• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

updates

Results 101 - 125 of 150Sort Results By: Published Date | Title | Company Name
By: Schneider Electric     Published Date: Aug 15, 2017
Schneider Electric is integrating datacenter infrastructure management (DCIM) software, big-data analytics and cloud services into the management of customers’ datacenters. Its recently launched StruxureOn cloud offering signals a new wave in datacenter operations, using a combination of machine learning, anomaly detection and event-stream playback to give operators real-time insights and alarming via their smartphones. More capabilities and features are planned, including predictive analysis and, eventually, automated action. Schneider’s long-term strategy is to build a partner ecosystem around StruxureOn, and provide digital services that span its traditional datacenter business.
Tags : 
incident tracking, historical trending, troubleshooting, operational analysis, prediction model, schneider equipment, maintenance, firmware updates
    
Schneider Electric
By: VeriSign     Published Date: Feb 10, 2011
This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.
Tags : 
verisign, ssl spoofing attack, code protection, security, code signing certificates, malicious software, anti spam, anti spyware
    
VeriSign
By: BlackBerry Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : 
predictive, advantage, cylance, protect, cloud, connect
    
BlackBerry Cylance
By: BlackBerry     Published Date: Jun 22, 2010
Fast, accurate communications are the underpinnings of patient care and safety. Yet, today's hospital staff carry so many pagers and other devices, it's become cumbersome. With Amcom Mobile Connect, you can simplify communications and strengthen care by using your BlackBerry smartphone for code alerts, patient updates, lab results, consult requests, and much more. In short, everything.
Tags : 
blackberry, smartphones, wireless, pda, pagers, healthcare, enterprise servers, it management
    
BlackBerry
By: ZoomInfo     Published Date: Sep 07, 2010
Generate highly-qualified candidate lists effortlessly and instantly connect with direct contact information. The ZoomInfoT Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation candidate sourcing tool, ZoomInfoT Pro, featuring robust search criteria, in-depth candidate profiles, and automated alerts on profile updates and changes. Start your free trial today.
Tags : 
zoominfo, candidate, search, database, sourcing, pipeline, conversion rates
    
ZoomInfo
By: Cisco     Published Date: Sep 08, 2016
This white paper updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
    
Cisco
By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : 
endpoint protection, networks, security software, endpoint devices, security
    
Webroot Inc
By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software, security
    
Secunia
By: IBM MaaS360     Published Date: Jul 01, 2016
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise?
Tags : 
ibm, mobile, android, enterprise, wireless, enterprise applications
    
IBM MaaS360
By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security, mobile computing, mobile data systems
    
IBM
By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
By: Trapit     Published Date: Jun 02, 2016
To be successful, sometimes you need to be pointed in the right direction. That’s where our cheat sheet comes in. It answers your burning questions – like these: - Why do sales reps need social selling? - What are the ground rules for social selling? - How do you set up your social profiles to attract buyers? - How do you write tweets and LinkedIn updates that will spark engagement? - How do you find your buyers on social networks?
Tags : 
social selling, customer aquisition, trapit, social selling programs, content strategies
    
Trapit
By: Scripted     Published Date: Apr 10, 2015
This ebook will alleviate the challenges of creating effective and quality content in today's new SEO landscape. We'll touch on the history of the Google algorithm updates, discuss Panda 4.0 and 4.1, and break down the state of content marketing and the emergent best practices.
Tags : 
google seo, algorithm changes, algorithm ecosystem, content management, marketing, best practices, content marketing, ebusiness
    
Scripted
By: Cisco     Published Date: Aug 24, 2015
The Cisco 2015 Midyear Security Report examines these intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.
Tags : 
malware, network defenses, detection, security gaps, threat defenses, trends, networking, security
    
Cisco
By: Microsoft Office 365     Published Date: Apr 05, 2016
How the cloud can help you reduce headaches and time maintaining hardware. How cloud storage is actually safer than on-premise. How cloud technology and cloud solutions can increase employee productivity. Advantages of cloud computing and how it allows you to spend less time on software updates and more time building your business.
Tags : 
    
Microsoft Office 365
By: Microsoft Office 365     Published Date: Apr 14, 2016
How the cloud can help you reduce headaches and time maintaining hardware. How cloud storage is actually safer than on-premise. How cloud technology and cloud solutions can increase employee productivity. Advantages of cloud computing and how it allows you to spend less time on software updates and more time building your business.
Tags : 
    
Microsoft Office 365
By: VMware AirWatch     Published Date: May 18, 2016
VMware AirWatch gives enterprises identity, productivity and collaboration solutions through enterprise mobility management. The VMware AirWatch platform gives end users a seamless digital workspace, so they can be more effective on the go. A future-proof mobility platform enables IT to support business initiatives now and in the future with features: • Broadest OS and device support with same-day updates • Unified identity management framework across solutions • Suite of integrated productivity and collaboration apps • Centralized content management and collaboration • Global scalability with multi-tenant framework AirWatch offers a unique vision for identity, mobile, network and Infrastructure that is trusted by more than 16,000+ organizations, including 500 of the Global 2000, and has been positioned as a leader by Gartner in the 2015 Magic Quadrant for Enterprise
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
    
VMware AirWatch
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 10, 2011
Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business.
Tags : 
malware, verisign seal, protect, www.verisign.com, drive-by malware, software updates, banner ads, downloadable documents
    
VeriSign Authentication Services, now a part of Symantec Corp.
By: Symantec     Published Date: Aug 09, 2013
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. agentless and agent-based solutions from competing vendors. Specifically, this testing focused on the system resource requirements of each solution when performing on-demand and on-access scanning functions, and during distributed virus definition updates.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
By: HP     Published Date: Jun 09, 2014
Learn about the December 2013 updates to the HP 3PAR StoreServ portfolio in this lastest HP Storage ChalkTalk from HPStorageGuy Calvin Zito.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
By: HP     Published Date: Jun 09, 2014
Learn about the December 2013 updates to the HP 3PAR StoreServ portfolio in this lastest HP Storage ChalkTalk from HPStorageGuy Calvin Zito.
Tags : 
3par storeserv, hp storage, calvin zito, it management, storage
    
HP
By: InsideView     Published Date: Apr 28, 2015
This report is for any B2B marketers who must power up their L2RM processes to achieve new customer acquisition, current customer growth, and overall revenue growth goals. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy; we revised this edition to factor in new ideas and data.
Tags : 
revenue growth, acceleration strategy, b2b marketers, operation processes, lead-to-revenue management, new customer acquisition, customer growth, enterprise applications
    
InsideView
By: Sponsored by Marin Software     Published Date: Aug 11, 2015
Get this free 48 page report and find the best paid media campaign management tool for your organization. Includes vendor profiles and updates on the current trends and issues, including how marketers, search advertisers and vendors are keeping pace with changing ad formats. Download now.
Tags : 
paid media management, ad platforms, search marketing, audience targeting, search tools, marketing campaign, marketing budget, marketing automation
    
Sponsored by Marin Software
By: Microsoft Office 365     Published Date: Jan 21, 2016
What does it mean to “move to the cloud”? In this eBook, we break down myths about the cloud computing and detail what you really need to know when considering Microsoft Office 365. Fill out the form to get your free eBook to learn about: • How the cloud can help you reduce headaches and time maintaining hardware. • How cloud storage is actually safer than on-premise. • How cloud technology and cloud solutions can increase employee productivity. • Advantages of cloud computing and how it allows you to spend less time on software updates and more time building your business.
Tags : 
it management
    
Microsoft Office 365
By: Dell Software     Published Date: Jul 18, 2012
Take the Server Security Management Quiz
Tags : 
secure copy, enterprise security reporter, security explorer, active directory, quiz, server security, scriptlogic, server data
    
Dell Software
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter