Sort results by: Published date | Company name
Showing items 1-25

Driving a Data-centric Culture: The Leadership Challenge [ Source: Platfora ]

December 2014- To capture the business benefits of big data, CEOs and their C-level teams face the formidable challenge of transforming how their organizations think about data and what they do to derive relevant and actionable insights from the wealth of information that is increasingly available to them.

The top-down approach they devise and implement for executing their big data strategy is critical to their success, and so is the bottom-up engagement with data analytics ...

Why Security Analysts Can't Live Without Big Data [ Source: Platfora ]

April 2015- Recent high-profile data breaches in financial services, retail, healthcare, and other major industries underscore two things for today's organizations: determined cybercriminals are adept at finding and fully exploiting even the smallest security gap, and detection of their activity often comes much too late - and at great cost for the business.

But with almost no purpose-built tools to help analyze security incidents, detect root causes, and unearth larger attacks before adversaries succeed at ...

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance [ Source: SurfWatch Labs ]

April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance [ Source: SurfWatch Labs ]

April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk [ Source: SurfWatch Labs ]

April 2015- This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this information to determine which cyber insurance options make the most sense based on your business.

Cybersecurity and the C-Suite: How Executives Can Understand Cyber Risks and Ensure Governance [ Source: SurfWatch Labs ]

April 2015- This paper is written for business decision-makers to help understand the risk landscape and learn how to incorporate a sound cyber risk framework that is based on a business intelligence approach.

Big Data, Big Mess: Sound Risk Intelligence Through Complete Context [ Source: SurfWatch Labs ]

April 2015- This paper explores the good, bad and ugly of big data in cybersecurity and provides tips for understanding cyber risk in complete business context that includes your industry sector, infrastructure, company size, supply chain, location, your online presence, and many more factors.

5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain [ Source: SurfWatch Labs ]

April 2015- As business becomes more connected and as data moves further outside the organizational walls, the supply chain has become a critical chink in the security armor. This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.

Creating the It Just Works Video Network [ Source: Sonus Networks ]

November 2013- From the boardroom to the browser, video has become a valuable business tool. When video communications systems work properly, people become more interactive, creative, and productive. Conversely, when video systems fail, they cause delays along with angst and frustration in the people trying to use them. Read this paper to learn more.

Transforming the Enterprise WAN [ Source: Sonus Networks ]

February 2015- This report looks at the business value of dynamic-path networking, flow networking, the "atomic element" of path control, and the opportunity to transform the nature of the WAN so that it can better deliver applications instead of packets. It will help IT executives understand the limitations of packet routing in traditional WAN networks as well as the key factors they should consider when adopting dynamic-path networking.

ABC's of SIP [ Source: Sonus Networks ]

October 2014- Just as analog phone lines evolved to digital, and digital to VoIP, the next evolution in communications is making a rapid push into business communications. Session Initiated Protocol (SIP) can turn your communications network into a strategic asset. Businesses migrating to SIP are able to deploy new productivity enhancing applications and make their network more secure, all while reducing costs. Whether your SIP deployment is scheduled for next month or next year, you need to ...

SIP Trunking for Dummies [ Source: Sonus Networks ]

August 2012- The SIP Trunking for Dummies book gives examples of how how SIP trunking, trunking consolidation, and the move to VoIP can collectively reduce traditional enterprise telecom bills by up to 75%. If you are doing research on making the move to SIP, this is a must read.

Best Practices for Creating the Network-Enabled Cloud [ Source: XO Communications ]

April 2015- Use this step-by-step guide from enterprise technology expert David Linthicum to help improve your network to handle services delivered from multiple clouds. With the right network infrastructure, it is much easier to connect, secure and speed up delivery of all of the cloud applications and services consumed by your organized. No matter where you are in your cloud implementations, learn best practices and strategies in this eBook series focused on Building the Network that Empowers ...

The Role of the WAN in Your Hybrid Cloud [ Source: XO Communications ]

April 2015- Is your WAN ready to support your hybrid cloud? Discover how to prepare your WAN to get the most out of your investment in a hybrid public/private cloud.

Key Tools for Maximizing Your Hybrid Cloud Investment [ Source: XO Communications ]

April 2015- Explore the optimization tools that give you the ability to see and control the performance and security of your WAN traffic, a vital component to your cloud success. Among other things, these tools help you counteract the effects of latency introduced by geographical WAN distances and allow you to alleviate network congestion that might results from sending a lot large files and retransmitting dropped packets.

The Top 5 Ways Hosted PBX with Unified Communications Can Help Your Enterprise [ Source: XO Communications ]

April 2015- When voice moves into the cloud, enterprise communications rapidly becomes a strategic function that drives revenue. A reliable, business-grade solution that integrates Voice over IP with hosted Unified Communications can help you lower total cost ofownership,enable self-management,improve productivity,streamline business continuity and free up IT resources to focus on more important requirements. Read how Hosted PBX with Unified Communications can help your enterprise integrate complex voice and IT environments, centralize voice applications, and ...

Is Your Phone System Holding You Back? [ Source: XO Communications ]

April 2015- Enterprise communications is at a critical juncture. Employees require the very best mobility and collaboration tools while IT struggles with tight budgets and lean staffing. Read this paper to learn about these looming challenges and how hosted PBX with Unified Communications can help you address these issues, paving the way for better enterprise communications.

Decision Guide: Hosted vs. Premises-based Unified Communications Solutions [ Source: XO Communications ]

April 2015- Unified Communications offers a host of benefits to SMBs and large enterprises alike. But every organization needs to determine whether a premises-based UC solution or a cloud-based hosted service is the best fit for its own situation. This decision guide takes you through a list of important considerations to help you do just that.

How to Prevent Security Breaches in Your Retail Network [ Source: Dell SonicWALL ]

April 2015- In today's era of multi-vector attacks, IT security for retail requires more than blocking threats at the perimeter. Cutting-edge IT managers are now adopting a multilayer security blueprint to detect intrusions inside the network. Find out how you can do the same for your retail environment.

INFOGRAPHIC: Software-defined Storage Redefined [ Source: Hedvig ]

April 2015- The exponential growth of data along with demands for data accessibility anywhere at any time are mounting pressure on IT organizations to find a new model. Hedvig, an emerging software-defined storage player, is focused on delivering a new level of storage flexibility and scalability along with the capabilities necessary to supplant traditional storage arrays by moving functionality to software. Download this infographic to learn key statistics, concerns and solutions around data center modernization that justify ...

Meet Evolving Business Demands With Software-Defined Storage [ Source: Hedvig ]

April 2015- As companies expand, they inevitably face challenges with how to best manage their growing volume of business data and content, while at the same time ensuring they have capacity for continued expansion. In large enterprises especially, business silos create major challenges for companies trying to make the most out of their storage capacity through optimization of current infrastructure. These challenges, among others, commonly prevent businesses from creating improved storage infrastructure that provides better integration, scalability, ...

Evolved Software-defined Storage (Solution Showcase) [ Source: Hedvig ]

April 2015- Over recent years, software-defined storage has often seemed to be equal parts reality and hype. Multiple solutions are leveraging the moniker with different definitions, providing value in different ways, and targeting different markets. One segment of software-defined storage technologies is intended to disrupt traditional storage array solutions by delivering (traditional) storage array capabilities as pure software with the potential for significant gains in enhanced flexibility and affordability. Traditional storage architectures were designed for the old ...

Shellshock and Future Vulnerabilities - Buying Precious Time [ Source: Dell SonicWALL ]

April 2015- Shellshock wasn't the first widespread network vulnerability to grab headlines, and it won't be the last. Find out how attackers are able to exploit your network vulnerabilities, and how IT managers and network administrators can be better prepared.

Rules of Engagement: A Call to Action to Automate Breach Response [ Source: Digital Guardian ]

December 2014- This Forrester report is a call to action for a more automated threat response process based on developing a set of cyber "rules of engagement" that will empower security teams to act more quickly and aggressively to stop data breaches before they can threaten the business.

Dealing with Data Breaches and Data Loss Prevention [ Source: Proofpoint ]

April 2015- As data grows and organizations become more vast, the risk of sensitive data being breached increases at an alarming pace. With data breaches making the headlines more than ever, organizations are forced to consider the safety of their data, the policies they have in place to protect it, and the strategies and tools at their disposal for breach mitigation.

Download the latest research report from Osterman Research, Inc., Dealing with Data Breaches and ...

The New Phishing Threat: Phishing Attacks [ Source: Proofpoint ]

April 2015- The threat of email borne attacks is greater than ever with malware volumes increasing drastically. One of the most common, and difficult to detect, email threats comes in the form of phishing and spear-phishing emails.

Historically, phishing attacks targeted end-users with attackers going after credentials to financial accounts. But modern phishing attacks have evolved toward targeting sensitive corporate data as evidenced by the high profile data breaches targeted at diverse organizations including RSA ...

Next 25