cio

Results 126 - 150 of 1258Sort Results By: Published Date | Title | Company Name
By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile, malware, security, scams, bluecoat, data loss
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : gateway, web, security
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : web security, appliance, virtual, physical, saas, hybrid
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : data, non-malicious, malicious, ponemon, solera network
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view himself or herself as a business enabler. He or she must focus on continuously aligning with business objectives, improving delivery capability to support business processes that bring new products and services to market more quickly, fostering innovation, and reducing costs through improved performance. In this custom Technology Adoption Profile (TAP), the data confirms this trend.
Tags : security, technology, business technology, cio
     Blue Coat Systems
By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : fireeye, spear phishing attacks, cybercriminals, malware, malicious activities, security
     FireEye
By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : secutiry, certificates, keys, security attacks, business
     Venafi
By: SAP     Published Date: Nov 06, 2015
Este relatório sobre a pesquisa global com executivos financeiros examina como as finanças devem transformar processos e sistemas discretos em cadeias de valor em rede e plataforma de tecnologia comum e ainda automatizar intervenções manuais. Com o Ariba Network, a SAP proporciona visibilidade completa e em tempo real dos dados-chave e conecta finanças a suprimento, tesouraria e muito mais.
Tags : 
     SAP
By: SAP     Published Date: Nov 06, 2015
Leia a pesquisa da CFO Research com executivos financeiros de grandes companhias e saiba como eles estão se adaptando ao ritmo acelerado das empresas, dos mercados e da tecnologia.
Tags : 
     SAP
By: SAP     Published Date: Nov 16, 2015
Lea el plan de cinco puntos para darle a su negocio una ventaja competitiva con una eficacia y efectividad aumentadas dentro de GRC. Descargue el informe de investigación para saber más sobre el futuro de la estrategia de manejo de riesgo.
Tags : 
     SAP
By: Oracle     Published Date: Dec 17, 2015
View this on demand webcast to learn how the head of eCommerce and CIO of Carolina Biological partnered together to successfully make the switch to digital eBusiness, increase customer loyalty, and reduce costs and time to market.
Tags : oracle, webinar, digital ebusiness, customer loyalty, b2b ecommerce, internet retailer
     Oracle
By: HP Inc.     Published Date: Feb 03, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
     HP Inc.
By: HP Inc.     Published Date: Feb 03, 2016
IT decision-makers weigh in Securing computers and their data against cyber-attacks and malicious applications is imperative in today’s business environments. IT professionals know this. But which methods are they using to secure laptops and desktops, and just how effective are these methods? See what 650 IT decision-makers had to say.
Tags : 
     HP Inc.
By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
     HP Inc.
By: FusionOps     Published Date: Jun 15, 2016
Download this white paper to learn why Merck Animal Health's Dave Williams is striving for self service supply chain analytics with the help of cloud software.
Tags : 
     FusionOps
By: FusionOps     Published Date: Jul 25, 2016
Life science companies are adopting innovative cloud technology to provide a single source of truth for end-to-end supply chain decision-making. Read this CIO interview to learn how H.D. Smith is using FusionOps supply chain intelligence software to improve efficiency, cost, and quality. Interview Highlights: • How to improve time to actionable insights using a cloud platform • How to improve service levels and forecast accuracy through deeper intelligence into the supply chain • How to enable cross-functional collaboration to make better business decisions and drive performance improvement
Tags : 
     FusionOps
By: IBM APAC     Published Date: May 18, 2017
Technological advances are transforming the way we connect, disrupting the status quo and creating huge turbulence. Industries are converging, and new opportunities and threats are emerging, as never before. So how are CIOs managing their way through the mayhem? In the first installment of our latest C-suite Study, we interviewed 5,247 top executives to find out what they think the future holds and how they’re positioning their organizations to prosper in the “age of disruption.” This report delves more deeply into the views of the 1,805 CIOs who contributed to our research – and what the IT gurus of the most successful enterprises do differently.
Tags : insights, technology, cios
     IBM APAC
By: QAD     Published Date: Jan 19, 2018
A solução de gestão empresarial - ERP- ajuda a indústria a operar mais eficientemente, gerenciar redes de fornecimento mais efetivamente, melhor atraindo e retendo clientes. A maioria na indústria também acha que a empresa com a solução de gestão empresarial na nuvem (cloud ERP) resulta em melhores êxitos nos negócios por causa da facilidade de uso, em qualquer lugar a qualquer momento, facilitando negócios globais.
Tags : 
     QAD
By: QAD     Published Date: Jan 19, 2018
Desde ferramentas de automatização para oficinas até soluções empresariais globais, a QAD se converteu num sócio tecnológico de confiança, ajudando a reduzir as ineficiências e a incrementar a produtividade das empresas de manufatura em todo o mundo. Isto se deve às aplicações empresariais QAD estarem focadas e otimizadas especificamente para as seis indústrias altamente competitivas onde temos: automotivo, produtos de consumo, alimentos e bebidas, produtos industriais, eletrônica e farmaceutico.
Tags : 
     QAD
By: QAD     Published Date: Jan 19, 2018
QAD anticipa los problemas que pueden afectar a sus clientes y provee soluciones antes de que se den cuanta de que tienen un problema. Nos aseguramos de que nuestro producto no solo se ocupe de los principales retos si no que recomendamos soluciones para sus problemas, aparte de nuestras soluciones y servicios. Nuestro objetivo es ayudar a nuestros clientes a formar la Empresa Efectiva.
Tags : 
     QAD
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
     Rohde & Schwarz Cybersecurity
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : data breach, it security, malicious spyware, security management, cloud security, system protection
     CA Technologies
By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : data, big data, security, corporate network, mobility
     Absolute Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com