connection

Results 101 - 125 of 447Sort Results By: Published Date | Title | Company Name
By: Vectra Networks     Published Date: Aug 03, 2015
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Tags : threat, data, security, it management, malware, banking, cyber theft, remote access tool
     Vectra Networks
By: VMware AirWatch     Published Date: Feb 21, 2017
Today’s IT organizations simply cannot afford to continue to manage the end user environment with an out-of-date PC-centric approach to systems management. The cloud, mobility and multiplatform environments render that approach ineffective. It’s time to take another look at virtual application and desktop virtualization technologies. Download this whitepaper to look at VMware Horizon, the most complete solution for delivering, managing and protecting Windows desktops, applications and online services across devices, locations, media and connections, making it ideal for systems management transformation.
Tags : 
     VMware AirWatch
By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: SilkRoad Technology     Published Date: Feb 24, 2016
At Connections 2014, SilkRoad’s annual user conference, a panel of human resources professionals convened to discuss timely onboarding issues including automation, socialization, duration, and ownership.
Tags : silkroad, human resources, onboarding, hr professional
     SilkRoad Technology
By: SilkRoad Technology     Published Date: Feb 24, 2016
For decades, learning in a corporate environment consisted of a day or a week of classroom-based training. However, technological advances delivered on the promise of a more complex learning protocol with automated, virtual, and experiential elements. At Connections 2014, SilkRoad’s annual user conference, a panel of learning professionals convened to discuss five major learning themes this year, including integration, mobility, engagement, compliance, and analytics.
Tags : silkroad, human resources, industry trend, learning
     SilkRoad Technology
By: Akamai Technologies     Published Date: Nov 14, 2018
Delivering a hit PC game isn’t easy. You’ve got to worry about frictions like slow downloads, unstable connections, and security flaws — any of which can cause players to abandon for good and doom your game to failure. Akamai’s Quick Start Guide: Global Game Launch, PC Edition can take some of the complexity— and anxiety— out of your next game launch. You’ll learn how Akamai can help you succeed at each of the four key steps of game release — Develop, Promote, Deliver, and Play — so you can keep your players engaged with a seamless, secure game experience.
Tags : 
     Akamai Technologies
By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
     Lookout
By: Abacus Labs     Published Date: Feb 01, 2019
“It’s not what you know. It’s who you know.” We’ve all heard the phrase. We all understand there’s truth to it. But ask yourself: would you recommend or hire everyone you know? No way. Having the right connections is important to advancing your career. But it’s only half the battle. What really creates opportunity is defining your personal brand to your employer, to your network, to the market. It’s taking that moment when you make a great impression and scaling it to the larger world. This guide presents different approaches real professionals are using to build their brands. You’ll see tips and strategies that you can use to become an in-demand finance leader, including a system we developed called the ROLE Model of personal branding. In the age of effortless connection, cultivating a personal brand is essential. It’s not just who you know. It’s what they know you can do.
Tags : 
     Abacus Labs
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : security, opendns, cisco
     Cisco Umbrella EMEA
By: IBM     Published Date: Jul 06, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : ibm, mdm, big data, ibm infosphere, data management, data center
     IBM
By: IBM     Published Date: Oct 13, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : ibm, mdm, big data, ibm infosphere, mdm advantagw, knowledge management, enterprise applications, business technology
     IBM
By: Dassault Systčmes     Published Date: Jun 19, 2018
The concept of a virtual, digital equivalent to a physical product or the Digital Twin was introduced in 2003 at a University of Michigan Executive Course on Product Lifecycle Management (PLM) taught by Dr. Michael Grieves. In light of these advances, it is timely to explore how the Digital Twin can move from an interesting and potentially useful concept that aids in understanding the relationship between a physical product and its underlying information to a critical component of an enterprise-wide closed-loop product lifecycle. Understand how focusing on the connection between physical product and virtual product will improve productivity, uniformity of production, and ensure the highest quality products.
Tags : 
     Dassault Systčmes
By: Cisco     Published Date: Jun 24, 2015
This paper reveals how new Fast IT model enables IT departments to shift focus from spending too much time keeping the lights on to capturing the value of today’s connections and preparing for the future.
Tags : fast it, it departments, it professionals, roadmap
     Cisco
By: KPMG     Published Date: Jul 11, 2018
Despite multi-billions of investment, only a small number of UK firms succeed in making customer experience a source of value. How can you join them and get CX investments flowing through to your bottom line? Read this report to understand: • how CX leaders are reappraising organisational structures to get closer to the customer • what four key principles they follow to build a connected customer experience • how they are using events in customers’ lives to drive innovation and set new standards in customer experience • how the connections enabled by CX platforms work as a springboard for success.
Tags : 
     KPMG
By: Citrix Systems     Published Date: Jul 28, 2015
Organizations are looking to SDN to improve network agility by incorporating network automation in cloud computing platforms. So far the focus of SDN has been on L2-L3 switching and routing services. However applications don’t just need network connections. They also need L4-L7 network services.
Tags : 
     Citrix Systems
By: Scalebase     Published Date: Feb 19, 2013
This white paper examines how to scale MySQL databases to handle more users, more connections and more data without re-writing apps or re-architecting the database.
Tags : mysql, databases, users, data distribution, improve, performance, business technology
     Scalebase
By: Riverbed     Published Date: Apr 12, 2017
AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That’s where Riverbed comes in. Riverbed’s SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Register for the upcoming webinar to experience a fundamentally new approach to networking, with real users sharing their experience in addition to a joint customer, OpenEye that has saved time and money by utilizing this approach to cloud networking. OpenEye Scientific Software leveraged Riverbed SteelConnect to very quickly and easily establish secure connections to and between AWS VPCs, saving hours of network administration time.
Tags : 
     Riverbed
By: Visier     Published Date: Jul 08, 2014
Global competition for talent, outsourcing labor, compliance legislation, remote workers, aging populations – these are just a few of the daunting challenges faced by HR organizations today. Yet the most commonly monitored workforce metrics do very little to deliver true insight into these topics. Leaders need to graduate from metrics to analytics, surfacing the important connections and patterns in their data to make better workforce decisions.
Tags : visier, workforce analytics, hr metrics, planning
     Visier
By: Kontiki     Published Date: Sep 16, 2014
Learn how to reach and engage remote employees within your organization and see how this will strengthen employee engagement, create personal connection with executives, and increase collaboration between teams and employees.
Tags : employee engagement, adoptions trends, solutions, best practices, video webcasting, internal communication, company-wide participation
     Kontiki
By: Equinix     Published Date: Oct 27, 2014
Connections are great. Having a network to connect to is even better. Humans have been connecting, in one form or another, throughout history. Our cities were born from the drive to move closer to each other so that we might connect. And while the need to connect hasn’t changed, the way we do it definitely has. Nowhere is this evolution more apparent than in business. In today’s landscape, business is more virtual, geographically dispersed and mobile than ever, with companies building new data centers and clustering servers in separate locations.
Tags : data center, enterprise, cloud, experience, hybrid, performance, strategy, interconnectivity
     Equinix
By: Cox Communications     Published Date: Nov 10, 2014
Internet service is the heart of any business today, powering everything from telephone service to videoconferences. Because so much of your business depends on a reliable, fast internet connection, it’s important that you choose the best internet service for your environment. With several different options, though, professionals can sometimes feel overwhelmed by the technical jargon.
Tags : internet service, cox, dsl, cable, customer-based wi-fi
     Cox Communications
By: ArborNetworks     Published Date: Sep 16, 2015
Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.
Tags : networking, security, it management, business technology
     ArborNetworks
By: MuleSoft     Published Date: Apr 13, 2016
Today everything truly is connected to everything, and APIs are the connection mechanisms. Many companies are finding that their use of APIs has accelerated over the past 12 months, and that it will continue to accelerate during the next 12 months. APIs aren't really a new technology; they've actually been around for a long time. What is new is that they are in far broader usage today than they have been in the past. As of late 2015, the ProgrammableWeb API directory listed more than 14,000 APIs. When thinking about designing and managing APIs, a number of important questions arise. Why are APIs so well used and what effect would they have on your business? What is the impact of the expanding API economy on both providers and consumers? What are API tools and how can an investment in tools be an extremely cost efficient foundation for production grade API use cases?
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence, api management
     MuleSoft
By: U.S. Cellular     Published Date: Aug 23, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
     U.S. Cellular
By: IBM     Published Date: Apr 26, 2016
Restoring connections: How telecommunications providers can reboot the customer experience IBM has more than 22,000 experts working in the Telecommunications industry, delivering solutions to more than 200 major communications service providers globally. IBM’s telecommunications capabilities are backed by a global network of telecom solution labs, research labs and innovation centers to support its offerings in the area of analytics, cloud, mobility, network optimization, digital transformation and global integration. IBM continues to invest significantly in key acquisitions to add expertise and capabilities that enable its clients in the telecommunications space.
Tags : ibm, ibm institute for business values, telecommunications, customer experience, communications service providers, csp, customer relationship, business technology
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com