HIT Consultant Insightful coverage of healthcare innovation
 

cem

Results 76 - 100 of 604Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance
Published By: Box     Published Date: May 30, 2012
This report analyzes the longer-term, five-year cost of ownership and value for cloud applications across four categories: CRM, ERP, collaboration (including email), and IT service management.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: May 31, 2012
Here's how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments - with the help of Box.
Tags : 
mobile, mobile worker, communication devices, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: May 31, 2012
Read how one company's continuing consolidation of file sharing technologies reaped benefits that any organization may derive by undertaking that effort.
Tags : 
sharing, dow, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: May 31, 2012
This Gilbane Group Beacon examines how large-­scale trends are changing enterprise collaboration and content sharing expectations. It defines Cloud Content Management, an emerging set of content management practices.
Tags : 
cloud, content management, active control, collaboration, sharing, content sharing, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management
    
Box
Published By: Box     Published Date: May 31, 2012
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors, highlighting market information tailored to investment.
Tags : 
content, cloud, collboration, enterprises, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: May 31, 2012
Read how organizations are realizing massive productivity gains by transitioning their content management solutions to cloud-based models.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: Jun 04, 2012
Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: Jun 07, 2012
Read how Box let companies rapidly implement a cost-effective and secure content storage and sharing system that can easily expand to accommodate any size and number of files.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: Jun 11, 2012
This paper examines the market drivers, inhibitors, and top vendors in this segment, including Box, Citrix Sharefile, Dropbox, Egnyte, Nomadesk, Sugarsync, Syncplicity and YouSendIt.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: Jun 11, 2014
Midsize semiconductor manufacturer saves $0.5MM in infrastructure expenses by switching from servers to Box. They use Box company-wide: R&D, sales, M&A, legal, and more. Technology industry, manufacturing industry, midsize company, midmarket, NA, server replacement, Sales LOB, R&D LOB, M&A, Legal LOB, Box Content API, cost savings.
Tags : 
box, avago, technology, server replacement, lob, r&d, m&a, legal, content api, semi conductor
    
Box
Published By: Box     Published Date: Jun 11, 2014
Midsize learning technology company sought to move all files to the cloud for disaster-recovery reasons and to boost employee productivity. Added Box to their existing cloud stack for all employees. Streamlined IT operations; in the process of replacing servers with Box.Technology industry, midsize company, midmarket, global, server replacement, cloud stack, NA, APAC.
Tags : 
box, rosetta stone, midmarket, midsize companies, disaster recovery, server replacement, employee productivity
    
Box
Published By: Box     Published Date: Jun 11, 2014
Global energy management giant based in France rolled out Box to 67,000 employees, enabled BYOD, and boosted productivity. Use Box for RFPs, vendor collaboration, executives, sales presentations. Cut server costs by 30%. Energy industry, large company, EMEA, global, sales LOB, BYOD, server replacement.
Tags : 
box, schneider, electric, vendor collaboration, global sales, lob, byod, server replacement
    
Box
Published By: Brightcove     Published Date: May 11, 2015
Tired of being stuck with average results for your video marketing efforts? Have no fear...the Hero’s Guide to Video Marketing is here to help!
Tags : 
brightcove, video marketing, gadgets, content, marketing results, marketing enhancements
    
Brightcove
Published By: BrightRoll Exchange     Published Date: May 09, 2017
Get the most value from each native ad impression. Here’s why you should combine programmatic with native placements
Tags : 
native advertising, native ads, promgrammatic ad buying, programmatic advertising, native programmatic ad buy, sponsored content, sponsored ads, premium ads, premium content advertising, cross-device advertising, ad exchange, ad exchanges, roi advertising
    
BrightRoll Exchange
Published By: Brother     Published Date: Mar 08, 2018
Documents are an integral component to the successful operation of an organization. Whether in hardcopy or digital form, they enable the communication, transaction, and recording of business-critical information. To ensure documents are used effectively, organizations are encouraged to continually evaluate and improve surrounding workflows. This may involve automating elements of document creation, securing the transfer and storage of information, and/or simplifying the retrieval of records and the data contained within. These types of enhancements can save time, money, and frustration. This white paper will discuss top trends and requirements in the optimization of document-related business processes as well as general technology infrastructures for document management. It will also address how some office technology vendors have reacted to these trends to guide their design and development of products, solutions, and services.
Tags : 
documents, workflows, business process, document management
    
Brother
Published By: Business.com     Published Date: Oct 09, 2012
Web conferencing technology is an innovative advancement allowing people to communicate and conference over the Internet.
Tags : 
web conferencing, costs, meeting, business, corporate communications
    
Business.com
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
Tags : 
email archiving, email security, storage, security policies, policy based management, compliance, exchange server, c2c
    
C2C Systems, Inc.
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users, primary motivator, secondary motivator, implementing iam, security goals, regional perceptions, it management, cloud resource, enforcement, iam adoption, deploy iam
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 06, 2015
L'app non è più semplicemente un metodo per comunicare. Rappresenta il nuovo punto critico di coinvolgimento, il volto dell'azienda, se non addirittura l’elemento chiave della fidelizzazione o meno del cliente.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Le vol et l’exploitation des identifiants administratifs sensibles entraînent des infractions et la perturbation des opérations. CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.