aps

Results 176 - 200 of 513Sort Results By: Published Date | Title | Company Name
By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : ics, scada, cyberx, cyber security, hacking, randomware
     CyberX
By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : data breaches, data privacy, hipaa, finra, byod, pii, phi
     Druva
By: Oracle + Dyn     Published Date: Jun 29, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: Anycast vs. Unicast networks CNAME DDoS and Hijacking Load Balancing and GSLB
Tags : 
     Oracle + Dyn
By: OneLogin     Published Date: Oct 24, 2017
Corporate data spreads across an ever-growing number of applications. Users (employees, contractors, partners, and customers) access those applications over a wide range of devices. Those devices take different forms: desktops, laptops, tablets, smartphones, smartwatches. Each device may use a different operating system. The locations from where people access your data can be on-premises or off, and in any number of places around the globe. Data, users, apps, devices, locations—the sheer number of permutations and combinations is mind-boggling. This complex nature of today’s IT environment opens security gaps and exposes your business to undue risk. To illustrate, try to envision all the permutations and possible entry points for risk in your organization. Imagine that you have 400 users, each using 25 apps. When you multiply those together, that’s 10,000 potential access permissions to manage. Access permissions change as users come and go, roles change, new apps are added, and
Tags : 
     OneLogin
By: Empyr     Published Date: Jun 12, 2018
This retailer wanted to acquire new customers and eliminate wasteful spend on advertising in the process. Of equal importance was their desire to re-engage lapsed customers who occasionally frequented its locations to reactivate and stimulate additional purchase opportunity.
Tags : 
     Empyr
By: Empyr     Published Date: Jun 12, 2018
A major QSR brand wanted to increase business in a highly competitive category by acquiring new customers and eliminating wasteful spend on advertising in the process. Of equal importance was their desire to increase frequency and ticket size with their light lapsed guests.
Tags : 
     Empyr
By: SundaySky     Published Date: Mar 06, 2018
The world is mobile. People communicate with each other on their mobile phones, they stay on schedule with the help of their smartwatches, and, perhaps most importantly, they interact with brands via mobile apps. Therefore, it’s important for brands to focus on their mobile experiences. To investigate the preferences and behaviors of consumers when using mobile applications within the U.S., SundaySky conducted an online survey with 226 total respondents.
Tags : 
     SundaySky
By: SundaySky     Published Date: Mar 06, 2018
The world is mobile. People communicate with each other on their mobile phones, they stay on schedule with the help of their smartwatches, and, perhaps most importantly, they interact with brands via mobile apps. Therefore, it’s important for brands to focus on their mobile experiences. To investigate the preferences and behaviors of consumers when using mobile applications within the U.S., SundaySky conducted an online survey with 226 total respondents.
Tags : 
     SundaySky
By: SundaySky     Published Date: Mar 06, 2018
The world is mobile. People communicate with each other on their mobile phones, they stay on schedule with the help of their smartwatches, and, perhaps most importantly, they interact with brands via mobile apps. Therefore, it’s important for brands to focus on their mobile experiences. To investigate the preferences and behaviors of consumers when using mobile applications within the U.S., SundaySky conducted an online survey with 226 total respondents.
Tags : 
     SundaySky
By: TrendKite     Published Date: Apr 25, 2018
Sometimes a perfect storm comes together to signal a radical shift or rebirth of an industry. But it’s not enough to say public relations is in flux or rapidly changing. It’s more impactful to discuss the evolution of the change, understand the potential gaps, and be early to capitalize on opportunities created by these gaps. The path for change in the PR industry has been tumultuous. And understandably so. The irrationality of basing performance on vanity metrics is so ingrained in the profession that the left-brain, rational piece has been pushed aside. This has created a culture of estimating based on vanity metrics like AVE (ad value equivalency), leading to a dynamic where the C-suite craves that WSJ or TechCrunch story, yet doesn’t believe PR’s reporting on the value of that coverage. When everyone in the marketing stack is crunching numbers and showing real, tangible value, PR is holding onto air. Why keep setting the profession up for failure by perpetuating the cycle of abstr
Tags : ave, trendkite, marketing
     TrendKite
By: Oracle + Dyn     Published Date: Jun 27, 2017
"Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: • Anycast vs. Unicast networks • CNAME • DDoS and Hijacking • Load Balancing and GSLB Learn more! "
Tags : 
     Oracle + Dyn
By: Palo Alto Networks     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : firewall, optimization, network, environments, applications, infrastructure, security, palo alto
     Palo Alto Networks
By: Cybric     Published Date: Oct 30, 2017
How a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Whether you’ve over-invested in security tools, under-invested, don’t know the extent of your security capabilities or you’re facing new regulations that require you to demonstrate and continually maintain compliance — there is a path forward. To understand and optimize what you have in place, as well as gaps you may have, develop a security rationalization process to calculate the return on your security investments. Read this paper to learn the five steps needed to get started.
Tags : cybersecurity, cyber security, ciso, security visibility, security assurance, security resilience, application security tools, appsec, security audit
     Cybric
By: Sage     Published Date: Nov 28, 2017
"Your business may be competitive and successful today, but how will it perform in the future? It’s all too easy to be immersed in—perhaps even obsessed by—your daily operations. That’s why thinking about what your business and the market will look like one year, five years, even a decade from now needs to be a critical part of your thinking. It’s all about looking ahead, about being proactive. Marching confidently into the future requires a solid foundation for that empire you’re building. That’s why your planning efforts need to include a dedicated exploration into the types of innovative, evolving technologies that will accommodate the business of the future. This eGuide addresses the essential business principles that will always apply regardless of the stage your business is in. This resource helps you focus on the key points that should put you well on the way toward future-proofing your business."
Tags : 
     Sage
By: Citrix     Published Date: Jun 15, 2018
The ADC market continues to evolve, with various new cloud-integrated and software-centric use cases having arisen. This report provides infrastructure and operations leaders with a snapshot of the market's transition and profiles vendors representative of emerging and very different approaches.
Tags : 
     Citrix
By: Endace     Published Date: Dec 28, 2012
Your company is a voracious consumer of bandwidth - perhaps a very large enterprise, a research lab, or a service or content provider of some description. Running on ultra high speed data links may blind you from seeing real issues arising.
Tags : endace, 100g, networking, bandwidth, speed traffic
     Endace
By: Technomedia-Hodes iQ     Published Date: Apr 25, 2012
Get your complimentary copy now! Time to Switch: Knowing When and How to Make a Talent Management Solution Change lays out the hardball questions you need to ask to assess what you expect from your talent management system, and the five steps to take to determine if you're in fact getting what you need-and how to switch if you're not.
Tags : human resources, talent management, hr management, employee, employee management
     Technomedia-Hodes iQ
By: uberVU via HootSuite     Published Date: Apr 07, 2014
No brand, no matter how small or large, or how big its marketing budget, is safe from social media mishaps. This e-book from uberVU via Hootsuite will review 9 types of social media fails, discuss how they happened and detail how they could have been avoided. We'll also provide actionable lists of what your brand can do to prevent social media fails.
Tags : social media, social media fails, avoiding mistakes, branding, failproof
     uberVU via HootSuite
By: The Starr Conspiracy     Published Date: Jun 23, 2017
2015 and 2016 were big for HCM tech startups. Hundreds of new companies were launched and hundreds of sophomore companies received new and bigger rounds of investment from angels, venture capitalists, private equity firms, rich uncles, and poor saps. It’s a bona fide gold rush.
Tags : 
     The Starr Conspiracy
By: Emulex Corporation     Published Date: Nov 07, 2013
Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.
Tags : network monitoring, network visibility, technology, endace, best practices
     Emulex Corporation
By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
     FireEye
By: Ipswitch     Published Date: Dec 01, 2014
It’s easy to understand why many organizations are confused about the need for a Managed File Transfer (MFT) system. There are a lot of different products in the market, file transfer product functionality is not clearly defined and often overlaps with other solutions, “MFT” is not fully understood, and there are a lot of mixed messages in the marketplace.
Tags : ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution, audit trail, transfer security, automation
     Ipswitch
By: Epicor     Published Date: Apr 04, 2017
Emerging technologies and trends are disrupting the status quo for manufacturers around the globe. The Epicor “Factory of the Future” eBook explores the megatrends and disruptive technology that is shaping the future of manufacturing—and, more importantly, the eBook offers recommendations to help you grow your business amidst all this change. View the eBook to explore these topics and more: • Demographic shifts in manufacturing • Globalization • Resource scarcity • Knowledge and gender gaps • How to future-proof your manufacturing business
Tags : erp software, enterprise resource planning software, fabrication, manufacturing
     Epicor
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com