Sort results by: Published date | Company name
Showing items 1-25

Best Practices for Dealing with Phishing and Next-Generation Malware [ Source: ThreatTrack Security ]

April 2015- Despite the billions of dollars spent each year on anti-phishing, anti-malware, antianti- spam and other security solutions, threats still find their way into most organizations despite the best efforts of security teams to stop them. In fact, for many organizations the problem is actually getting worse over time. The consequences of these incursions can be severe, and in some extreme cases cause a business to go bankrupt.

Cybercriminals Wreak Havoc Beyond Big Enterprises [ Source: ThreatTrack Security ]

April 2015- Breaches at large enterprises grab headlines, but cybercriminals are developing a taste for smaller businesses. The mid-market (companies with 500 to 2,500 employees) is becoming fertile ground for cybercriminals looking to exploit unsuspecting organizations with valuable data to steal and much more to lose.

IDG: Why Application Security is a Business Imperative [ Source: Veracode ]

April 2015- The harsh reality is that most internally developed applications are not assessed for critical security vulnerabilities such as SQL injection. IDG Research Services recently surveyed top IT and security executives at enterprises across a variety of industries in the U.S., U.K. and Germany to better understand the enterprise security landscape. This paper examines the survey results.

Know Your Data Forward, Backward, and Sideways [ Source: Platfora ]

March 2015- It's an exciting time to be a business analyst. Businesses are gathering more data than ever before, and everyone wants to know what it means and how it can drive change.

Read this ebook to learn about the radical changes occurring within big data analysis, and how data-driven business analysts are transforming the way companies view and act on data. What you'll learn from reading this eBook:

Driving a Data-centric Culture: The Leadership Challenge [ Source: Platfora ]

December 2014- To capture the business benefits of big data, CEOs and their C-level teams face the formidable challenge of transforming how their organizations think about data and what they do to derive relevant and actionable insights from the wealth of information that is increasingly available to them.

The top-down approach they devise and implement for executing their big data strategy is critical to their success, and so is the bottom-up engagement with data analytics ...

Why Security Analysts Can't Live Without Big Data [ Source: Platfora ]

April 2015- Recent high-profile data breaches in financial services, retail, healthcare, and other major industries underscore two things for today's organizations: determined cybercriminals are adept at finding and fully exploiting even the smallest security gap, and detection of their activity often comes much too late - and at great cost for the business.

But with almost no purpose-built tools to help analyze security incidents, detect root causes, and unearth larger attacks before adversaries succeed at ...

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance [ Source: SurfWatch Labs ]

April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance [ Source: SurfWatch Labs ]

April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk [ Source: SurfWatch Labs ]

April 2015- This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your business.

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance [ Source: SurfWatch Labs ]

April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context [ Source: SurfWatch Labs ]

April 2015- This paper explores the good, bad and ugly of big data in cybersecurity and provides tips for understanding cyber risk in complete business context that includes your industry sector, infrastructure, company size, supply chain, location, your online presence, and many more factors.

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain [ Source: SurfWatch Labs ]

April 2015- As business becomes more connected and as data moves further outside the organizational walls, the supply chain has become a critical chink in the security armor. This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

Creating the It Just Works Video Network [ Source: Sonus Networks ]

November 2013- From the boardroom to the browser, video has become a valuable business tool. When video communications systems work properly, people become more interactive, creative, and productive. Conversely, when video systems fail, they cause delays along with angst and frustration in the people trying to use them. Read this paper to learn more.

Transforming the Enterprise WAN [ Source: Sonus Networks ]

February 2015- This report looks at the business value of dynamic-path networking, flow networking, the "atomic element" of path control, and the opportunity to transform the nature of the WAN so that it can better deliver applications instead of packets. It will help IT executives understand the limitations of packet routing in traditional WAN networks as well as the key factors they should consider when adopting dynamic-path networking.

ABC's of SIP [ Source: Sonus Networks ]

October 2014- Just as analog phone lines evolved to digital, and digital to VoIP, the next evolution in communications is making a rapid push into business communications. Session Initiated Protocol (SIP) can turn your communications network into a strategic asset. Businesses migrating to SIP are able to deploy new productivity enhancing applications and make their network more secure, all while reducing costs. Whether your SIP deployment is scheduled for next month or next year, you need to ...

SIP Trunking for Dummies [ Source: Sonus Networks ]

August 2012- The SIP Trunking for Dummies book gives examples of how how SIP trunking, trunking consolidation, and the move to VoIP can collectively reduce traditional enterprise telecom bills by up to 75%. If you are doing research on making the move to SIP, this is a must read.

Best Practices for Creating the Network-Enabled Cloud [ Source: XO Communications ]

April 2015- Use this step-by-step guide from enterprise technology expert David Linthicum to help improve your network to handle services delivered from multiple clouds. With the right network infrastructure, it is much easier to connect, secure and speed up delivery of all of the cloud applications and services consumed by your organized. No matter where you are in your cloud implementations, learn best practices and strategies in this eBook series focused on Building the Network that Empowers ...

The Role of the WAN in Your Hybrid Cloud [ Source: XO Communications ]

April 2015- Is your WAN ready to support your hybrid cloud? Discover how to prepare your WAN to get the most out of your investment in a hybrid public/private cloud.

Key Tools for Maximizing Your Hybrid Cloud Investment [ Source: XO Communications ]

April 2015- Explore the optimization tools that give you the ability to see and control the performance and security of your WAN traffic, a vital component to your cloud success. Among other things, these tools help you counteract the effects of latency introduced by geographical WAN distances and allow you to alleviate network congestion that might results from sending a lot large files and retransmitting dropped packets.

The Top 5 Ways Hosted PBX with Unified Communications Can Help Your Enterprise [ Source: XO Communications ]

April 2015- When voice moves into the cloud, enterprise communications rapidly becomes a strategic function that drives revenue. A reliable, business-grade solution that integrates Voice over IP with hosted Unified Communications can help you lower total cost ofownership,enable self-management,improve productivity,streamline business continuity and free up IT resources to focus on more important requirements. Read how Hosted PBX with Unified Communications can help your enterprise integrate complex voice and IT environments, centralize voice applications, and ...

Is Your Phone System Holding You Back? [ Source: XO Communications ]

April 2015- Enterprise communications is at a critical juncture. Employees require the very best mobility and collaboration tools while IT struggles with tight budgets and lean staffing. Read this paper to learn about these looming challenges and how hosted PBX with Unified Communications can help you address these issues, paving the way for better enterprise communications.

Decision Guide: Hosted vs. Premises-based Unified Communications Solutions [ Source: XO Communications ]

April 2015- Unified Communications offers a host of benefits to SMBs and large enterprises alike. But every organization needs to determine whether a premises-based UC solution or a cloud-based hosted service is the best fit for its own situation. This decision guide takes you through a list of important considerations to help you do just that.

How to Prevent Security Breaches in Your Retail Network [ Source: Dell SonicWALL ]

April 2015- In today's era of multi-vector attacks, IT security for retail requires more than blocking threats at the perimeter. Cutting-edge IT managers are now adopting a multilayer security blueprint to detect intrusions inside the network. Find out how you can do the same for your retail environment.

INFOGRAPHIC: Software-defined Storage Redefined [ Source: Hedvig ]

April 2015- The exponential growth of data along with demands for data accessibility anywhere at any time are mounting pressure on IT organizations to find a new model. Hedvig, an emerging software-defined storage player, is focused on delivering a new level of storage flexibility and scalability along with the capabilities necessary to supplant traditional storage arrays by moving functionality to software. Download this infographic to learn key statistics, concerns and solutions around data center modernization that justify ...

Meet Evolving Business Demands With Software-Defined Storage [ Source: Hedvig ]

April 2015- As companies expand, they inevitably face challenges with how to best manage their growing volume of business data and content, while at the same time ensuring they have capacity for continued expansion. In large enterprises especially, business silos create major challenges for companies trying to make the most out of their storage capacity through optimization of current infrastructure. These challenges, among others, commonly prevent businesses from creating improved storage infrastructure that provides better integration, scalability, ...

Next 25