accounts

Results 1 - 25 of 236Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Aug 16, 2018
Email. You use it constantly. And it’s the number-one application to keep your organization functioning, lines of communication flowing, and productivity seamless. Organizations need email to stay up-and running all the time. After all, it’s supposed to just work, right? This is where trouble often sets in. Cybercriminals use email constantly, too. It’s the number-one vector used to initiate attacks like malware delivery (think ransomware), impersonations and phishing attacks. In fact, almost 90% of organizations* have seen the volume of phishing attacks either rise or stay the same over the past 12 months. Internal threats have also been on the rise: Most organizations have encountered internal threats driven by careless employees (88%), compromised accounts (80%) or malicious insiders (70%) over the last year.
Tags : 
    
Mimecast
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Site Pro PPC     Published Date: May 14, 2009
Often times hiring a professional to manage your PPC accounts actually saves you money. Check out our free whitepaper to find out why!
Tags : 
site pro, ppc, ppc management, adwords, google, yahoo, msn
    
Site Pro PPC
Published By: Rackspace     Published Date: Feb 18, 2016
AN OVERVIEW OF THE ACCOUNT MANAGEMENT APPROACH
Tags : 
rackspace, data security, aws account, cloud, data, data center
    
Rackspace
Published By: QTS     Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
Tags : 
healthcare, cyber security, data security, security
    
QTS
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: May 08, 2017
The gaming industry continues to grow rapidly, and it is projected to grow another 30% in the next three years1 . Online gaming is driving this growth as the industry is making a seismic shift from disk to digital. This shift comes with an abundance of opportunities and challenges, as digital gaming makes it easier than ever to get games into the hands of more players, in more places, in less time. TechValidate Research surveyed 131 Akamai Technologies, Inc. customer accounts to find out more about how gaming companies are innovating the marketplace and the challenges they need to overcome in order to do so. The results show the importance of web security, that acquiring and retaining new users is the biggest business challenge companies are facing, and that mobile is taking over as the most popular gaming platform.
Tags : 
techvalidate, gaming industry, online gaming, akamai gaming, gaming growth
    
Akamai Technologies
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell™ One Identity Privileged Password Manager and Privileged Session Manager from Dell Software, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, privileged accounts, priviliged passwords, civilian agencies, dell, dell privileged session manager, dell security
    
Dell Security
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell One Identity Privileged Password Manager and Privileged Session Manager, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, dell, dell privileged session manager, privileged passwords, two-factor authentication
    
Dell Security
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The world set a new record for data breaches in 2016, with more than 4.2 billion exposed records, shattering the former record of 1.1 billion in 2013. But if 2016 was bad, 2017 is shaping up to be even worse. In the first six months of 2017, there were 2,227 breaches reported, exposing over 6 billion records and putting untold numbers of accounts at risk. Out of all these stolen records, a large majority include usernames and passwords, which are leveraged in 81 percent of hacking-related breaches according to the 2017 Verizon Data Breach Investigations Report. Faced with ever-growing concerns over application and data integrity, organizations must prioritize identity protection in their security strategies. In fact, safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in 2017.
Tags : 
data breach, credential stuffing, system security, security
    
F5 Networks Inc
Published By: SAS     Published Date: Jan 17, 2018
First, today’s digitally oriented customers expect banks to provide an ever-higher quality experience defined by speed and the flexibility to conduct business across many channels. They’ve grown accustomed to going online and transferring money between accounts, for example, and using their mobile device to make payments and check their account balance. These kinds of experiences have raised the bar in terms of customer expectations – and banks need to keep up, or risk losing customers. This is particularly true of millennial customers, as they have little regard for loyalty, which banks have traditionally relied on to build their business. Once frustrated by inconvenience, they don’t hesitate to switch banks – and thanks to the internet, this is now a fast, painless process.
Tags : 
    
SAS
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager protects an organization’s business and empowers its people. The solution protects critical accounts and endpoints while providing a seamless user experience. CA commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI)enterprises may realize by deploying its Privileged Access Manager solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the CA Privileged Access Manager solution on their organizations
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
At A Glance The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA
Published By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9
Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing, it management, business intelligence, business technology, infrastructure management
    
Digital Realty
Published By: Key Private Bank     Published Date: Apr 05, 2018
From budgeting daily expenses to deciding a career path, attending college brings plenty of opportunities for teenagers to make the right—and wrong—financial decisions. That’s why parents of college-bound children should utilize opportunities to instill money and wealth preservation lessons in their children. But knowing where to start can be daunting. The experts at Key Private Bank have narrowed down the best ways to help you discuss important money lessons with your teens, so that you can set your children up for a lifetime of financial success. Read about the four wealth lessons you can start introducing to your children now when you read our latest whitepaper. © 2018 KeyCorp. E92127 180314-372281
Tags : 
financial responsibility, college money management, managing your money in college, college money tips, college spending tips, how can students spend money wisely, save money in college, budgeting in college, budgeting college students, personal finances for college students, credit cards and college, student loans, college loans, managing student loans, monthly budget for college students, savings accounts for students, spending habits of college students, better spending habits in college, money management for students, college cash management
    
Key Private Bank
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: Socialbakers     Published Date: Mar 27, 2015
Social has the power to help your clients achieve larger marketing and business goals. But only 5% of brands use social to it’s fullest potential - do your clients and prospects? In this study we discuss social trends agency reps just have to know to stay ahead and ways you can leverage social to pitch prospects and preserve accounts.
Tags : 
the key agency success, social trends, social, social media, agencies, importance and content, social media marketing trends, social data, social analytics, videos
    
Socialbakers
Published By: Puppet     Published Date: Jul 13, 2016
If you’re new to Puppet on Windows, one of the first things you’ll want to do is start managing users and groups. In this webinar, we’ll demonstrate how to manage both local groups and Active Directory membership. The demo will include: - Managing administrator accounts - Managing local groups - Setting up a domain controller - Managing Active Directory membership Puppet can do a lot, but we always recommend starting small and building on your success. Managing users and groups is a great way to get started. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Published By: UNIT4 CODA     Published Date: Jul 13, 2011
IKEA uses one common finance system globally making accounting quicker and easier. Their standard Chart of Accounts updates information in real time from IKEA's operational systems, so each store has on-demand access to real-time performance data.
Tags : 
unit4 coda, coda financials, financial software, best-of-class, ikea, chart of accounts, system consolidation
    
UNIT4 CODA
Published By: ThingWorx     Published Date: Dec 03, 2015
By all accounts, the Internet of Things (IoT) is a vast, fast-developing opportunity for the enterprise and everyone connected to the enterprise. This IoT market analysis roundup by Postscapes shows the wide range of numbers that represent the IoT market.
Tags : 
thingworx, iot developer, enterprise, postscapes, software development, knowledge management, enterprise applications
    
ThingWorx
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.