Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

box

Results 251 - 275 of 480Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2013
Is email dead? Not if it's still one of the top collaboration tools in business. IDC estimated there were over 400 million corporate email boxes in 2010 alone, with continued growth through at least 2014.
Tags : 
business of social white paper, ibm, idc, whitepaper, social, collaboration tools, knowledge management
    
IBM
Published By: Skillsoft     Published Date: Mar 27, 2015
Leadership development is a journey, not a destination Fueled by the relentless evolution of technology and global competition, the business environment is changing more rapidly than ever before. To tackle upcoming crises, rebuild organizations and create new business models, multiple skill and character sets will be required. And because new circumstances will continue to arise, leadership development is never finished. The need for the right leader at the right time remains constant. Read peer insight by CEOs from Avaya, Kaon Interactive, OtterBox, Jupiter Medical Center and Wayfair to help you on your leadership development journey.
Tags : 
leadership, leadership development, succession planning, skills gap, talent gap, leaders, managers
    
Skillsoft
Published By: McAfee     Published Date: Apr 25, 2014
Smart and malicious advanced malware is targeted stealthy, evasive, and adaptive. Sandboxing and other stand-alone products can't do the job on their own. This editorial brief explains why you need an arsenal of layered, integrated defenses to protect against these sophisticated threats.
Tags : 
advanced malware, targeted malware, stealthy attacks, layered malware defense, static analysis, dynamic analysis, sandboxing, emulation
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
McAfee® Threat Intelligence Exchange and the McAfee Security Connected Platform can help integrate workflows and data to overcome siloed operations and shift the security model to agile, intelligent threat prevention. This paper describes three use cases to illustrate the benefits.
Tags : 
advanced malware, security, suspicious files, dynamic sandboxing, static analytics, threat prevention, mcafee network security, mcafee web gateway
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what measures are being taken to defend against it.
Tags : 
advanced malware, protection, network breaches, intrusion provention systems (ips), web and email gateway protection, tracking malware, malware analysis and detection, blocking and remediating malware
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
You spoke and we listened. Today’s advanced malware threats have you spending a lot of resources fighting an uphill battle. The answer is McAfee Advanced Threat Defense—so you can find, freeze, and fix threats.
Tags : 
advanced malware, maware threats, malware problems, malware attacks - rootkits, phishing, zero-access, trojans, apts
    
McAfee
Published By: Plantronics     Published Date: Oct 18, 2013
Emerging technologies empower, but they can also confuse. Workers in the new mobile landscape struggle to manage communications with mobile phones, landlines, VoIP calls and different voicemail boxes, email, IM, text messages and social networking applications. Unified Communications is the answer. It’s the bridge between all these communication systems helping manage communications with one interface.
Tags : 
plantronics, office environment, unified communications, emerging technologies empower, manage communications, audio quality, communication channels, acoustic technology
    
Plantronics
Published By: Box     Published Date: Jan 16, 2015
In a recent customer survey, 94% of respondents stated that managing their data based on the value or priority of that data to their business was “valuable” to them. However, only 32% of respondents are practicing value or priority based data management.
Tags : 
data, data value, nexgen, flash, hybrid, it management
    
Box
Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service, it management
    
Box
Published By: Box     Published Date: Jan 16, 2015
The nature of the financial services industry places a myriad of international compliance requirements on a company's IT team, as well as an expectation by its customers to deliver the high test levels of performance and reliability. To survive and thrive, businesses in the industry must not only keep pace with customer demand but gain competitive advantage. Those demands mean the IT team must be at the forefront of adopting emerging technologies. This is certainly true for Orangefield Columbus, who recently experienced significant growth in its multiple databases which led to the serious performance degradation of its existing storage system. By focusing on a proactive data management storage array, Orangefield was able to eliminate resource contention. Download now and examine Orangefield's journey to find a solution that would meet, and exceed, their performance and capacity requirements.
Tags : 
nexgen, vmware, citrix, flash, financial services, it management
    
Box
Published By: Box     Published Date: Jan 16, 2015
Has your organization been dealing with storage latency and performance issues? With a population of nearly 10 million people, Los Angeles County is the most populous county in the United States. It's no surprise that with 1.5 million people taking public transportation every day to help ease some of LA County's infamous traffic, making sure passengers get where they're going is a monumental task. At the heart of it all is the organization's IT department. The LA Metro infrastructure consists of 600 servers, 500 of which are virtualized. When the city's IT team began receiving user complaints and experiencing performance issues with their Virtual Desktop Infrastructure (VDI) environment, they began looking for alternatives. Download the case study now and learn how replacing the city's existing storage solution helped solve a wide range of technical problems and eliminated unnecessary latency, ensuring all 1.5 million passengers got where they needed to be.
Tags : 
nexgen, flash, la metro, vdi, vmware, vdi, software development
    
Box
Published By: Box     Published Date: Jan 16, 2015
How do you know what the right storage set up is for you? How do you ensure that you're using best practices when implementing? As IT virtualization continues to become more and more prevalent, the storage component of the virtualization architecture continues to play a critical role in performance and availability. Additionally, the ability to benchmark and predict storage performance in a virtualized environment is essential to an efficient and well-run VDI setup. Download now and learn how to select and size the best storage array for your VMWare deployment to maximize your VM density and increase ROI.
Tags : 
nexgen, flash, qos, vmware, storage, software development, it management
    
Box
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
Box
Published By: Box     Published Date: Jan 16, 2015
BridgePay Network Solutions is a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Founded in 2011, BridgePay is a transaction gateway company that offers a full suite of payment products that enhance the security and performance of point-of-sale data as it races between merchants and banks.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash, it management
    
Box
Published By: Box     Published Date: Feb 13, 2015
In a world where just about everything is expected to be measured for the sake of ROI, the expression “time is money,” has become even more meaningful. As such, cloud computing—which enables collaboration among teams in real time—has become an expectation as a means of work e?ciency and in fostering ?exible work locations and times, particularly among marketers. The 9-to-5 work culture is ancient history. In its place is an “always on,” collaborative work culture enabled by hardware, software, mobile apps and the cloud. In this whitepaper, we examine ?ve cultural shifts that are moving work and the workforce beyond the o?ce and traditional work-day hours to a system in which we can truly begin to say, “We are our work.”
Tags : 
marketers, cloud, roi, workforce, collaboration, it management
    
Box
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture, it management
    
Box
Published By: Box     Published Date: Feb 13, 2015
Bring your own anything is suffusing the enterprise, and CIOs are pursuing new governance structures to tame the mobile chaos.
Tags : 
byo, cio, governance, mobile, it management
    
Box
Published By: Box     Published Date: Feb 13, 2015
As file sizes have increased and document-centric collaboration needs have become more complex, many organizations are turning to cloud file sharing (CFS) products to provide end users with a lightweight but effective solution.
Tags : 
cloud, mobile, cfs, cloud file sharing, it management
    
Box
Published By: Box     Published Date: Feb 13, 2015
IDC's 3rd IT Platform — defined by the nascent and confluent mobile, cloud, social business and big data technologies — will drive 98 % of future IT industry growth over the next seven years. In 2013, industry transition to the 3rd Platform will move from the exploration stage to full-blown high stakes competition, resetting the leadership ranks in the IT sector forever.
Tags : 
idc, it platform, mobile, mobile content, 3rd platform technologies, it management
    
Box
Published By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : 
cloud, it pros, security, dlp, cloud securiity, it management
    
Box
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : 
targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity, security, it management, knowledge management
    
ThreatTrack Security
Published By: Quark Software     Published Date: Mar 19, 2015
With the proliferation of customer experience initiatives, content marketing and an increasing need to fulfill content delivery on mobile devices, digital publishing has now become an important component of the digital toolbox for every organization. Research firm InfoTrends recently released the 2015 Digital Publication Platform Market Overview, which finds that: • Over 90% of enterprises are moving towards electronic documentation. • The digital publishing platform landscape is made up of approximately 60 to 80 main companies, but is dominated by a few vendors that can be considered influencers. • The digital publishing platform market will grow by a 25% CAGR (compound annual growth rate) over the next five years. Learn more about the market, solution providers and take a look at the future of digital publishing in the InfoTrends Digital Publication Platform Market Report.
Tags : 
digital publishing, sales enablement, digital sales enablement, mobile sales enablement, enterprise mobility, corporate app, automated publishing, automated digital publishing
    
Quark Software
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search