RecruitingBlogscom

Follow Us:

 

net

Results 126 - 150 of 7463Sort Results By: Published Date | Title | Company Name
Published By: Dotmailer     Published Date: Mar 09, 2016
This whitepaper outlines 7 tips for delivering an improved CX using email, with examples from Magento powered retailers.
Tags : 
customer experience, brand, magneto, email, marketing, search marketing, email marketing, website development, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, marketing research, e-commerce, traditional marketing
    
Dotmailer
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: NetApp     Published Date: Dec 05, 2016
"Solid-state arrays have matured beyond performance-oriented workloads, and the benefits are now compelling for all primary storage plus old and new unexpected workloads. This Magic Quadrant will help IT leaders better understand SSA vendors' positioning in the market. Gain insights into the rapidly evolving market for solid-state arrays with this Gartner report. Discover vendor strengths and the criteria that must be met to be positioned in the leaders’ quadrant."
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: NetApp     Published Date: Sep 19, 2017
Solid-state arrays have matured beyond performance-oriented workloads, and the benefits are now compelling for primary storage plus old and new unexpected workloads. This Magic Quadrant will help IT leaders better understand SSA vendors' positioning in the market. Gain insights into the rapidly evolving market for solid-state arrays with the 2017 Gartner report. Discover vendor strengths and the criteria that must be met to be positioned in the leaders’ quadrant.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, gartner, solid array
    
NetApp
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: NetApp     Published Date: Sep 21, 2017
Emerging storage hardware and software enable I&O leaders to lower acquisition costs per terabyte and improve manageability. In additon to focusing on agility, automation and cost reductions, IT leaders should address the cultural changes and skill set shortages caused by digital business projects.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, 2017 strategic roadmap, storage
    
NetApp
Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a Visionary for 2nd year in a row, in the Gartner 2018 Magic Quadrant for NGFW Gartner has named Forcepoint sole Visionary in their 2018 Magic Quadrant for NGFW, for ability to execute and completeness of vision. According to Gartner, “In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.”*
Tags : 
    
Forcepoint
Published By: Avi Networks     Published Date: Mar 06, 2018
Are your load balancing strategies up to date? Download our guide to assess your current capabilities and understand where your focus should be. Included in this year's report is research, best practices, and conversations with teams at over 180 Global 2000 companies.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Aug 17, 2018
Flexible infrastructure choices and application architectures are changing the way that modern enterprises run their computing. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. With application owners seeking public-cloud-like simplicity and agility in their own data centers, IT teams are under pressure to reduce wait times to provision applications and updates.
Tags : 
    
Avi Networks
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: Gigamon     Published Date: Jun 21, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: Workday DACH     Published Date: Jul 05, 2019
"Die Studie „2019 Gartner Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises“ erleichtert Ihnen die ERP-Anbieterbewertung um ein Vielfaches. Workday wurde von Gartner in puncto Umsetzungsfähigkeit („ability to execute“) und Vollständigkeit der Vision („completeness of vision“) das dritte Jahr in Folge als „Leader“ ausgezeichnet. In dieser Studie erfahren Sie, warum Ihnen die Wahl des richtigen Cloud-Partners für Ihre Kern-Finanzprozesse dabei hilft, die größten Herausforderungen der heutigen Zeit anzupacken."
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Workday DACH     Published Date: Jul 05, 2019
Die Studie „2019 Gartner Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises“ erleichtert Ihnen die ERP-Anbieterbewertung um ein Vielfaches. Workday wurde von Gartner in puncto Umsetzungsfähigkeit („ability to execute“) und Vollständigkeit der Vision („completeness of vision“) das dritte Jahr in Folge als „Leader“ ausgezeichnet. In dieser Studie erfahren Sie, warum Ihnen die Wahl des richtigen Cloud-Partners für Ihre Kern-Finanzprozesse dabei hilft, die größten Herausforderungen der heutigen Zeit anzupacken.
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Workday Netherlands     Published Date: Jul 05, 2019
Op zoek naar een betrouwbare partner voor finance, die uw organisatie vandaag en in de toekomst vooruit helpt? Download een gratis exemplaar van dit rapport voor marktanalyses, adviezen voor het evalueren van leveranciers, en meer.
Tags : 
workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Jul 05, 2019
Op zoek naar een betrouwbare partner voor finance, die uw organisatie vandaag en in de toekomst vooruit helpt? Download een gratis exemplaar van dit rapport voor marktanalyses, adviezen voor het evalueren van leveranciers, en meer.
Tags : 
workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
    
Avi Networks
Published By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
    
Akamai Technologies
Published By: LiveAction     Published Date: Jan 22, 2019
In December of 2018, Sirkin Research was commissioned by LiveAction to identify the top network challenges faced by enterprise-level organizations in complex, hybrid networks. The survey was sent to network and IT professionals predominantly in large mid-market and enterprise companies with at least 1000 employees. The results are based on perspectives from 204 survey respondents, and provide rich insights into the network performance challenges large organizations encounter daily.
Tags : 
network performance, hybrid networks, networking
    
LiveAction
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top