• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

pts

Results 1 - 25 of 344Sort Results By: Published Date | Title | Company Name
By: Fidelis Cybersecurity     Published Date: May 15, 2019
Cybercriminals have been upping their game this year; the use of file-less attacks with macros and PowerShell scripts to evade preventive defenses and sandboxes mean that they are getting better than ever at using phishing, social engineering and drive-by techniques to gain initial footholds in private domains – and once they arrive, they are often avoiding detection for extended periods of time. Between April and July 2018, Fidelis interviewed over 580 security professionals from around the globe to understand how they are shifting their detection strategies and how confident organizations are in their ability to not only prevent targeted attacks – but root out threats that have by-passed traditional preventive defenses.
Tags : 
    
Fidelis Cybersecurity
By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy, compliance, email security, intrusion prevention, best practices, data protection
    
M86 Security
By: M86 Security     Published Date: Feb 09, 2011
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security
By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
By: Office Depot     Published Date: Dec 01, 2015
Read this free infographic to learn three key concepts of workplace design for creating a comfortable workplace that inspires creativity and productivity.
Tags : 
workplace design, creativity, human resources, collaboration, collaborative commerce
    
Office Depot
By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
By: OutSystems     Published Date: Jul 15, 2014
Anyone with a mobile device these days knows all about the seemingly never-ending procession of new applications for smartphones, tablets and anything else people can carry in their pockets, purses or bags. And while apps are extremely popular, there’s also been failure with millions of attempts to build mobile applications for both business and consumer use. How can the mistakes be avoided? We asked several experts in the eld to outline some of the top pitfalls of mobile application development and how teams can avoid them to build a useful, innovative app that enables and empowers as many potential end-users as possible.
Tags : 
outsystems, applications, strategic business, innovation, app development, mobile, it management
    
OutSystems
By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : 
physician, revenue cycle, technology, physician compensation, billing, reimbursement
    
Allscripts
By: Amazon Web Services     Published Date: Jun 02, 2017
451 Research ist ein herausragendes IT-Forschungs- und Beratungsunternehmen. Mit der Gewichtung auf technologischer Innovation und Marktstörung liefert es wichtige Erkenntnisse für führende Unternehmen der digitalen Wirtschaft. Mehr als 100 Analysten und Berater stellen diese Erkenntnisse durch syndizierte Forschung, Beratungsdienste und Live-Events für über 1.000  undenorganisationen in Nordamerika, Europa und auf der ganzen Welt bereit. 451 Research wurde im Jahr 2000 mit Hauptsitz in New York gegründet und ist ein Geschäftsbereich von The 451 Group.
Tags : 
cloud, cloud platform, amazon, aws, microsoft
    
Amazon Web Services
By: Microsoft Office 365     Published Date: Apr 05, 2016
Download the ebook, “5 Biggest CIO Communications Problems, Solved”, to learn how Office 365 addresses these common pain points: Change disrupts business as usual It costs time and money to implement new solutions Incompatibility can wreak havoc The risks seem high while the benefits are unclear I need a solution that addresses my teams' unique needs
Tags : 
    
Microsoft Office 365
By: Microsoft Office 365     Published Date: Apr 14, 2016
Download the ebook, “5 Biggest CIO Communications Problems, Solved”, to learn how Office 365 addresses these common pain points: Change disrupts business as usual It costs time and money to implement new solutions Incompatibility can wreak havoc The risks seem high while the benefits are unclear I need a solution that addresses my teams' unique needs
Tags : 
    
Microsoft Office 365
By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
    
Coyote Point Systems
By: Websense     Published Date: Jul 08, 2014
This paper provides 5 essentials for protecting against advanced persistent threats (APTS)
Tags : 
apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security, intrusion detection, intrusion prevention, web service security
    
Websense
By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises, networking, security
    
Cisco
By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
If your bank is like many, it encrypts only a minimum of data. This is because many banks believe, incorrectly, that encrypting all data is unworkably cost- and resource-intensive on any platform. Encrypting piecemeal creates the need to carefully track where you are encrypting, what you are encrypting, and the time and resource costs of these activities.
Tags : 
    
Group M_IBM Q2'19
By: POS Supply     Published Date: Jun 24, 2011
Sales receipts as a marketing tool
Tags : 
receipt marketing, point-of-sale marketing, printed receipts
    
POS Supply
By: IBM     Published Date: Aug 22, 2014
This white paper introduces the key concepts and challenges of IT governance and introduces the reader to the IT governance solution provided by IBM.
Tags : 
risk analytics, business analytics, it governance
    
IBM
By: IBM     Published Date: Jan 20, 2015
An introduction to the key concepts and challenges of IT governance and how these can be efficiently approached and mitigated with IBM® OpenPages® IT Governance.
Tags : 
business risk, it governance, it risk management, kpis, it policies
    
IBM
By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics
By: Emotive Brand     Published Date: Jan 27, 2010
The concepts of "brand" and "reputation" are often seen as one and the same. However, when viewed separately, significant opportunities arise to improve both. The road to successful branding has never been more complex or challenging. What started, as a one-way lane going directly from the manufacturer's door to the buyer's door is now an everexpanding, two-way, multi-lane superhighway with intersections, tollbooths, and rest stops.
Tags : 
emotive brands, reputation, branding, brand
    
Emotive Brand
By: Optimizely     Published Date: Jun 05, 2017
Learn about statistical significance, statistical error, and the concepts behind Optimizely’s Stats Engine: - Best practices for running your experiments to statistical significance - Tips for communicating results, optimizing low-traffic pages, using confidence intervals, and more - How Optimizely is creating an always-valid view of statistical significance
Tags : 
optimizely, online experiments, statistics, statistical significance, optimizely stats engine
    
Optimizely
By: Abacus Labs     Published Date: Jul 25, 2018
We’ve all been there: staring at a pile of receipts at the end of a business trip, dreading the process of filling out a report just to get your money back. Wouldn’t it be great if all your expenses automatically entered into the system and you got reimbursed the next day? At Abacus, we thought so too. Meet real time expense reporting.
Tags : 
abacus, sales, report, system
    
Abacus Labs
By: RES Software     Published Date: Jul 11, 2012
In this web seminar you'll learn how RES Software will help to find the perfect balance between your needs and those of your clinicians, administrators and regulators. Healthcare professionals will be able to access applications and data in any system, via multiple devices and from wherever they need: operations rooms, wards, clinics or even at home, without putting compliance requirements at risk.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, it clinicians
    
RES Software
By: IBM     Published Date: Aug 24, 2017
Data governance is all about managing data, by revising that data to standardize it and bring consistency to the way it is used across numerous business initiatives. What’s more, data governance ensures that critical data is available at the right time to the right person, in a standardized and reliable form. A benefit that fuels better organization of business operations, resulting in improved productivity and efficiency of that organization. Thus, the importance of proper data governance cannot be understated. The concepts of data governance have evolved, where the first iteration of data governance, often referred to as version 1.0, focused on three simplistic elements: objectives, structure and processes; having a limited focus and scope due to its tactical usage. The opportunity from the growing value of data in the realm of analytics, business intelligence, and generating insights was left unrealized. Today, organizations are moving towards what can be called Data Governance 2.0,
Tags : 
ibm, unified governance strategy, data management, data governance
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter