• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

hr infrastructure

Results 1 - 25 of 280Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe
By: Aerohive     Published Date: May 14, 2015
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
mobile computing, mobile data systems, mobile workers, wireless infrastructure, wireless phones
    
Aerohive
By: Ahead     Published Date: Jun 05, 2019
Digital Business Continues to Move the Cyber Goal Posts Fortune magazine estimates that by the year 2020, US companies will spend $101 billion per year on cyber security, up 38% from 2016. With all of the money being invested in cyber security, why do the pace and complexity of new security threats continue to rise year after year? A big reason is that today’s digital business involves a more mobile workforce with expectations of immediate and on demand access to data fronted by intuitive and engaging user experiences, and often underpinned by public cloud infrastructure for increased agility and time to market.
Tags : 
    
Ahead
By: Akamai Technologies     Published Date: Sep 27, 2016
How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale—you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
Tags : 
akamai, web, dns, infrastructure security, sql, cloud security solution, networking, security, knowledge management, enterprise applications
    
Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
By: AlienVault     Published Date: Mar 30, 2016
The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Tags : 
    
AlienVault
By: Altiscale     Published Date: May 28, 2015
Big Data technologies are maturing and quickly moving into the next phase - one that expands in data use-cases as Hadoop moves into more influential roles throughout IT infrastructures. In this just-released report, Gartner is recognizing four Big Data vendors as "cool." Gartner says these vendors can meaningfully and synergistically combine multiple types of functionality.
Tags : 
big data, vendors, functionality, cool vendors, consistent performance, it management, data management; add - gartner, hadoop, data management
    
Altiscale
By: Amazon Web Services APAC     Published Date: Sep 19, 2019
This paper examines how cities are using cloud technology to address public challenges, using the framework of the global coalition, Smart Cities Council. This framework promotes three core values for smart cities: livability, providing clean, healthy living conditions without pollution and congestion; workability, providing an enabling infrastructure (energy, transportation, internet connectivity) and high-quality jobs; and sustainability, doing so at no cost to future generations, as the Council puts it. This paper proposes a fourth core value, inclusivity: provisioning services to all city residents regardless of their background.
Tags : 
    
Amazon Web Services APAC
By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention, security management, vulnerability management
    
Arbor
By: Avanade DACH     Published Date: Jan 08, 2019
To compete in today’s world, business leaders are placing increased demands on IT. Unfortunately, many IT departments are not able to deliver future innovation with their current infrastructure, applications and processes. To meet these demands, IT must digitally transform the enterprise through the adoption of cloud native practices, allowing them to both optimize and transform their existing infrastructure and applications. Recent Avanade research supports this thinking, finding that 88% of senior IT decision-makers believe that IT modernization is crucial to addressing the emerging requirements of the digital business1 . On the upside, those surveyed also indicated that by modernizing their IT infrastructures they expect to deliver real business results, such as boosting annual revenue by 14%, while at the same time reducing business operating costs by 13%1 . For many, this sounds like a winning strategy but what does it mean to adopt cloud native approaches, and how does it impact
Tags : 
    
Avanade  DACH
By: Avaya     Published Date: Jul 18, 2018
Digital Transformation: Insight into Getting it Right, is new research commissioned by Avaya and undertaken by IDC. The Infobrief contains key insights from over 1,300 enterprises and consumers to help brands plan and improve digital transformation, specifically through the modernisation of business communications infrastructure. Because business communications technology is at the heart of digital transformation.
Tags : 
    
Avaya
By: Avaya     Published Date: Nov 07, 2018
Digital Transformation: Insight into Getting it Right, is new research commissioned by Avaya and undertaken by IDC. The Infobrief contains key insights from over 1,300 enterprises and consumers to help brands plan and improve digital transformation, specifically through the modernisation of business communications infrastructure. Explore why business communications technology needs to be at the heart of your digital transformation journey.
Tags : 
    
Avaya
By: Avaya     Published Date: Mar 15, 2019
Digital Transformation: Insight into Getting it Right, is research commissioned by Avaya and undertaken by IDC. The Infobrief contains key insights from over 1,300 enterprises and consumers to help brands plan and improve digital transformation, specifically through the modernization of business communications infrastructure. Because business communications technology is at the heart of digital transformation.
Tags : 
    
Avaya
By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS
By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS
By: B Channels     Published Date: Apr 27, 2018
This paper differentiates between three trending cloud infrastructures - Hybrid Cloud, MultiCloud & Hybrid Multicloud. Download to discover what is best for your business.
Tags : 
    
B Channels
By: Birst     Published Date: Jul 16, 2013
This whitepaper first looks at the fundamental requirements that a BI solution should deliver to your company. Next, this whitepaper covers the 11 Key Questions that you should be asking of a future BI technology partner. When the BI provider can answer Yes to all of these questions, you have BI that is capable of fulfilling your analytical and reporting needs .
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
By: Birst     Published Date: Jul 16, 2013
Discover seven indications that you need advanced analytics for your CRM application and why they matter. Learn about common CRM data analysis pain points and how advanced CRM analytics can solve them.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
By: Birst     Published Date: Jul 16, 2013
Covering 23 vendors and 5 market segments, the 2013 Wisdom of Crowds Business Intelligence Market Study helps readers understand the current market landscape including the perceptions and plans of organizations adopting BI solutions, the latest user trends and technology.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
By: Birst     Published Date: Jul 16, 2013
This BI guide has 10 real-life business scenarios that will elicit your business intelligence requirements in plain English. Key stakeholders and executive sponsors will get an easy-to-digest view of business intelligence requirements without getting into the details.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology, networking, enterprise applications
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
security, data, users, infrastructure, bluecoat, application security
    
Blue Coat Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter