control

Results 1 - 25 of 2261Sort Results By: Published Date | Title | Company Name
Published By: Dell SB     Published Date: Jul 31, 2019
Take back control of your infrastructure projects and build the business case using your own data with Dell EMC’s Live Optics. We can help create a defensible proposal, unique to your environment, using your Live Optics data. Take the guess work out of your projects and build a new infrastructure based on your actual needs. When can we set up a call to discuss?
Tags : 
    
Dell SB
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: VeriShip     Published Date: Jul 26, 2019
You may believe your shipping operation is a well-oiled machine; you pay your invoices on time, your costs seem to be under control and, as far as you know, your customers are satisfied with your service… But with shipping, there’s more than what meets the eye. Here are five common mistakes shippers make
Tags : 
    
VeriShip
Published By: VeriShip     Published Date: Sep 16, 2019
It happens every year – the General Rate Increase. As carriers increase their shipping rates to keep pace with the economy, shippers try to adjust and factor the annual increase into their business model. But there’s more to GRI than meets the eye. The GRI is just one of many variables in your shipping costs, and misjudging the GRI and other cost increases that might come along with it can be catastrophic to your bottom line if they are not managed properly. With smart planning, however, you can control these costs and protect your profits.
Tags : 
    
VeriShip
Published By: ETQ     Published Date: Jul 10, 2019
Across all industries, document control is one of the most important processes to get right. It ensures documents are updated and revision-controlled, allowing you to effectively route them for review, approval and distribution. Download now to learn more about the key document processes that drive quality: Document Creation Document Routing, Review and Approval Integration with Employee Training Document Change Requests
Tags : 
    
ETQ
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
Today, you can improve product quality and gain better control of the entire manufacturing chain with data virtualization, machine learning, and advanced data analytics. With all relevant data aggregated, analyzed, and acted on, sensors, devices, people, and processes become part of a connected Smart Factory ecosystem providing: •? Increased uptime, reduced downtime •? Minimized surplus and defects •? Better yields •? Reduced cost due to better quality •? Fewer deviations and less non-conformance
Tags : 
    
TIBCO Software
Published By: Wpromote     Published Date: Sep 10, 2019
Putting an RFP out there allows your company to control the information you receive. Instead of getting cold or (at best) warm pitches that may include a lot of extra stuff you’re not interested in, you’ll receive a proposal fully tailored to your business, your industry, and your needs. A well-constructed RFP allows agencies to give you a glimpse into their inner workings and what skills they can bring to the table to build your brand. Looking for more information about the digital marketing landscape? Ready to start a new chapter in your digital marketing story? Wpromote is ready to act fast and exceed your goals.
Tags : 
    
Wpromote
Published By: SAS     Published Date: Sep 05, 2019
Organizations are charging ahead with investments in cloud and analytics to deliver agility, scalability and cost savings. With computing power advancements and continuous growth of data, cloud provides the elastic workloads and flexibility required for modern business. However, the environment of flexibility and choice that cloud provides also creates complexity and challenges. In this white paper, learn how organizations are applying expertise and using the latest methods to move analytics to the cloud, including: • Why are organizations moving analytic work to the cloud? • What are the key challenges and misconceptions? • How do IT leaders provide choice while maintaining control?
Tags : 
    
SAS
Published By: SAS     Published Date: Sep 05, 2019
For many insurers, this accounting process will look familiar: • Tools and processes vary for different lines of business. • The needed data is stored in hundreds of files. • Calculations are performed by multiple, undocumented spreadsheets, with little or no version control. • Humans have to step in to help cobble together data from different channels. • The process of preparing and presenting financial data is not manageable or traceable. • The path from input data to P&L numbers is largely a black box. In a simpler time, this patchwork was passable. But change is coming. New regulations will bring greater complexity to the accounting process for insurers, which will make semi-manual, legacy processes look like a house of cards and raise doubts about the validity of the final numbers on the P&L sheet.
Tags : 
    
SAS
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking, knowledge management, enterprise applications
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
Sangoma has introduced the most cost-effective, easiest to provision and easiest to manage line of enterprise SBCs on the market. The four available options deliver maximum flexibility when selecting a solution -- Learn how they can help you.
Tags : 
sangoma session border controllers, sbc series, carriers, enterprise, cost effective, easy to manage, sbc, networking, knowledge management, enterprise applications
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of Session Border Controllers on the market. Sangoma’s Vega Enterprise SBC VM/Hybrid provides full-featured protection and easy interconnection.
Tags : 
vega sbc, enterprise, vm hybrid, data sheet, easy to use, cost effective, sbc solution, networking, knowledge management, enterprise applications
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication, networking, knowledge management, data management
    
Sangoma
Published By: Viventium     Published Date: Aug 06, 2019
LET’S GET REAL ABOUT CAREGIVER RETENTION Turnover in home health care is out of control. The latest Home Care Salary & Benefits report found the turnover rate for all home health employees to be 21% in 2018, trending upward slightly from 2017. For home health aides, the rate is even higher at 25%.
Tags : 
    
Viventium
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
Application performance and delivery have changed. Should your network change too? Cloud is changing the fundamentals of how IT teams deliver applications and manage their performance. Applications are increasingly deployed farther from users, crossing networks outside of IT’s direct control. Instead of enterprise data centers, many apps now reside in public and hybrid cloud environments. There are even new breeds of applications, built upon microservices and containers. Today, IT needs modern solutions that: ? Extend on-premises networks, apps, and infrastructure resources to the cloud. ? Maintain high levels of performance, user experience, and security across all applications, including microservices based apps. ? Sustain operational consistency across on-premises and cloud environments. ? Move away from the expense, complexity, and poor performance of traditional networking methods. These solutions are available for apps running on Google Cloud Platform (GCP) through the allia
Tags : 
    
Cisco and NVIDIA Corporation
Published By: TIBCO Software     Published Date: Sep 16, 2019
A maior dor de cabeça para a maioria das equipes de operações de pagamento é o controle de custos - e grande parte disso vem do gerenciamento de fraudes: • As equipes de investigação perdem muito tempo apenas reunindo os dados necessários para tomar as decisões. • Os mecanismos de detecção estão sempre se atualizando com os mais recentes padrões de fraude. • Os regulamentos em constante mudança aumentam o tempo e o custo necessários para alcançar a conformidade e atender aos padrões de auditoria. Dado seu escopo e impacto, substituir os principais sistemas de fraude não é uma opção para a maioria das empresas. Mas, em vez de substituí-los, você pode melhorar o processo investigativo com uma investigação ampliada e aprimorar o processo de detecção aperfeiçoando os sistemas atuais. Este relatório descreve três maneiras pelas quais as empresas de serviços financeiros podem usar as soluções TIBCO para reduzir o custo das investigações por meio de uma melhor detecção, e simplificar a co
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!