"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

dom

Results 1 - 25 of 563Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 05, 2018
In Cisco abbiamo aiutato migliaia di aziende a prepararsi per il GDPR, il che significa che ci è stata fatta praticamente ogni domanda possibile sull’argomento. Così abbiamo pensato di riassumere le domande che ci sentiamo rivolgere più spesso e di fornire alcune risposte utili per chi si sta avviando sul percorso della conformità al GDPR.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
dns< security breach, cyber security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: Butler Technologies     Published Date: Jul 03, 2018
Industry standards have been established to ensure performance, consistency, and interoperability between network equipment vendors. However, the consistent implementation and operation of these standards become even more critical as speeds and bandwidth increase. At the fiber infrastructure level, this also means more testing may be needed beyond the basic fiber end-face inspection certification and Tier 1 testing. This white paper explores Tier 2 optical time domain reflectometer (OTDR) testing and examines its relationship to Tier 1 testing and how inspection plays into both. This paper defines Tier 2 testing and explains when it is needed. It also addresses the OTDR complexity argument.
Tags : 
    
Butler Technologies
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
Mobile devices are everywhere. 95% of UK millennials now use smartphones1; and it’s estimated that across the globe, nearly a billion more people now use mobile phones today than did five years ago.2 Mobile commerce will continue to grow as smartphones continue to be adopted. For example, forecasts for Europe’s EU 5 (France, Germany, Italy, Spain and the United Kingdom) show mCommerce will account for 43.8% of eCommerce sales by 2020, compared to 32.9% in 2016.3 As fraud teams determine which orders to accept or reject, fraud managers are key to providing a seamless mobile checkout experience. But they also need to protect their business from fraud – and from the damage it can cause to bottom line, customer experience and brand.
Tags : 
    
CyberSource EMEA
Published By: Gelato     Published Date: Jul 02, 2018
Operating across multiple countries is complex, as is shipping printed material. When our customers shared their stories with us, we knew we needed to act. In April 2017, Gelato entered each BRIC country. By establishing legal entities and print partners within Brazil, Russia, India, and China, Gelato gives customers an easy way to get printed material to colleagues and customers within those borders. The specific considerations in each BRIC country are numerous and often cumbersome. And who better to share insights on the state of local printing than the Gelato country managers on the ground? This ebook is for global enterprises than need to get prints in the BRIC countries, for those that are considering starting up sales and marketing operations in the regions for the first time, and also for domestic businesses that simply want to improve their local print processes.
Tags : 
    
Gelato
Published By: Genesys     Published Date: Jun 13, 2018
Routing is a fundamental component of your customer experience strategy. True omnichannel routing breaks down channel silos and gathers intelligence upfront through context and data to deliver the personalized, seamless engagement your customers now expect. Learn how you can move beyond single interactions with true omnichannel routing: • Dynamically match customers from any touchpoint, over any channel, to the agent with the optimal insights, skill set and proficiency • Enable seamless transitions between digital self-service and live employee contact • Replace single, random interactions with thoughtfully designed and optimized customer journeys
Tags : 
routing, customer experience, transitions, self-service
    
Genesys
Published By: Genesys     Published Date: Jul 13, 2018
Routing is a fundamental component of your customer experience strategy. True omnichannel routing breaks down channel silos and gathers intelligence upfront through context and data to deliver the personalized, seamless engagement your customers now expect. Learn how you can move beyond single interactions with true omnichannel routing: • Dynamically match customers from any touchpoint, over any channel, to the agent with the optimal insights, skill set and proficiency • Enable seamless transitions between digital self-service and live employee contact • Replace single, random interactions with thoughtfully designed and optimized customer journeys
Tags : 
    
Genesys
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La protezione degli accessi privilegiati e la prevenzione delle violazioni restano preoccupazioni urgenti per le aziende di tutte le dimensioni. Gli autori di attacchi utilizzano una gamma sempre più ampia di metodi sempre più sofisticati per infiltrarsi in sistemi vulnerabili. E anche se le notizie di violazioni esterne spesso dominano le cronache, le aziende devono essere in grado di difendersi anche dalle minacce interne. In effetti, dato l'impiego oggi diffuso di outsourcing e partnership per supportare le funzioni aziendali chiave, il numero degli utenti che dispongono di accesso con privilegi ai sistemi di business critici è aumentato. In aggiunta, è essenziale per gli amministratori di sistema di oggi comprendere in che modo i sistemi vengono utilizzati, da chi e in quali condizioni. Purtroppo, le soluzioni di sicurezza standard non sono in grado di proteggere l'accesso interno/privilegiato in modo efficace e presentano gravi carenze, che mettono a rischio l'azienda.
Tags : 
    
CA Technologies EMEA
Published By: LogRhythm     Published Date: Jun 19, 2018
As uncertainties—cybersecurity and otherwise—swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions.
Tags : 
cybersecurity, survey, security, leaders, data, industry
    
LogRhythm
Published By: Zynapse     Published Date: Sep 10, 2010
A whitepaper by Ventana Research discusses the need to combine business and technology in a unified approach for MDM implementations in diverse areas.
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm, business intelligence, data integration
    
Zynapse
Published By: Zynapse     Published Date: Nov 08, 2010
A worldwide leader inSpend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leadersin Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material, business intelligence, web service management
    
Zynapse
Published By: Zynapse     Published Date: Feb 02, 2011
A worldwide leader in Spend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leaders in Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, procurement, information management, data management, governance, mdm, master data management, odm, mmdm, material, business intelligence, data integration
    
Zynapse
Published By: Domino     Published Date: Jul 09, 2018
xxx
Tags : 
    
Domino
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: SAP     Published Date: May 18, 2014
In-memory technology—in which entire datasets are pre-loaded into a computer’s random access memory, alleviating the need for shuttling data between memory and disk storage every time a query is initiated—has actually been around for a number of years. However, with the onset of big data, as well as an insatiable thirst for analytics, the industry is taking a second look at this promising approach to speeding up data processing.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, analytical applications
    
SAP
Published By: Dell EMC     Published Date: Nov 03, 2016
Dell EMC Unity™ is modernizing the datacenter, delivering advances that simplify the task of keeping up with growing storage demands. Compared with previous generations of midrange storage, Unity's greater scale, density and simplicity can drive better economics and performance across your entire application portfolio.
Tags : 
storage, vmware, data protection, domain, encryption, storage management, data integration
    
Dell EMC
Published By: Cisco     Published Date: Dec 08, 2015
The Time for the Hybrid WAN IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
cisco, canada, branch infrastructure, hybrid wan, wide area network, networking, it management, wireless, data management
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco
Published By: Adobe     Published Date: Mar 21, 2017
Les marketeurs dans le domaine des médias et du divertissement ont toujours joué à un jeu de cache-cache aux enjeux élevés avec leurs audiences, à la recherche de fans à forte valeur ajoutée. Mais dans le monde digital d’aujourd’hui, en constante évolution, les règles ont changé.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
Au fil du temps, les marketeurs qui se consacrent aux services financiers ont été témoins de l’émergence et du déclin de bien des stratégies d’acquisition. Les agences physiques dominaient autrefois l’univers des achats.
Tags : 
    
Adobe
Published By: Cisco     Published Date: Jan 05, 2015
The technology that powers organizations has undergone several major transitions since the birth of computing. In the 1960s, the mainframe was the dominant compute model, and it gave way to minicomputing about a decade later. In the 1990s, businesses eventually shifted to PC-based computing in the client/server era. This model was eventually supplanted by Internet computing as the dominant compute model. Today, the technology industry finds itself in the midst of the most significant transition ever: the shift to mobile computing.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Domo     Published Date: Dec 18, 2015
Domo brings data from any system, spreadsheet or application into a single real-time platform. Decision makers can access the data they need, when they need it, without having to wait on any reports. And it completely transforms the way you manage business.
Tags : 
domo, spreadsheet, system, application, platform, data, software development
    
Domo
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory