Sort results by: Published date | Company name
Showing items 1-25

7 Compliance-Killing Cloud DLP Mistakes [ Source: Skyhigh Networks ]

September 2014- Leverage the substantial time, money, and resources invested in your on premise DLP solutions. This cheat sheet offers critical considerations for applying your DLP policies to cloud services.

PCI DSS Cloud Compliance Cheat Sheet [ Source: Skyhigh Networks ]

August 2014- Learn the Payment Card Industry Data Security Standard (PCI DSS) requirements, penalties, and how you can ensure your cloud programs meet compliance requirements. Steps for securing card data in the cloud include:

Definitive Guide to Cloud Security [ Source: Skyhigh Networks ]

March 2015- The cloud is transforming business for the better. However, given the seemingly endless supply of headlines on data breaches, it's not surprising that data security is now a board-level concern for 61% of organizations. Whether you're just starting to define cloud security processes and policies, or you're reviewing an existing framework, we've put together a guide to walk you through the entire cloud security lifecycle. Based on the framework developed by Gartner for managing cloud security, ...

Cloud Adoption and Risk Report [ Source: Skyhigh Networks ]

March 2015- Based on anonymized usage data from over 17 million users, this Cloud Adoption and Risk Report provides an analysis of the current cloud landscape and security risks posed by sharing data with partners in the cloud. In this report, we focus on partner connections like the one hackers exploited in the $148 million Target breach. Download this report to learn:

Is Hosted VoIP Right for You? 6 Must-Ask Questions [ Source: XO Communications ]

May 2015- Hosted VoIP may appeal to companies that don't want to invest scarce resources in operating their own internal telephony system. However, given the primary role of voice communications for business, companies have to ensure that a provider's service wil meet day-to-day needs and provide excellent reliability. Download this complimentary eBook to discover the six questions that companies must ask and answer before they migrate to a hosted VoIP provider. It also provides insight into how ...

The PBX Dilemma: Hosted or Premises-Based? [ Source: XO Communications ]

May 2015- This infographic weighs the pros and cons of hosted and premises-based PBX solutions and shows you why more businesses of all sizes are choosing to go hosted.

15 Top-Paying IT Certifications for 2015 [ Source: Global Knowledge ]

February 2015- Take a look at some of the top-paying certifications as determined by the more than 11,000 responses to our 2015 IT Skills and Salary Survey of your peers across North America. Certifications in IT security, networking, and systems management are at the top of the certification pay scale. What may surprise you are the business-related certifications holding their own on this year's list.

5 Reasons VMware vSphere 6.0 is a Game Changer [ Source: Global Knowledge ]

February 2015- VMware vSphere 6.0 is packed full of more than 650 technological breakthroughs. It's more powerful, more flexible, more secure and more easily managed than ever before. This white paper focuses on the five main improvements that are the biggest game changers.

10 Ways Everyone Should Approach Cybersecurity in 2015 [ Source: Global Knowledge ]

February 2015- Many security breaches over the last year have taught us new lessons (or clarified ones we should have already learned). This paper reviews these key issues and focuses attention on ten responses we all need to adopt in our approach to security in 2015.

Creating a Common Foundation for the Agile Supply Chain [ Source: GT Nexus ]

March 2015- Today's supply chains are anything but simple. Made up of hundreds of partners spanning continents and oceans, they contain a bewildering number of moving parts. Disruptions—like strikes, natural disasters, economic sanctions, etc.—can bring a supply chain to its knees. Even normal market fluctuations in demand, particularly of today's volatile sort, can cripple a business. The only insurance against this is to create an agile supply chain that can parry unexpected events. ...

Using Communities to Bridge Partitions [ Source: GT Nexus ]

March 2015- Partitions are natural in business. Each employee has a specific role, and each division specializes on a specific product or function within the enterprise. These partitions often become more fragmented over time. Multi-enterprise operations add another dimension to these partitions, one that unnecessarily decreases efficiency while increasing costs. As it relates to transportation management in today's supply chains, a community approach can bridge these partitions, increasing visibility across the supply chain, and addressing the uncertainty ...

Focus on Customer Experience from a Global View of Supply Chain [ Source: GT Nexus ]

March 2015- Customer experience is critical to today's supply chains. Unique supply chain needs require detailed attention. In scenarios where disruptions occurring within a silo impact on-time delivery, companies want to be proactive. The more proactive a company is, the better chance it has of preserving the customer experience. Creating a global connected view means knowing what is happening much further up the chain, so better decisions can be made. A platform approach to transportation management and ...

The High Cost of Down Time: The Solid State Solution [ Source: SanDisk ]

May 2015- Today's highly mobile workforce is not only growing, it's tasked to work in increasingly remote locations while requiring fast laptop connectivity, instant access to business data, smooth multi-tasking and batteries that won't quit. Businesses are looking to IT to create strategies and implement new technologies to satisfy customers and protect profit margins. See how upgrading to more reliable solid-state drives can extend the life of existing systems thus allowing resources to be focused on other ...

Optimizing Storage and Speed in the Film Industry [ Source: SanDisk ]

April 2015- Film budgets grew exponentially in the last half of the 20th century, but the technology did not keep pace. The entertainment industry produces, processes, distributes and preserves large amounts of data along aggressive timelines, and the adoption of new technology solutions such as flash memory and solid-state drives are keys to success -- giving small studios the capacity to produce "big budget" films and large studios the ability to react quickly to control below-the-line variable ...

The Value-Focused CIO: Building the Intelligent Infrastructure [ Source: SanDisk ]

May 2015- IT is falling behind the curve at a time when the workforce is highly mobile and highly dependent on mobile devices and mobile connectivity. BYOD and consumerization lead to greater employee productivity and job satisfaction, but innovation has been inhibited by IT departments that are responsible for critical security and access control.

Learn how to catch up to this transformation by embracing technologies that employees want, while retaining enough control to keep company ...

Are Your Legacy Applications Suitable for the Cloud? 3 Critical Evaluation Activities to Ensure Migration Success [ Source: Riverbed ]

January 2015- Businesses are readily harnessing the advantages of the cloud for critical applications. In fact, 81% of IT leaders are using or are planning to leverage the cloud for these business-centric apps in the next two years.

But while it is easier than ever to deploy or create business applications in the cloud, most enterprises still have critical legacy or in-house developed applications that complicate their migration strategies. After all, not every legacy application is ...

The Human Factor 2015 [ Source: Proofpoint ]

April 2015- Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. Proofpoint developed this report, The Human Factor, to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments, tracking threats in email attachments, social media posts, and URLs.

This paper uses original field research to provide insight on who is clicking, and what they are clicking on, ...

SAP Performance Survey: Lack of Unified Monitoring a Major Factor in Poor Performance of SAP Applications [ Source: Dynatrace ]

September 2014- This survey sheds light on the challenges facing companies when using multiple tools to monitor SAP performance vs. a unified approach that delivers a holistic view of performance across all tiers and supporting infrastructure on a single pane of glass.

Topics include:

The Digital Transformation Journey: Key Technology Considerations [ Source: CA Technologies ]

April 2015- The Internet of Things will include 26 billion units installed by 2020. IoT product and service suppliers will generate incremental revenue exceeding $300 billion, mostly in services, in 2020. It will result in $1.9 trillion in global economic value-add through sales into diverse end markets.**

That's lot of money, and companies like MUFG Union Bank, Nordstrom and Swisscom are ensuring that software applications and services keep them at the forefront of this new reality. Reaching customers ...

In the application economy, DevOps ignites your digital transformation [ Source: CA Technologies ]

April 2015- Welcome to the application economy: a place where your customers are far more likely to experience your brand through software than a live person.

Applications, mobile or otherwise, are reaching critical mass. APIs are a must if you want to integrate and collaborate with others. And, customers expect fast, easy access to your products, services and information. Fail to deliver, and they'll go elsewhere.

To thrive in this new reality, you ...

Mastering Digital Transformation [ Source: CA Technologies ]

April 2015- From app delivery to a multi-channel customer experience - is your DevOps team ready?

Download this infographic to take a closer look at the challenges of the digital transformation, including consumer demand and developer challenges, and learn more about the capabilities needed to achieve multi-channel connectivity.

Customer Engagement in a Multi-Channel World [ Source: CA Technologies ]

April 2015- Enhancing the customer experience across physical and digital boundaries has become a mantra for line-of business managers and a new challenge for IT as the channels for business continue to grow. Not only does that mean building apps faster and better, it means making sure customers are happy - make that amazed - regardless of the channel they are using to interact with a business. Just ask Aruna Ravichandran, Vice President, Product and Solutions Marketing, ...

Beyond Whois: How Extended Domain Profiles Can Yield Unexpected Insights [ Source: DomainTools ]

November 2014- Every investigation has a starting point. A basic Whois query takes just a few seconds but can quickly provide the foundation for a successful investigation However, it's often the data that does NOT reside in a Whois record that can be truly illuminating. Like a CarFax report that goes beyond the vehicle title, there is a wealth of knowledge captured in other public data that can be invaluable to an investigator when leveraged appropriately. This ...

Using DNS Data in Cybercrime Intelligence and Incident Forensics [ Source: DomainTools ]

October 2014- When cybercrime happens, it is imperative to discover as much as possible about the scope of activity and the entity behind the crime. The right set of data and tools can help unmask hostname and IP address ownership, can highlight connections between nefarious online resources and accelerate your investigation into malicious activity and criminal attribution. Read our Cybercrime Investigation Guide to learn how DNS Intel can help you in developing a suspect profile, mapping associated ...

Supercharge Your SIEM: How Domain Intel Enhances Situational Awareness [ Source: DomainTools ]

April 2015- Security Information and Event Management (SIEM) tools have become indispensable for the modern enterprise. These are the eyes and ears of a security team, providing them with the ability to detect network anomalies and track down threats. But even the best SIEM tool falls short when it comes to situational awareness of key "outside the firewall" aspects of an attack. Security professionals have long understood that they must evolve quickly to meet the challenges of ...

Next 25