RecruitingBlogscom

Follow Us:

 

hit

Results 1 - 25 of 7785Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
Artificial intelligence (AI) and machine learning (ML) are emerging technologies that will transform organizations faster than ever before. In the digital transformation era, success will be based on using analytics to discover the insights locked in the massive volume of data being generated today. Historically, these insights were discovered through manually intensive data analytics—but the amount of data continues to grow, as does the complexity of data. AI and ML are the latest tools for data scientists, enabling them to refine the data into value faster.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer, including bridging the journeys between digital and physical worlds, you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : 
data, backup, recovery, virtualization, solutions, cloud, architectures
    
Rubrik EMEA
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Whether you’re a leader of Infrastructure & Operations for a large enterprise or a mid-sized business looking to scale, you’ll likely have similar questions about multicloud that need answers. Read this eBook for a better understanding of multicloud architecture, and get answers to questions such as: What’s the difference between hybrid cloud and multicloud? What are the top benefits and challenges of multicloud? What is the value proposition of multi cloud management? What is a multicloud strategy? Download this free eBook today to get started on your multicloud management journey.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Whether you’re a leader of Infrastructure & Operations for a large enterprise or a mid-sized business looking to scale, you’ll likely have similar questions about multicloud that need answers. Read this eBook for a better understanding of multicloud architecture, and get answers to questions such as: What’s the difference between hybrid cloud and multicloud? What are the top benefits and challenges of multicloud? What is the value proposition of multi cloud management? What is a multicloud strategy? Download this free eBook today to get started on your multicloud management journey.
Tags : 
    
CloudHealth by VMware
Published By: Unit4     Published Date: Apr 12, 2019
Looking to improve accuracy of enterprise budgeting and financial planning? Just 1% of firms can forecast costs at 90% accuracy 30 days out. This white paper by BPM Partners and sponsored by Unit4 shows how Artificial Intelligence (AI) makes a real impact on budgeting, planning, and analysis, and when complemented with deep machine learning, gives greater accuracy to data, budget rules and budget drivers. Download now and learn how AI can help auto-tune your FP&A.
Tags : 
    
Unit4
Published By: Unit4     Published Date: Apr 12, 2019
Still using spreadsheets for financial planning? With multiple templates? Leading to serious versioning and collaboration difficulties? AI-driven integrated, digitized financial planning is the answer. Helping you spend less time gathering and consolidating data, and more time unearthing the key insights and accurate forecasting hidden within it. Download the white paper and find out how harnessing AI can supercharge FP&A.
Tags : 
    
Unit4
Published By: VMware     Published Date: Apr 09, 2019
Download Infographic.
Tags : 
    
VMware
Published By: Gigamon     Published Date: Mar 26, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon EMEA     Published Date: Feb 20, 2019
Arrêtez de déployer des outils de prévention des cybermenaces en mode détection. Procurez-vous “Dimensionner les outils de prévention des menaces inline” pour découvrir les avantages d'une architecture de protection inline. Lisez maintenant.
Tags : 
    
Gigamon EMEA
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon EMEA
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
Need powerful visibility and insights into network traffic while reducing risk, complexity and costs? Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats. Learn how to see, control and secure what matters -- download now!
Tags : 
    
Gigamon EMEA
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
    
Illusive Networks
Published By: Forcepoint     Published Date: Mar 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP.
Tags : 
data protection, data security, critical data, intellectual property, intellectual property protection, dlp, cybersecurity, data loss prevention
    
Forcepoint
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IBM Cloud Private for Data is an integrated data science, data engineering and app building platform built on top of IBM Cloud Private (ICP). The latter is intended to a) provide all the benefits of cloud computing but inside your firewall and b) provide a stepping-stone, should you want one, to broader (public) cloud deployments. Further, ICP has a micro-services architecture, which has additional benefits, which we will discuss. Going beyond this, ICP for Data itself is intended to provide an environment that will make it easier to implement datadriven processes and operations and, more particularly, to support both the development of AI and machine learning capabilities, and their deployment. This last point is important because there can easily be a disconnect Executive summary between data scientists (who often work for business departments) and the people (usually IT) who need to operationalise the work of those data scientists
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence, automation, Internet of Things, blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise.
Tags : 
    
Group M_IBM Q2'19
Published By: Domino Data Lab     Published Date: Feb 08, 2019
A data science platform is where all data science work takes place and acts as the system of record for predictive models. While a few leading model-driven businesses have made the data science platform an integral part of their enterprise architecture, most companies are still trying to understand what a data science platform is and how it fits into their architecture. Data science is unlike other technical disciplines, and models are not like software or data. Therefore, a data science platform requires a different type of technology platform. This document provides IT leaders with the top 10 questions to ask of data science platforms to ensure the platform handles the uniqueness of data science work.
Tags : 
    
Domino Data Lab
Published By: Domino Data Lab     Published Date: Feb 08, 2019
As organizations increasingly strive to become model-driven, they recognize the necessity of a data science platform. According to a recent survey report “Key Factors on the Journey to Become Model-Driven”, 86% of model-driven companies differentiate themselves by using a data science platform. And yet the question of whether to build or buy still remains. This paper presents a framework to facilitate the decision process, and considers the four-year projection of total costs for both approaches in a sample scenario. Read this whitepaper to understand three major factors in your decision process: Total cost of ownership - Internal build costs often run into the tens of millions Opportunity costs - Distraction from your core competency Risk factors - Missed deadlines and delayed time to market
Tags : 
    
Domino Data Lab
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top