HIT Consultant Insightful coverage of healthcare innovation
 

ca wa

Results 6851 - 6875 of 7419Sort Results By: Published Date | Title | Company Name
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
    
Venafi
Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
    
Venafi
Published By: Vendor Safe Technologies     Published Date: Jan 21, 2010
The Most Common PCI Compliance Mistakes of Brick-and-Mortar Locations
Tags : 
vendor safe technologies, pci security deficiency, firewall, remote access, authentication, wireless network, point of sale software, credit card
    
Vendor Safe Technologies
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : 
veracode, security, supply chain security, web applications, application security
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
Web application attacks are now the most frequent pattern in confirmed breaches, and organizations know that application security is key to protecting their data. But many organizations lack the resources to develop a comprehensive AppSec program, and need to look to external services. Download this guide for a straightforward, four-step method for acquiring the services you need to support a comprehensive AppSec program.
Tags : 
veracode, application security, sans, security
    
Veracode
Published By: Veracode     Published Date: Jun 26, 2019
DevOps, a new model for software development, is transforming the way the world creates software. And despite its substantial organizational, cultural and technological requirements, this new way of organizing development and IT operations work is spreading rapidly.
Tags : 
    
Veracode
Published By: Veracode     Published Date: Jun 26, 2019
Software plays a central role in business processes and in our daily lives, and companies of all sizes and industries are building, buying and downloading more applications than ever before. However, this increased dependence on software makes the applications powering our world a prime target for cybercriminals. Applications are the No. 1 attack vector for cybercriminals and the main source of breaches. In addition, the way software is developed is changing. Contemporary application development methodologies like DevOps are increasing the speed and precision with which software is produced and deployed. The increased speed and precision have created a modern software factory akin to the manufacturing factories of past industrial revolutions.
Tags : 
    
Veracode
Published By: Verint APAC     Published Date: Aug 01, 2019
For enterprise businesses, the conversations you are having with your customers and employees can help transform your future. At Verint Next IT, we deliver intelligent self-service solutions to help companies elevate the customer experience while driving operational efficiency. We understand that the challenge for many companies exploring AI and automation initiatives lies in knowing the right place to start and also how to grow. That’s why we offer AI Blueprint™. With AI Blueprint and our proven Alme® platform, we ensure that every enterprise succeeds with AI now and in the future. Download the eBook to learn: • What AI Blueprint is, what it does and why it matters • The benefits of Conversational AI and how it is transforming businesses everywhere • Five ways AI Blueprint and our Alme platform help companies thrive with intelligent virtual assistant (IVA) and chatbot solutions
Tags : 
    
Verint APAC
Published By: VeriSign     Published Date: Feb 10, 2011
This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.
Tags : 
verisign, ssl spoofing attack, code protection, security, code signing certificates, malicious software
    
VeriSign
Published By: VeriSign     Published Date: Feb 10, 2011
What companies can do to maximize online sales by increasing customer trust and confidence. This report looks into the need for trust in ecommerce and the ways in which companies are building it (and, in some cases, undermining it).
Tags : 
verisign, online sales, customer trust, ecommerce, increase conversion, ssl, secure sockets layer
    
VeriSign
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
    
VeriSign Incorp.
Published By: Veritas     Published Date: Jan 03, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas
Published By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas
Published By: Vertica     Published Date: Aug 15, 2010
If you are responsible for BI (Business Intelligence) in your organization, there are three questions you should ask yourself: - Are there applications in my organization for combining operational processes with analytical insight that we can't deploy because of performance and capacity constraints with our existing BI environment?
Tags : 
business intelligence, vertica, aggregated data, olap, rolap, sql, query, data warehouse
    
Vertica
Published By: Vertica     Published Date: Dec 01, 2008
Cloud computing is ushering in a new era of analytic data management for business intelligence (BI) by enabling organizations to analyze terabytes of data faster and more economically than ever before. The key change: cloud database software is provisioned within minutes, without data center overhead, and it's licensed on an on-demand basis.
Tags : 
vertica, ec2, elastic, cloud computing, ad-hoc, business intelligence, cloud, cloudbased applications
    
Vertica
Published By: Vertica     Published Date: Feb 01, 2010
How the Vertica Analytic Database is powering the new wave of commercial software, SaaS and appliance-based applications and creating new value and competitive differentiation for solution developers and their customers.
Tags : 
vertica, ec2, cdr, elastic, saas, cloud computing, data management, ad-hoc
    
Vertica
Published By: Vertica     Published Date: Aug 16, 2010
The Vertica Analytic Database is the only database built from scratch to handle today's heavy business intelligence workloads. In customer benchmarks, Vertica has been shown to manage terabytes of data running on extraordinarily low-cost hardware and answers queries 50 to 200 times faster than competing row-oriented databases and specialized analytic hardware. This document summarizes the key aspects of Vertica's technology that enable such dramatic performance benefits, and compares the design of Vertica to other popular relational systems.
Tags : 
vertica, ec2, elastic, cloud computing, workflow, benchmark, projections, ad-hoc
    
Vertica
Published By: Vertica     Published Date: Feb 20, 2010
For over a decade, IT organizations have been plagued by high data warehousing costs, with millions of dollars spent annually on specialized, high-end hardware and DBA personnel overhead for performance tuning. The root cause: using data warehouse database management (DBMS) software, like Oracle and SQLServer that were designed 20-30 years ago to handle write-intensive OLTP workloads, not query-intensive analytic workloads.
Tags : 
vertica, ec2, cdr, elastic, saas, cloud computing, data management, ad-hoc
    
Vertica
Published By: Vertica     Published Date: Mar 15, 2010
In a world of growing data volumes and shrinking IT budgets, it is critical to think differently about the efficiency of your database and storage infrastructure. The Vertica Analytic Database is a high-performance, scalable and cost-effective solution that can bring dramatic savings in hardware, storage and operational costs.
Tags : 
vertica, ec2, cdr, elastic, saas, cdr, cloud computing, data management
    
Vertica
Published By: Vertica     Published Date: Jan 19, 2010
Pink OTC Market Inc. is the third largest U.S. equity trading marketing place. Learn how Pink OTC built a highly available and highly reliable (no downtime in a year of production use) data warehouse using Vertica's Analytic DBMS that cost-effectively stores billions of records and scales easily by simply adding CPUs without incurring additional licensing fees.
Tags : 
pink, adr, data warehousing, vertica, dbms, database, analytical applications
    
Vertica
Published By: Vertica     Published Date: Dec 09, 2008
BlueCrest Capital Management is a leading European hedge fund, with $15B in assets-under-management. Learn how BlueCrest uses Vertica Analytic DBMS to obtain real-time analysis while simultaneously loading vast amounts of new market data.
Tags : 
vertica, data management, data warehousing, dbms, data mining, data source, data, security
    
Vertica
Published By: Viavi Solutions     Published Date: Jun 30, 2014
Look at the Graph, Find the Code and Boom – You’re Solving Problems. Identifying and understanding common HTTP status codes can go a long way in troubleshooting complex web application issues.
Tags : 
network instruments, http, troubleshooting, http status codes, web applications
    
Viavi Solutions
Start   Previous    268 269 270 271 272 273 274 275 276 277 278 279 280 281 282    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.