reach

Results 1 - 25 of 1226Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: -
Enterprise data is growing rapidly - reaching multiple petabytes of data or even billions of files for many organizations. To maximize the business value of this data, enterprises need a storage infrastructure to store, manage, and retrieve a massive amount of data. This ebook shows you how to address large content repository challenges with object storage. You'll learn how to effectively address long-term retention policies, find and retrieve content quickly from long-term repositories and using object storage efficiently.
Tags : object storage, storage infrastructure
     NetApp
By: Solix     Published Date: Aug 03, 2015
Every CIO want to know if their infrastructure will handle it when data growth reaches 40 zettabytes by 2020. When data sets become to large, application performance slows and infrastructure struggles to keep up. Data growth drives increases cost and complexity everywhere, including power consumption, data center space, performance and availability. To find out more download the Gartner study now.
Tags : 
     Solix
By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : vpn, proxies, security, security breach, technology
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : dns< security breach, cyber security
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
     Akamai Technologies
By: Google     Published Date: Aug 23, 2018
To remain competitive, executives must embrace change and equip employees to do the same. Conrad Electric, a 95-year-old online retail company, took just 4 months to migrate to G Suite, providing 4,000 of their employees with more transparent and agile collaboration capabilities. Read this Google Cloud report and get insights to creating a culture where people — combined with productivity tools — can reach their full potential.
Tags : 
     Google
By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
     Google
By: Here Technologies     Published Date: Jul 19, 2018
A growing urban population is putting increasing pressure on infrastructures – and creating a bigger challenge for governments to meet their safety, road performance and cost saving targets. Modern location mapping platforms are growing in accuracy and capabilities – giving governments a way to provide real-time, personalized and integrated mobility services to citizens. In Ovum’s Location Platform Index, 2H17, HERE has been ranked a leader based on overall reach and completeness – and the leader for platform completeness. In this report, you can see exactly how we measure up in the market against some of the leading competition.
Tags : 
     Here Technologies
By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : threats, applications, cybercriminals
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Sep 14, 2018
Despite the tech industry’s collective best efforts to bolster 2CONFIRME,D D2ATA BREACH0ES IN 201710 secure application development practices, half of all applications remain vulnerable to attacks.
Tags : 
     F5 Networks Inc
By: Forcepoint     Published Date: Sep 04, 2018
Connecting and protecting organizations as their people disperse to more locations and need access to resources inside and outside the enterprise are driving a renewed focus on operational efficiency and security efficacy. While the fundamental concerns of confidentiality, integrity, and accessibility are unchanged, the cost and potential losses to organizations continue to increase, making the role of C-level infrastructure and security executives more complex than ever before. A recent IDC survey of CISOs ranked the following as the top 5 scenarios keeping them up at night: • Breach disclosure on the front page of WSJ and so forth • Leak of 50% of employee HR records • IT systems to be a source of major attack against partner • Target-style breach • Leak of 10% of PHI/PII customer records
Tags : 
     Forcepoint
By: Dassault Systèmes     Published Date: Jun 19, 2018
A&D manufacturers and their suppliers now depend more than ever on global supply chains. As they reach across time zones, languages and cultures, supply chains have to work around challenges that build up costs and drag down production schedules. Communication between distributed engineering and production centers can be labored and error-prone. These problems are often compounded by repetitive programming, incomplete simulations, time-intensive production methods, and concern that the shop floor may not be working with current data. Ideally, global companies should be able to design products at any location and produce them at selected sites, with all stakeholders from design to the shop floor working concurrently from a single unique global data source. Understand how manufacturing companies can deliver machined parts faster and increase revenue by reducing costs – despite operating globally across time zones and cultures.
Tags : 
     Dassault Systèmes
By: Iterable     Published Date: Sep 07, 2018
Today’s consumers are more informed, diverse, demanding and well-connected than ever before. With nearly unrestricted access to shopping resources used for discovery, comparison, and purchase, consumers are able to shop at will, often independent of branded retailer guidance. This rise of consumer independence can be attributed to the emergence of technological advancements favoring consumer empowerment; however, the repeated failures of brands to proactively offer personalized, high-value shopping experiences at scale is a significant contributing factor of consumer exodus. This has fostered an inclination among shoppers to become self-reliant in their pursuit of purchases, effectively shutting out promotional outreach from brands. Many brands continue to fall out of touch with their customers because they’ve lost sight of their customers’ true needs. Customer centricity has long been the foundation for modern marketing, but the brands which fail at creating deeply personalized market
Tags : 
     Iterable
By: Iterable     Published Date: Sep 07, 2018
Since the term “omni-channel” was first coined by the Harvard Business Review in 2011, some marketing technology vendors claimed that they could provide businesses with this holy grail of brand ubiquity. Unfortunately, most of these early claims were false starts where vendors over-promised and under-delivered. The good news is that a select number of solutions have caught up with all the promises and can now turn them into action. In this guide, we explain why the conversation around omni-channel marketing has changed and how you can transform your marketing strategy to leverage this new, powerful technology. We’ll give you a heads up on the roadblocks you’ll encounter on your journey to achieving omni-channel relevance and the benefits you’ll gain once you reach your destination. No highfalutin jargon, no talking in circles and no nonsense. Just practical advice on how to create a superb customer experience.
Tags : 
     Iterable
By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking, twitter, youtube, rich media
     StrongMail
By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     Cylance
By: Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : volitionrx, cyber, security, data
     Cylance
By: SuccessFactors     Published Date: Aug 29, 2012
With the many ways that exist to reach job applicants, why is finding great candidates so difficult? This complimentary SuccessFactors white paper discusses six ways to connect with high-quality candidates. Download the white paper today.
Tags : successfactors, sap, best practices, recruiting manager, talent powerhouse, candidate search, applicant search, high-quality candidates, recruiting process, top talent, talent acquisition
     SuccessFactors
By: IdentityIntact for Business     Published Date: Oct 21, 2011
IdentityIntact for Business presents a comprehensive review of how your business can be better protected from data breach attacks by cyber thieves.
Tags : 
     IdentityIntact for Business
By: Dell EMC     Published Date: Aug 07, 2018
The media and entertainment industry was valued at $1.81 trillion in 2016, and is expected to reach $2.14 trillion by 2020. Activities within this industry have grown over the last couple of years, and now range from creating content for movies, TV and games, to delivering that content. This is increasingly performed via on-demand data networks rather than traditional over-the-air broadcasting, watched over high resolution displays that enhance the overall viewing experience of the user, and even the latter is being delivered from the same storage repositories. Media production is also now prevalent in areas not traditionally associated with this activity, such as training, museums, and education.
Tags : 
     Dell EMC
By: Epicor Software Corporation     Published Date: Mar 09, 2018
Learn how ERP software addresses the real-world challenges companies face as they look to grow in today’s global economy. Take the virtual tour and see how your business can: • Reach new markets, expand product lines and grow your business with deep Industry and country specific functionality • Drive improved customer experience and accelerate the digital transformation of your business • Expand collaboration within your company and throughout your supply chain with social and commerce solutions • Respond quickly to changing demands with configurable real-time mobile capabilities Please view the virtual tour below for more information about Epicor ERP version 10. The tour will acquaint you with Epicor ERP and offer insight on how Epicor inspires growth for leading business around the globe.
Tags : 
     Epicor Software Corporation
By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
     Entrust Datacard
By: QTS     Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
Tags : healthcare, cyber security, data security, security
     QTS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com