RecruitingBlogscom

Follow Us:

 

abs

Results 376 - 400 of 513Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 08, 2015
NSS research indicates that NGFW devices are typically deployed to protect users rather than data center assets, and that the majority of enterprises will not tune the IPS module separately within their NGFW. Therefore, NSS evaluation of NGFW products is configured with the vendor pre-defined or recommended,“out-of-the-box” settings, in order to provide readers with relevant security effectiveness and performance dimensions based upon their expected usage.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco
Published By: McAfee     Published Date: Feb 08, 2013
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
mcafee, epp, endpoint, protection, threats, malware, nss
    
McAfee
Published By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
Published By: Markforged     Published Date: Sep 14, 2018
3D printed composite parts are said to be up to 23x stronger than ABS, giving you the reliability you need to keep production lines running smoothly. Request your sample part today, and test the strength yourself.
Tags : 
markforged, 3d printing, composite parts, 3d printers, manufacturing tools, business technology
    
Markforged
Published By: ASME - Protolabs     Published Date: Aug 28, 2019
Over the past three decades, 3D printing has developed a reputation as an essential manufacturing process for prototype parts. Create a CAD model of your design, send it to your company’s printer, and a 3D replica will be ready in hours. Yet these parts are often little more than conceptual show-and-tell models, not durable enough for long-term use, and in some cases prone to degradation by sunlight. The winds of manufacturing are beginning to shift, however, and industrial-grade 3D printing, or additive manufacturing, is now encroaching on machining, injection molding, and other conventional manufacturing processes. This white paper explores the new and existing technology leaders in this area, and assesses the capabilities of production for each 3D printing process. Download your copy today!
Tags : 
    
ASME - Protolabs
Published By: ASME - Formlabs     Published Date: Aug 28, 2019
Rapid prototyping helps companies turn ideas into realistic proofs of concept, advances these concepts to high-fidelity prototypes that look and work like final products, and guides products through a series of validation stages toward mass production. With rapid prototyping, designers and engineers can create prototypes directly from CAD data faster than ever before, and execute quick and frequent revisions of their designs based on real-world testing and feedback. Download this white paper to learn: How rapid prototyping fits into the product design process The applications of rapid prototyping from concept models to manufacturing An overview and comparison of 3D printing technologies for rapid prototyping: FDM vs. SLA vs. SLS
Tags : 
    
ASME - Formlabs
Published By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : 
uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges, it management, platforms
    
IBM
Published By: Cornerstone OnDemand     Published Date: Feb 05, 2018
The majority of training and performance management processes don’t lead to more skilled and productive employees. So what’s different about the ones that do? Download our brief, “The Absolute Must-Do’s to Build an Agile Organization”, and learn: • How to increase employee productivity by 37% • What separates world-class learning and performance from ho-hum • Real business examples of this in action
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software
    
Cornerstone OnDemand
Published By: Apple Corporation     Published Date: May 29, 2012
Please join us at this on-demand online seminar. It'll take about an hour and it's absolutely free.
Tags : 
ipad, ipod, apple, ipad2, tablet, ipad tablet, apple iphone, itunes
    
Apple Corporation
Published By: Apple Corporation     Published Date: Aug 29, 2012
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
apple, online seminar, ipad, training, sales, business analytics, business technology, advertising agencies
    
Apple Corporation
Published By: Apple Corporation     Published Date: Aug 30, 2012
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
apple, live online seminar, september 17th, ipad
    
Apple Corporation
Published By: Apple Corporation     Published Date: Jan 09, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
business technology
    
Apple Corporation
Published By: Apple Corporation     Published Date: Jan 09, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
apple, ipad, live online seminar, free, ipad in business, business technology
    
Apple Corporation
Published By: Apple Corporation     Published Date: Feb 07, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
    
Apple Corporation
Published By: Apple Corporation     Published Date: Feb 08, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
knowledge management, enterprise applications, electronics, business technology
    
Apple Corporation
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
    
Absolute Software
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
McAfee
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
    
McAfee
Published By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn
    
Astaro
Published By: Apple Corporation     Published Date: Nov 14, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free.
Tags : 
ipad, apple, mobile, deployment, mission-critical apps
    
Apple Corporation
Published By: Apple Corporation     Published Date: Nov 15, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free
Tags : 
mdm, mobile device management, deployment, ipad, business solutions, apple, business technology
    
Apple Corporation
Published By: Apple Corporation     Published Date: Nov 15, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free
Tags : 
ipad, apple, business solutions, seminar, apps, ipad apps, it security, security
    
Apple Corporation
Published By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
    
Q1 Labs
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top