RecruitingBlogscom

Follow Us:

 

overview

Results 176 - 200 of 677Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Dec 13, 2011
Watch this video to gain a rapid overview of some of the most critical actions you can take in your organization to increase CRM user adoption.
Tags : 
crm, adoption, sales, actions, user adoption, sales, software, crm & customer care
    
Oracle
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: IBM     Published Date: Oct 13, 2015
Understanding the Deep Web and how it can endanger your organization. This paper offers a high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P.
Tags : 
ibm, security, mainstream media, deep web, dark web, i2p, business technology
    
IBM
Published By: Stratavia     Published Date: May 21, 2008
This document provides an overview of data center consolidation methodologies, the general impact of each method, and how Stratavia’s Data Palette helps data center consolidation initiatives.
Tags : 
data center consolidation, data center standardization, logical consolidation, data center rationalization, data center automation, stratavia, automation, dca
    
Stratavia
Published By: Oracle     Published Date: Oct 23, 2014
Learn how DMPs can help you achieve unprecedented audience targeting precision and scale across all marketing programs. This whitepaper delivers an in-depth overview of DMPs and provides actionable, useful information for marketers and agencies hoping to implement a DMP to improve programme outcomes.
Tags : 
demystified, audience, targeting, scale, marketing, programs, actionable, agencies
    
Oracle
Published By: Informatica     Published Date: Nov 21, 2011
This chalk talk provides an overview of those challenges, the unique differentiators of Informatica Data Replication, and the most in-demand use cases
Tags : 
data replication, data, replication, challenges, use cases
    
Informatica
Published By: Datavail     Published Date: Dec 07, 2017
Our Application Performance Management (APM) platform developed by Accelatis, which was acquired by Datavail in 2017, applies consistent, measurable, and repeatable activity to your Hyperion instance to identify scalability issues before they affect real users in production.
Tags : 
    
Datavail
Published By: Alere Wellbeing     Published Date: Oct 16, 2012
This white paper, based on a webinar presented by Dr. Robert F. Kushner, provides an overview of DASH, compares it to other top ranked diets, and offer insights into the evidence behind their design.
Tags : 
worksite wellness, weight loss programs, corporate weight loss programs, diabetes, alere, human resources, hr management, human resources management
    
Alere Wellbeing
Published By: Alere Wellbeing     Published Date: May 02, 2012
Join us for our latest Clear Insights webinar, Deconstructing DASH: How Your Workforce Would Benefit from America's #1 Rated Diet, presented by Robert F. Kushner, MD, Clinical Director of the Northwestern Comprehensive Center on Obesity and one of the 22 expert panelists who rated the Best Diets for 2012. Dr. Kushner will provide an overview of DASH, compare it to other top ranked diets, and offer insights into the evidence behind their design. Dr. Kushner will also discuss the keys to sustainable weight loss and best practices for employers to choose an effective worksite weight loss plan.
Tags : 
human resources management
    
Alere Wellbeing
Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW
Published By: Mitel     Published Date: Dec 15, 2016
With this digital customer experience shifting from a "nice to have" offering to an essential service, any business that interacts with its customers must have the right technology to deliver a consistent experience across all media, as well as a concrete strategy for this broadened scope of service. Check out our new white paper for an overview of the digital expectations and habits of today's digital consumer, as well as practical next steps for transforming customer experience from dated to digital.
Tags : 
customer experience, sms, email, web chat, social media, mobile
    
Mitel
Published By: Mitel     Published Date: Dec 19, 2016
With this digital customer experience shifting from a "nice to have" offering to an essential service, any business that interacts with its customers must have the right technology to deliver a consistent experience across all media, as well as a concrete strategy for this broadened scope of service. Check out our new white paper for an overview of the digital expectations and habits of today's digital consumer, as well as practical next steps for transforming customer experience from dated to digital.
Tags : 
customer experience, sms, email, web chat, social media, mobile, networking
    
Mitel
Published By: Dell Storage     Published Date: Oct 17, 2011
This white paper provides an in depth overview on Automated Tiered Storage from Dell Compellent and how it can help organizations optimize the use of storage for a VMware environment. Read on to find out more about this efficient storage platform.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 08, 2011
This white paper provides an in depth overview on Automated Tiered Storage from Dell Compellent and how it can help organizations optimize the use of storage for a VMware environment. Read on to find out more about this efficient storage platform.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure
    
Dell Storage
Published By: Dell EMC     Published Date: Feb 14, 2019
Isilon scale-out NAS delivers the analytics performance and extreme concurrency at scale to feed the most data hungry analytic algorithms. Access this overview from Dell and Intel® to learn more. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: EMC Corporation     Published Date: Dec 01, 2014
This document provides a detailed overview of the ViPR Services architecture. ViPR Services is a geo-scale cloud storage platform that delivers cloud-scale storage services, global access and operational efficiency at scale.
Tags : 
hyperscale storage platform, infrastructure, geo-scale cloud storage, operational efficiency, data center
    
EMC Corporation
Published By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues whilst enabling you to calculate the number of GFI EventsManager instances required on your network.
Tags : 
event manager, events manager, events management, log management, security event, event log, gfi
    
GFI
Published By: AMD FirePro     Published Date: Apr 18, 2012
A comprehensive overview of the AMD FirePro and Solidworks relationship, highlighting the key selling points, benchmarks, case studies, customer references, and much more.
Tags : 
advanced micro devices, amd, firepro, solidworks, 2012, engineering, optimization, optimisation
    
AMD FirePro
Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
This document provides a high level overview of how to build a high performance, IP SAN with deduplicated disk protection and long-term tape archive. This document will also put that solution into context with the rest of a typical IT environment.
Tags : 
it servers, protection strategy, network raid, hp storeonce, it management, data management, data center
    
Sponsored by HP and Intel®
Published By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
This document provides a high level overview of how to build a high performance, highly available IP SAN with deduplicated disk protection and long-term tape archive. This document will also put that solution into context with the rest of a typical IT
Tags : 
designing, data, protection, strategy, p4000, storeonce, tape, white
    
HP and Intel® Xeon® processor
Published By: Intel Corp.     Published Date: Aug 08, 2012
This document provides a high level overview of how to build a high performance, highly available IP SAN with deduplicated disk protection and long-term tape archive. This document will also put that solution into context with the rest of a typical IT environment.
Tags : 
designing, data, protection, strategy, p4000, storeonce, tape, white
    
Intel Corp.
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This white paper is focused on the design and architecture of an OCS 2007 environment in an HP BladeSystem infrastructure. The document outlines a building block approach to deploying OCS on the HP BladeSystem and focuses on how the design decisions around levels of availability, scalability, and the OCS 2007 feature set impact the hardware that is deployed and the version of OCS that is used. The white paper also covers a brief overview of the Microsoft Unified Communications framework including Microsoft Exchange Server 2007 and Office Communications Server 2007 and an overview of the HP BladeSystem architecture and how the HP BladeSystem can help lower the total cost of ownership (TCO).
Tags : 
hp bladesystem, ocs, voip, storage
    
F5 Networks Inc
Published By: Citrix Systems     Published Date: Oct 08, 2012
This paper discusses various options that FlexCast provides to help meet the computing requirements of every user type and guide organizations.
Tags : 
citrix, desktop, virtualization, business technology
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top