: Mar 11, 2019
In the battle for e-commerce domination, few can stand up against Amazon's 2-Day shipping. It has taken the country by storm since it was introduced. Retailers have been forced to get creative and innovative to stay relevant in this on-demand society. Amazon threw a jab with its 2-Day shipping, but with GiftNow, Target just landed an uppercut.
Tags : 
    
Loop Commerce
Start   Previous    27 28 29 30 31 32 33 34 35 36 37 38 39 40 41    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.