HIT Consultant Insightful coverage of healthcare innovation
 

response

Results 126 - 150 of 561Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: iPass     Published Date: Jun 15, 2009
In this Webcast, Brownlee Thomas, Ph.D., Principal Analyst from Forrester Research, Inc., talks about current enterprise mobility trends, shows you what other companies are doing in response to these trends and gives you best practices for reducing your own mobility costs. Don't miss this timely and insightful Webcast.
Tags : 
ipass, wifi, smartphones, roaming, web portal, vpn, ethernet, connection detail records, cdrs
    
iPass
Published By: SumTotal     Published Date: Feb 01, 2013
Most HR professionals are ready for a completely different approach to HR technology. This engaging paper from SumTotal explains why that is — and how one system is revolutionizing the industry in response.
Tags : 
sumtotal, sumtotal systems, elixhr, talent expansion, integrated hr solutions, human resources, hr technology, hr solutions, hr systems, enterprise resource planning, erp, human capital management, hcm, virtual system of record, talent management solutions, nurturing talent, integrate hr systems, traditional hr technology, business technology
    
SumTotal
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
Blue Coat demonstrated bandwidth reduction of up to 95%, and up to 40 times faster response time across all the WAN conditions. Find out more about how the joint solution provides a tremendous improvement in the user experiences of SAP BusinessObjects Enterprise for all WAN conditions tested in this complimentary white paper.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Box     Published Date: Mar 14, 2012
Let's take a look at the emerging trends shaping business today, trends that are driving us to rethink and retool response.
Tags : 
sharing, cloud, content management, emerging trends, enterprise, ecm, demand, software
    
Box
Published By: Workday     Published Date: Mar 13, 2018
This report is a must-have for all service-oriented organizations considering a PSA solution. Examining the survey responses of 68 billable organizations, this detailed report gives you a holistic understanding of the benefits PSA can offer companies like yours. Read the report to see how PSA provides the real-time visibility to improve your productivity and profit.
Tags : 
service oriented, psa, productivity, profit
    
Workday
Published By: Cisco Systems     Published Date: Jun 27, 2013
To help us understand what business leaders think about ‘the cloud’ and the impact of cloud collaboration to their businesses, we asked Forbes Insights to conduct research. In response, Forbes surveyed over 500 senior executives from global companies with sales ranging from $250 million to over $20 billion, and interviewed 15 executives. The study examined the ways business leaders increasingly look at cloud collaboration as a way to increase productivity, accelerate business results, and enhance innovation and collaboration across borders and functions.
Tags : 
cloud, collaboration, technology, business leaders, perspective, results, productivity, innovation
    
Cisco Systems
Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network, networking, network, performance, optimization, network infrastructure, service provider, cdn, risks
    
Noction
Published By: NetApp     Published Date: Dec 09, 2014
NetApp Flash Pool is a storage cache option within the NetApp Virtual Storage Tier product family, available for NetApp FAS storage systems. A Flash Pool configures solid state drives (SSDs) and hard disk drives (HDDs) into a single storage pool, known as an “aggregate” in NetApp parlance, with the SSDs providing a fast response time cache for volumes that are provisioned on the Flash Pool aggregate.
Tags : 
netapp, hybrid, flash pool, ssd, hdd, iops, oltp, demartek
    
NetApp
Published By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : 
best practices, network security, it security, security management, threat response, hacker detection
    
McAfee
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis regulatory exams have become increasingly demanding for governance, risk, and compliance professionals. New rules brought about by the Dodd-Frank Act will continue to shape future examinations including safety and soundness, compliance, market conduct, and risk-based targeted exams. We can expect these changes will require examiners to spend more time onsite, request more documents, and extend the scope and/or depth of their examinations. This means it is more important than ever to avoid the classic mistake of sharing examination documents through ad-hoc, manual processes and delivering highly sensitive data through unsecured channels like mail, e-mail, thumb drives, and FTP. In response to these increasing burdens financial institutions are looking to take control with a more structured, collaborative process for collecting, refining, and submitting regulatory information. Download this white paper to learn more about Intralinks VIA.
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis, financial institutions are faced with increasing scrutiny from government regulators. The Dodd-Frank act was passed in response to the disaster, creating the Consumer Financial Protection Bureau and mandating 398 new rulemakings, many of which remain to be finalized. In light of these events financial services organizations are increasingly relying on Intralinks® as the most secure way to control sensitive information when collaborating within and outside their organizations. Intralinks meets the strictest security, auditability, and compliance requirements of regulated entities around the world – regardless of business complexities. Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data
    
Intralinks
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks Incident Management and Response team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents. This paper is designed to help you ask tough, dir ect questions of any incident response services provider to help you determine the vendor’s capabilities, and if that vendor represents the best fit based on your organization’s particular needs. We highly recommend using the following questions when evaluating any outside assistance with your incident response function.
Tags : 
    
Secureworks
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
You are focused on building an infrastructure, which enables your organization to innovate at speed and gain new insights to stay ahead of the competition. You must deliver these capabilities while maintaining intelligent cost control and improving the productivity and responses of your team.
Tags : 
cloud, optimization, infrastructure, organization, delivery, team effectiveness, productivity
    
Commvault ABM Oct
Published By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organization’s security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions’ ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 21, 2018
Are you looking for a “sophisticated threat hunting product”? Find out why Forrester says this about our product and named us a leader in Endpoint Detection and Response. Download the complete Forrester Wave on Endpoint Detection and Response to see how Carbon Black is scored among its peers. The Forrester Wave evaluates solutions for: • - The strength of their current offering • - Their strategy and vision for the future • - Their market presence
Tags : 
    
Carbon Black
Published By: Sprinklr     Published Date: Jan 05, 2018
Microsoft General Manager and CMO Grad Conn shares his thoughts on how brands must provide an experience that customers actually enjoy, as opposed to just hoping they elicit a certain response.
Tags : 
marketing, content marketing, user generated content, ugc, marketing strategy, social media strategy, social strategy, ugc strategy, ugc marketing strategy
    
Sprinklr
Published By: CA Technologies     Published Date: Sep 11, 2014
This paper is a high-level outline of how application release operations will change in response to the cloud, and it defines the key ingredients needed to help ensure that your enterprise’s release operations for production applications don’t get left behind.
Tags : 
cloud, application release, enterprise release operations, application testing
    
CA Technologies
Published By: NetApp     Published Date: Feb 19, 2015
NetApp Flash Pool is a storage cache option within the NetApp Virtual Storage Tier product family, available for NetApp FAS storage systems. A Flash Pool configures solid state drives (SSDs) and hard disk drives (HDDs) into a single storage pool, known as an “aggregate” in NetApp parlance, with the SSDs providing a fast response time cache for volumes that are provisioned on the Flash Pool aggregate. In this lab evaluation, NetApp commissioned Demartek to evaluate the effectiveness of Flash Pool with different types and numbers of hard disk drives using an online transaction processing (OLTP) database workload, and to evaluate the performance of Flash Pool in a clustered Data ONTAP environment during a cluster storage node failover scenario. In the report, you’ll dis cover how Demartek test engineers documented a 283% gain in IOPS and a reduction in latency by a factor of 66x after incorporating NetApp Flash Pool technology.
Tags : 
    
NetApp
Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet
    
Arbor
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.