mpl

Results 1 - 25 of 11614Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Mar 22, 2019
Be proactive in protecting your data center with complete visibility, multilayered segmentation, and threat protection that follow the workload everywhere.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
Artificial intelligence (AI) and machine learning (ML) are emerging technologies that will transform organizations faster than ever before. In the digital transformation era, success will be based on using analytics to discover the insights locked in the massive volume of data being generated today. Historically, these insights were discovered through manually intensive data analytics—but the amount of data continues to grow, as does the complexity of data. AI and ML are the latest tools for data scientists, enabling them to refine the data into value faster.
Tags : 
    
Cisco
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Automation is already pervasive in our lives—from tried-and-true mechanized assembly lines to the dawn of self-driving cars. But how can you use advanced forms of automation to improve your business processes? Download this starter guide for a detailed look at robotic process automation (RPA), a type of automation that can help you: Reduce costs Decrease errors Improve efficiency Boost productivity Also explore the definition and features of RPA, as well as the types of automation software.
Tags : 
    
Automation Anywhere APAC
Published By: Sage     Published Date: Apr 19, 2019
The way we work has completely transformed. New technology is changing how, where and when we work. In this new landscape, businesses are facing challenges specific to growth, talent acquisition and productivity. Employers need to embrace new technology to get ahead in this new world of work, and put people at the heart of their strategy. However, HR and People leaders are in fierce competition for the all-important slice of budget, which makes it vital to build the strongest business case for technology investment. This guide is intended to help HR and People leaders like you get the financial support you need. You’ll get practical, effective tips on: • Understanding and explaining the true benefits of investing in a new HR system and the likely return on investment. • Positioning HR as a driver of change throughout your business. • Ensuring your HR vision aligns with the business strategy. • Getting management and key stakeholders to buy in. • Building the strongest business case pos
Tags : 
    
Sage
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. They’re in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. That’s the modern reality of business life—it’s happening everywhere at once. Not only that, it’s happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are it’s no longer 9 ‘til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
Published By: TIBCO Software     Published Date: Mar 15, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
    
TIBCO Software
Published By: Here Technologies     Published Date: Mar 29, 2019
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Workday APAC     Published Date: Apr 10, 2019
"Looking to start the evaluation process for a new technology provider and unsure where to start? We can help. This complete guide for midsize organizations walks you through how to prepare for your evaluation and what your company should look for in a vendor, so you can be confident in your search and selection. Read the guide to benefit from the insight of hundreds of customers who have been through the evaluation process."
Tags : 
    
Workday APAC
Published By: Aventri     Published Date: Apr 11, 2019
"Successful meetings management requires a wide array of skills and tools to help you meet stakeholder's expectations and reach your goals. From tools to assist with budget creation to meeting approval workflows and cost-effective venue sourcing, a great meetings management program takes a lot of effort. That's why at Aventri, we created an eBook that combines all the essential meeting management strategies into one package. Learn how to: • Efficiently source the right meeting venue • Use the right meeting management technology to increase success • Implement money saving strategies with big budget results • Measure your total meeting spend and return. In the end, you will feel confident in your abilities to implement a successful meeting management strategy at your organization."
Tags : 
    
Aventri
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Ransomware is not going away. This makes it imperative for businesses across all industries to adopt a data management strategy of multi-layered security, easy automation, and quick recovery. To learn more about Rubrik and how it can ?t into your ransomware protection strategy while simplifying data protection across your entire datacenter, visit www.rubrik.com. As the leading next-generation data protection solution, Rubrik deploys as a plug-and-play appliance in less than an hour and has been adopted across all verticals and organization sizes including Fortune 50 companies.
Tags : 
data, backup, recovery, backups, solution, security, encryption, cyber, privacy, infrastructure
    
Rubrik EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : 
data, backup, recovery, virtualization, solutions, cloud, architectures
    
Rubrik EMEA
Published By: LiveAction     Published Date: Jan 22, 2019
In December of 2018, Sirkin Research was commissioned by LiveAction to identify the top network challenges faced by enterprise-level organizations in complex, hybrid networks. The survey was sent to network and IT professionals predominantly in large mid-market and enterprise companies with at least 1000 employees. The results are based on perspectives from 204 survey respondents, and provide rich insights into the network performance challenges large organizations encounter daily.
Tags : 
network performance, hybrid networks, networking
    
LiveAction
Published By: LogMeIn     Published Date: Apr 23, 2019
By leveraging the power of AI, companies gain the ability to consolidate and refine answers to questions in one central repository.
Tags : 
    
LogMeIn
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 22, 2019
A global media conglomerate was facing issues with their existing operating model -stagnant quality of support, lack of innovation and inferior/deteriorating end user experience. LTI’s Amplified Outcomes Model - Mosaic helped deliver TCO reduction, coupled with enhanced user experience.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 22, 2019
In the Overall segment, the ISG Provider Lens Next-Gen ADM Quadrant Report cited LTI’s idea-led innovation approach to delivering unique business solutions; the organization’s digital way of working (WoW), designed to deliver and amplify outcomes; and an IP-led growth strategy as key strengths that earned the market leader designation. The ISG Provider LensTM report recognized LTI’s extensive experience in working with both packaged and custom software, running multi-year maintenance deals, and a growing digital portfolio, as factors that make it an attractive alternative to large multinational providers.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Organisations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimise your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organisations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: Terminate Zombie Assets Rightsize EC2 Instances & EBS Volumes Upgrade instances to the latest generation Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Amazon EC2 Reserved Instances can appear complicated, but finding a solution that best suits your company doesn't mean becoming an expert yourself; you just need to know how to approach Reserved Instances and where they can make the biggest impact. This free guide delivers a collection of proven best practices to help you successfully manage Amazon EC2 Reserved Instances. The benefits include: A breakdown of reservation types and offerings, including Convertible Reserved Instances How to calculate the payback period How to modify and exchange existing reservations to match cloud usage over time How to maximise savings with automated RI management and optimisation
Tags : 
    
CloudHealth by VMware
Published By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we’ll walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.