archer

Results 1 - 25 of 53Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 14, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Tags : 
    
Cisco EMEA
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: Epicor     Published Date: Sep 20, 2017
When determining which investments to make in their technology infrastructure, organizations will often choose to make no changes at all. While this decision avoids short-term costs and business disruption, it often simply delays the inevitable—even making it worse. The cost of doing nothing is expensive in the long term. This report—from the independent researchers at Aberdeen Group—outlines the reasons distributors choose not to upgrade enterprise resource planning (ERP) software and cautions against this approach, supplying detailed research that illustrates the benefits of keeping your systems current. Download this report to learn how a new or improved ERP system can help get you the information you need to make informed decisions and act more efficiently, improving overall company performance.
Tags : 
erp software, enterprise resource planning software
    
Epicor
Published By: Siemens     Published Date: Jun 02, 2016
Researchers of occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns.
Tags : 
siemens, arc defense, fault-resistant, medium voltage, electronics
    
Siemens
Published By: Cisco     Published Date: Mar 17, 2017
There’s a war being waged on all our networks, and security researchers around the world are on the front lines. Here’s the inside story of how our elite security-research team neutralized one of the biggest threats in years.
Tags : 
cyersecurity, security, treat and vulnerability management, networks, cybercriminals, attacks
    
Cisco
Published By: Oracle     Published Date: Aug 09, 2013
This e-book draws on the insights of independent researchers, Oracle Human Capital Management (HCM) product and industry experts, and Oracle HCM customers. It aims to provide both inspiration and practical roadmaps to simplify workforce management, build the best talent, and help HR leadership make a major contribution to their companies’ overall success.
Tags : 
driving, hcm, oracle
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
This e-book draws on the insights of independent researchers, Oracle Human Capital Management (HCM) product and industry experts, and Oracle HCM customers. It aims to provide both inspiration and practical roadmaps to simplify workforce management, build the best talent, and help HR leadership make a major contribution to their companies’ overall success.
Tags : 
driving, hcm, oracle, enterprise applications, human resource technology, business technology
    
Oracle
Published By: VMware     Published Date: Jul 01, 2016
Higher education is in the midst of fundamental changes that are reshaping the future of both the mission and the business. As technology helps campuses better reach beyond their traditional physical borders, decision-makers expect IT to offer the solutions and leadership needed to deliver better services to students, staff, and researchers while simplifying IT costs and responsibilities. This solution brief addresses how vCloud Air built on the popular vSphere virtualization platform, is helping higher education IT respond to today’s performance, manageability, and security challenges.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
    
VMware
Published By: Pure Storage     Published Date: Nov 02, 2017
The evolution of genomics in recent decades has seen the volume of sequencing rise dramatically as a result of lower costs. Massive growth in the quantities of data created by sequencing has greatly increased analytical challenges, and placed ever-increasing demands on compute and storage infrastructure. Researchers have leveraged high-performance computing environments and cluster computing to meet demands, but today even the fastest compute environments are constrained by the lagging performance of underlying storage.
Tags : 
big data, simple, fast, multi dimensional performance, eliminate complexity, lower tco, innovation
    
Pure Storage
Published By: EMC     Published Date: Apr 18, 2013
Read the Forrester Report: The Total Economic Impact of RSA Archer IT GRC and you'll be eligible to receive a free consultation from an RSA GRC expert who will calculate the projected ROI for your organization.
Tags : 
grc, rsa, archer, roi, compliance, risk, risk management
    
EMC
Published By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : 
risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc
    
EMC
Published By: EMC     Published Date: Apr 18, 2013
See for yourself how easy it is to implement RSA Archer Business Continuity Management & Operations right out of the box. Try it free for 30 days, then take advantage of the special purchase offer through 7/31/13.
Tags : 
    
EMC
Published By: RSA Security     Published Date: Nov 06, 2013
See a visual representation of the GRC framework needed within an organization to meet today's governance, risk and compliance needs, as well as how an organization should view GRC, its guiding principles and final objectives.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
This paper discusses the value of operational technologies while acknlowledging there is a "value ceiling" for some niche tools, highlighting the opportunity to seek broader value as part of the GRC program maturity process.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
This business continuity white paper will help you address which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
This paper illustrates the major challenges faced by today's Federal IA professionals, and offers solutions, along with ROI for each of those challenges.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC, was positioned by Gartner in the Leader’s quadrant of the 2013 Magic Quadrant for Business Continuity Management Platforms based on completeness of vision and ability to execute.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC has received the highest rating of “Strong Positive” in Gartner MarketScope for IT Governance, Risk & Compliance Management (IT GRC) 2013 for the fifth consecutive time.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC, was positioned by Gartner in the Leader’s quadrant of the 2013 Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms based on completeness of vision and ability to execute.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 18, 2013
This paper will explain how to achieve a balance between risk and business agility through a comprehensive approach to Operational Risk Management.
Tags : 
archer, rsa, operational risk, security, technology, business agility, comprehensive approach
    
RSA Security
Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
    
Vectra Networks
Published By: Intel     Published Date: Nov 29, 2016
Just after the turn of the decade researchers are predicting there will be somewhere north of 24 million subscriptions to next generation 5G networking services. Today most of those services are little more than pilot projects. But thanks to emerging network function virtualization (NFV) software running on Mobile Edge Computing (MEC) platforms enabled by Intel most of those 5G services should be in production before the end of the decade. Come learn how MEC platforms are about to transform every corner of the networking world to not only drive the creation of a vast array of new IT services, but also make networks more agile and responsive than anyone ever thought possible.
Tags : 
    
Intel
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Ask anyone in business, higher education or the medical community what their top objectives are and they’ll probably say it’s to achieve more, to solve more problems, faster than what’s possible now, while saving money in the process. Ask what’s holding them back and you’ll probably find a diverse variety of obstacles in their day-to-day work processes that hinder them in meeting those goals. Having the right tools to do the job is one crucial element in solving problems and becoming more efficient and productive. Additive manufacturing, widely known as 3D printing, is one of those tools that has helped businesses, educators, health care providers and researchers improve how they design, manufacture and perform research. While no tool is an all-in-one solution, 3D printing is a strong step in that direction, particularly in its most sophisticated forms. 3D printing makes it possible to manufacture things that aren’t feasible with traditional processes like machining or injection moldi
Tags : 
    
Stratasys EMEA
Published By: BlueArc Corporation     Published Date: Apr 24, 2008
The crisis of mass power consumption in the corporate data center has come to a head. Power required to run data centers in the U.S. is estimated to be as much as that produced by five power plants in a year. Energy expenditures and requirements have doubled in the last five years, and computer disposal is the fastest growing type of waste in the world, according to top Stanford researchers and Greenpeace.
Tags : 
bluearc, green, green computing, energy, energy efficient
    
BlueArc Corporation
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com