top layer

Results 1 - 25 of 36Sort Results By: Published Date | Title | Company Name
By: Here Technologies     Published Date: Sep 27, 2018
Location has become paramount to building new apps, services, experiences and business models. If data is the new oil, then location is the crude oil. This is why most of the top location platform players have been developing technologies to power next-generation autonomous mobility systems. And the “richness” of location data and real-time intelligence are becoming strong monetization opportunities. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors, including Google, TomTom and Mapbox. Learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
     Here Technologies
By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
     Oracle CX
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
     Limelight Networks
By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"Ecommerce industry leaders reveal how to provide a superior shopping experience, win over customers, and maximize ROI. Digital commerce is getting harder. As the pace of change grows faster, the divide between commerce leaders and the competition grows wider. Staying ahead requires resources like The Executive's Handbook to Modern Digital Commerce that contains expertise from the industry's top players You will: - Unleash digital commerce innovation - Learn trends in mobile and consumer shopping - See what's possible with modern digital commerce technology - Hear from top industry voices about what’s next in commerce "
Tags : 
     Oracle Commerce Cloud
By: Patsnap     Published Date: Jul 25, 2016
Using the hot topic of driverless cars, we've looked at how open innovation is transforming a traditional industry, and at what the IP strategies of the big auto players - old and new - can tell us.
Tags : autonomous cars, automotive industry, toyota, google, ford, automotive, self-driving car, autonomous driving
     Patsnap
By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : veracode, gartner, magic quadrant, application security testing, security, application security
     Veracode
By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : ddos attacks, it security, application layer attacks
     Arbor
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
     Cisco Umbrella EMEA
By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
     Intralinks
By: Citrix Systems     Published Date: Sep 17, 2015
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Tags : information security, mobility, risk management, consumerization, security
     Citrix Systems
By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
     Oracle
By: Citrix Systems     Published Date: Jul 17, 2015
Why app and desktop virtualization should be the foundation for your layered approach.
Tags : information security, layered approach, mobility, application, desktop virtualization
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Tags : citrix, it security, app virtualization, desktop virtualization, app, security
     Citrix Systems
By: McAfee     Published Date: Jan 23, 2013
Stopping denial of service attacks is imperative for business continuity, but the complexities of these attacks makes protecting the service infrastructure that much harder. Read this white paper to understand why McAfee recommends an integrated and layered approach.
Tags : dos, ddos, attacks, threats, layered security, advanced threats, advanced attacks, malware
     McAfee
By: VMware, Inc     Published Date: Dec 05, 2013
VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.
Tags : vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery, layered images
     VMware, Inc
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
     Limelight Networks
By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, ngips, next generation ips, next gen firewall, next gen ips, security
     McAfee
By: DocuSign     Published Date: Mar 23, 2016
The insurance industry generates nearly $2 trillion a year in revenue- yet still runs on paper-based processes. Read the report and discover the top 10 reasons why Insurance Companies choose DocuSign for their Digital Transaction Management and eSignature solution. DocuSign is revolutionizing digital transaction management for all players in the insurance sector.
Tags : 
     DocuSign
By: VMware AirWatch     Published Date: May 19, 2016
An Analysis of the Market for Enterprise Mobility Management Revealing Top Players, Trail Blazers, Specialists and Mature Players. April 2016
Tags : mobility, management, specialist
     VMware AirWatch
By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security
     Intralinks
By: Alert Logic     Published Date: Jun 12, 2014
The numbers show a clear trend: there is a growing consensus among CISOs that outsourcing security services is a viable option. In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market.
Tags : mssp, security services, cloud security, managed security, secure cloud
     Alert Logic
By: Polycom     Published Date: Mar 13, 2015
Bene is a European company setting trends in office furnishing with its concepts, products and services. The brand is associated with top quality and functionality, modern design and innovative technology. Bene engages in development and manufacture and provides sales and consultancy services under one umbrella. The Austrian firm is a leader in their market, a major player in Europe, and proud to create a forward looking office concepts.
Tags : mobile, unified communication, concept, brand, enterprise, voice, products, services, innovative technology, manufacture, functionality
     Polycom
By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : proxy deployment, firewall, threat detection, threat protection
     Symantec
By: Mentor Graphics     Published Date: Apr 03, 2009
The success of any consumer electronic device depends to a large extent on the appeal of the user interface (UI) and how easy the device is to use. Studies show that good cosmetic design can encourage users to explore the full range of features and often engenders the perception that a product is easier to use. So if the benefits of a great looking, easy-to-use UI are so clear, why are so many products still falling short of customer expectations? The solution lies in taking a fresh new approach a consumer electronic device UI plays. By identifying common UI functionality and implementing it in a reusable and customizable way, we can make it far easier for embedded engineers to deliver visually engaging and easy-to-use consumer electronic products.
Tags : inflexion platform ui, user interface, consumer electronic device, mentor graphics, ui functionality, media player, mobile phone, tv set-top box, inflexion platform ui, pc-based ui designer tool, embedded component, presentation layer, integration api, xml-based ui template, ui perspective, embedded gui, embedded gui design, embedded gui development, embedded gui prototype, embedded ui
     Mentor Graphics
By: Cloudant, an IBM Company     Published Date: May 15, 2014
Learn how a Cloudant account can be hosted within a multi-tenant Cloudant cluster, or on a single-tenant cluster running on dedicated hardware hosted within a top-tier cloud provider like Rackspace or IBM SoftLayer.
Tags : cloudant, cloud, cloud computing, data layer, dbms, dsaas, saas, data replication, data delivery
     Cloudant, an IBM Company
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com