data

Results 126 - 150 of 10247Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Apr 11, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions’ ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: NetApp     Published Date: Mar 06, 2018
The company’s recently unveiled HCI platform leverages SolidFire’s all-flash scale-out architecture and performance management capabilities to support enterprise environments. Will it help NetApp make up ground against its fast-growing rivals?
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 06, 2018
Gartner Report: Competitive Landscape for Hyperconverged Integrated Systems. Accelerate business outcomes and achieve growth with hyperconverged integrated systems (HCIS). Key findings: As the hyperconverged integrated system (HCIS) market has matured in the past two years, some smaller providers without sufficient bases, technical resources and cash to survive on their own have exited the market." • "HCIS-only providers that have a sustainable sales advantage based on effective communication of technical strengths that can deliver superior cost savings or performance advantages are most likely to remain viable as the market continues to grow." • "HCIS providers without compelling value propositions to differentiate their offerings against other HCIS solutions are unlikely to survive the increasing competitive pressure that is appearing in the market."
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 06, 2018
This Gartner Report on an effective hyperconvergence strategy includes their research findings and recommendations. It also includes a deep dive analysis of key determinants in a hyperconverged solution decision. For more information, please view our privacy policy here.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 06, 2018
This Hyper Converged Infrastructure solution brief describes the key benefits of NetApp's next generation HCI solution including enterprise scale, efficient storage architecture, trustworthy data services, and IT operations transformation.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 06, 2018
Read the Industry Update from Evaluator Group to learn what a transforming NetApp means not just for NetApp, but for a data-driven world.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 06, 2018
This ESG report commissioned by NetApp provides insight to understand converged and hyperconverged platforms.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Redstor UK     Published Date: Mar 12, 2018
Backup and recovery have been a constant for organisations over the years, often not seen as glamorous aspects of an IT environment but as solutions that are necessary all the same. Environments have changed over the years and the focal use for backups have changed with them, although your solutions may not have. Taking a simple off-site backup, whether this be to disk, tape or other removable media, would once have been the last line of defence for data protection. Solutions were reliable and ensured data could be recovered in a timely manner.
Tags : 
recovery, backup, infrastructure, security, data
    
Redstor UK
Published By: Redstor UK     Published Date: Mar 12, 2018
A majority of businesses have adopted digital platforms across multiple channels and in many cases successfully utilised them to drive efficiency and profitability. Technology, and the data that often underpins it, has become an extremely valuable asset for businesses of all sizes. The way that companies do business has also changed and technology has played a key role in this, customers now expect instant gratification and a service model that suits their specific needs. This paper will analyse the cause and effect of companies implementing digital transformation strategies and understand the role of cloud technologies within this. It will also explore some of the wider aspects of business transformation and the journey’s businesses take to implement innovative technologies.
Tags : 
digital, transformation, innovation, cloud, business, optimization
    
Redstor UK
Published By: IBM     Published Date: Apr 03, 2018
Can your database systems handle data growth and keep up with performance requirements? Here are six reasons to change.
Tags : 
database systems, data management, hybrid data
    
IBM
Published By: IBM     Published Date: Apr 03, 2018
This paper gives key considerations when making a strategic commitment to a database platform.
Tags : 
data management, cloud, database platform
    
IBM
Published By: IBM     Published Date: Apr 03, 2018
The next generation of IBM Db2 helps organizations get more value from their big data to improve their IT economics.
Tags : 
ibm, data management, db2
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
Client-ready, globally applicable, a document setting out the IBM journey to GDPR Readiness
Tags : 
gdpr, data, cloud, governance
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
By leveraging the comprehensive capabilities in Information Governance Catalog, you are better able to align IT with your business goals.
Tags : 
cloud, governance, trusted data
    
IBM
Published By: IBM     Published Date: Apr 13, 2018
New survey reveals the challenges organizations face in integrating data and their priorities for improving data integration.
Tags : 
data integration, data, cloud
    
IBM
Published By: Mimecast     Published Date: Apr 13, 2018
In February 2018, mandatory database laws went into effect in Australia. ultimately these laws are about protecting average Australians’ data from criminal organizations. Equifax and the Red Cross were recent victims of these attacks. Watch now to learn more about how these laws will affect your business as you make changes to protect your customers’ data.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 13, 2018
Over the last few years government agencies have been concerned with protection of personal data and consequences of data breaches on business and citizens. That’s driven businesses to look how rules and regulations can help guide organizations to build systems and processes that protect peoples data. Watch now to learn more.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. Mimecast’s proven portfolio of cloud-based, security and cyber resilience services for email can be a vital component of any organisation’s Notifiable Data Breaches compliance strategy
Tags : 
    
Mimecast
Published By: Thomson Reuters     Published Date: Mar 08, 2018
Many seasoned attorneys will agree that remediating an enormous amount of documentation to ensure regulatory compliance is no easy feat. The volume of repapering necessary for compliance with the new rules governing margin requirements for non-centrally cleared derivatives (UMR) presented new challenges, exposed structural weaknesses, and provided many lessons learned which can be applied to any documentation remediation effort. Many UMR initiatives suffered significant hurdles that contributed to delays and missed deadlines. Common among the various challenges faced were the dearth of talent in the quantities needed, and the limited technology and data management solutions utilized.
Tags : 
legal. umr, project, management, alsp, thomson, reuters
    
Thomson Reuters
Published By: Genesys     Published Date: Feb 21, 2018
Routing is a fundamental component of your customer experience strategy. True omnichannel routing breaks down channel silos and gathers intelligence upfront through context and data to deliver the personalized, seamless engagement your customers now expect. Learn how you can move beyond single interactions with true omnichannel routing: • Dynamically match customers from any touchpoint, over any channel, to the agent with the optimal insights, skill set and proficiency • Enable seamless transitions between digital self-service and live employee contact • Replace single, random interactions with thoughtfully designed and optimized customer journeys
Tags : 
contactbabel, contact center, omnichannel, routing, customer experience
    
Genesys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com