• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

trend micro

Results 26 - 50 of 127Sort Results By: Published Date | Title | Company Name
By: CoreSite     Published Date: May 29, 2019
This research report shows the statistics behind U.S. based Media and Entertainment organizations’ adoption of data storage and compute solutions. Touching on the latest trends and specifically researched for the IT departments to see how their peers and competitors are investing to reach future business and technology goals.
Tags : 
colocation, interconnection, scalable, solutions, data, data store, data storage, compute, data centers, best, seamless, trends, coresite, spiceworks, media, cloud, entertainment, workload, research, aws
    
CoreSite
By: Datadog     Published Date: Feb 10, 2016
With thousands of companies using Datadog to track their infrastructure, we can see software trends emerging in real time. Today we're excited to share what we can see about true Docker adoption—no hype, just the facts.
Tags : 
datadog, docker, software trend, information technology, data management, kubernetes, container, microservices, docker swarm, infrastructure monitoring, container monitoring
    
Datadog
By: Equinix APAC     Published Date: May 22, 2019
According to IDC, almost half of IT spending will be cloud-based in 2018, reaching 60% of all IT infrastructure and 60-70% of all software, services and technology spending by 2020. Today’s top-performing organizations are benefiting from hybrid and multi cloud scenarios. Industry thought leaders share their perspectives and insights on how enterprises across the region are reshaping their cloud strategies to stay ahead. • Industry Trends - William Lee, Research Director at IDC • Industry Best Practices - Alex Wehle, Cloud Infrastructure Lead, Microsoft • End User Perspective - T C Chao, Senior Manager, Ricoh • Industry Insights - Tejaswini Tilak, Sr. Director, APAC, Equinix Watch the webinar broadcast and a copy of the latest IDC cloud research report in addition.
Tags : 
    
Equinix APAC
By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro, mc afee, malware, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton, symantec, trend micro, mcafee, malware, threats, email, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
By: JBoss Developer     Published Date: Oct 21, 2016
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications
Tags : 
microservices, architecture, java, paas, soa, linux, database development
    
JBoss Developer
By: LogMeIn     Published Date: Feb 27, 2018
When Facebook released their bot feature, M, the virtual assistant living inside their Messenger platform, it was billed as the next generation of how people connect and interact with the internet. Since then, over 18,000 companies have created their own branded chatbots with the help of Facebook’s platform. Never ones to miss out on a trend, Microsoft, Google and Apple have all been hard at work developing their own integrated chatbot features. Brands of all shapes and sizes, from American Express to 1800-Flowers to Domino’s Pizza, all have their own chatbots, proving the versatility of the concept. As Microsoft CEO Satya Nadella said at the 2016 Build conference, “As an industry, we are on the cusp of a new frontier that pairs the power of natural human language with advanced machine intelligence.”
Tags : 
    
LogMeIn
By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
By: Microsoft     Published Date: Oct 12, 2017
Customers expect more from brands when it comes to convenience, resolution times, and agent expertise. Evolving customer preferences are tightly linked to innovations in digital technology, and brands must embrace both in order to keep pace with heightened expectations. The good news is that brands that can deliver on expectations are rewarded with higher rates of customer retention and loyalty. The Microsoft 2017 State of Global Customer Service survey polled 5,000 people from Brazil, Germany, Japan, the United Kingdom and the United States. We continue to find commonalities along with distinct differences between locals. And though people in all age groups are embracing new digital trends, millennials especially are shaping the way brands need to think about the future of customer service engagement.
Tags : 
customer service, customer loyalty, digital trends, multiple channels, microsoft
    
Microsoft
By: Microsoft Azure     Published Date: Apr 10, 2018
Prepare your business for the future of customer service. In a world where price and product can easily be matched, customer experience has become a key brand differentiator. It’s never been more important to understand customer expectations, perceptions, preferences, and trends. The 2017 Microsoft State of Global Customer Service report found that customer service impacts brand choice and loyalty for 96% of consumers around the globe. The 32-page report offers insights from 5,000 survey participants. Learn how you can stay ahead of the competition and earn customers for life with intelligent customer service. Find trend details and actionable data on: The growing importance of service in a customer’s choice of or loyalty to a brand The most important aspects of a good customer service experience The most frustrating aspects of a poor customer service experience Expectations of the millennial customer segment Channel preferences based on geography Customer expectations for self-serv
Tags : 
    
Microsoft Azure
By: Microsoft Office     Published Date: Nov 24, 2008
To address the needs of customers as well as emerging workplace trends,  Microsoft focused the design of Microsoft Office Professional Plus 2007 around four key goals. They are: working more efficiently with better results, collaborating with others across boundaries, making better use of information, and streamlining processes and controlling content. These goals correspond to long-term investment areas that Microsoft began with Microsoft Office 2003 and continues to focus on today.
Tags : 
microsoft office outlook® 2007, microsoft office infopath® 2007, microsoft office open xml formats, microsoft office excel® 2007, enterprise applications, business intelligence, business process automation, business process management
    
Microsoft Office
By: MuleSoft     Published Date: Jan 16, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservice implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft
By: MuleSoft     Published Date: Nov 27, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservices implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft
By: MuleSoft     Published Date: Sep 09, 2019
Im Geschäftsleben herrscht ein außerordentlich harter Wettbewerb. Kein Unternehmen – egal wie groß oder in welcher Branche – ist sicher vor Disruption. Um die damit einhergehenden Risiken zu mindern, ist es äußerst empfehlenswert, bewährte Microservices-Methoden zu implementieren, um Änderungen und innovative Neuerungen schnell und einfach umsetzen zu können und im Wettbewerb jederzeit Schritt zu halten. Organisationen, die bereits über ein Fundament für fortlaufende Innovationen verfügen, haben Microservices-Architekturen eingeführt, um schnell und effektiv auf die ständig neuen Anforderungen reagieren zu können. In diesem Whitepaper erfahren Sie mehr zu folgenden Themen: Warum Microservices zu den bedeutendsten Software-Trends gehören Design-Grundlagen für Microservice-Architektur So erleichtert die Anypoint Platform die Implementierung von Best Practices für Microservices innerhalb von Unternehmen
Tags : 
    
MuleSoft
By: Oracle IaaS     Published Date: Feb 01, 2018
Nicht zuletzt gab es durch den Megatrend Cloud Computing einen rasanten Fortschritt für die moderne Applikationsentwicklung. Das Zusammenspiel von Microservices und Containern ermöglicht es, Entwickler-Software schneller zu erstellen und freizugeben. Mehr in unserem ePaper von Oracle und Intel®: so können Sie Time-to-Market von neuen Projekten durch Cloud-native Application Development verkürzen, Operations und Data Security effizienter managen sowie den ROI in der IT verbessern.
Tags : 
entwickeln, schneller, kosteneffizienter, cloud, native, application, development
    
Oracle IaaS
By: Palo Alto Networks     Published Date: Sep 30, 2016
in our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue coat, check Point, cisco, cyphort, Fidelis cybersecurity, Fireeye, Fortinet, intel Security, Palo Alto networks, lastline, and trend Micro — and researched, analyzed, and scored them.
Tags : 
palo alto, automated malware, security, cloud, forrester report
    
Palo Alto Networks
By: Quocirca     Published Date: Dec 02, 2008
The need to share information has never been greater as cross-organizational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organizations, carries more and more risk as regulations are tightened around data protection and personal privacy.
Tags : 
quocirca, content security, aep networks, clearswift, symantec, trend micro, websense, smtp, security, data management, compliance, disaster recovery, security management, data protection, content management system
    
Quocirca
By: Red Hat     Published Date: Jan 02, 2018
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications.
Tags : 
    
Red Hat
By: Schneider Electric     Published Date: Oct 31, 2017
In some cases, adopting cloud IoT platform may make more sense where required processes, communication costs and cloud costs meet sufficient total cost of ownership against deploying MDC. Additionally, in situations that an end-user organization already has a secure room or a modular data center solution where infrastructure can be housed and/or the amount of infrastructure involved may be too small to benefit from power/cooling advantages of being housed in an MDC, the organization may not see a need for an MDC. An MDC is nothing more than a smaller form of a modular data center, and a number of providers have entered the modular data center solutions space in the past. These modular data center solution providers came into the market with high expectations for growth and ROI only to find that high sales were not forthcoming due to limited use cases, so many exited the space.
Tags : 
algorithm analysis, buyer trend, iot, workloads, market, vendors, data centers
    
Schneider Electric
By: Symantec     Published Date: Oct 19, 2012
Symantec Endpoint Protection 12.1 solution was compared to two implementations each from McAfee and Trend Micro. Testing encompassed various scanning and system update functions over virtual machines. Read on to figure out which performed best.
Tags : 
symantec, virtualization, virtual desktop, virtual machines, resources, performance, symantec endpoint protection, vmware, security
    
Symantec
By: Symantec     Published Date: Nov 14, 2012
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. Trend Micro Deep Security (DS) 8. Read to learn how well Symantec did against others.
Tags : 
symantec, symantec endpoint protection 12.1, vmware, tolly report, security, enterprise applications
    
Symantec
By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
By: Trend Micro     Published Date: Oct 12, 2012
This white paper evaluates that "free" claim by examining the additional costs associated with deploying ForeFront and abandoning third party anti-malware solutions.
Tags : 
information security, licensing, software costs, trend micro, security, encryption, hacker detection, intrusion detection, intrusion prevention, data protection
    
Trend Micro
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter