Whitepaper Library
 

filter

Results 1 - 25 of 139Sort Results By: Published Date | Title | Company Name
Published By: Monetate     Published Date: Oct 11, 2018
Monetate Intelligent Recommendations is the only solution that gives merchandisers & digital marketers the power to show contextually relevant product recommendations without burdening IT resources. Using manually curated or algorithmically-driven recommendations, marketers can easily support even the most complex product catalogs. Our solution filters recommendations based on customer attributes (e.g. shirt size), longitudinal behaviours (e.g. browsing behaviour), and situational context (e.g. product inventory at local stores). Best of all, an orchestration layer intelligently selects which algorithms and which filters to apply in any given situation, for any particular individual.
Tags : 
    
Monetate
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance, network management
    
Astaro
Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security
    
Astaro
Published By: goTransverse     Published Date: Oct 15, 2015
Billing is a key moment of truth for all businesses. Every interaction with the customer ultimately gets filtered through billing. It’s an endless combination of quotes, account creation, orders, pricing, payments, settlement and subscriber management. If your company is looking to evaluate billing and subscription management vendors, this paper covers five must-ask questions your peers wished they had uncovered before signing the contract.
Tags : 
    
goTransverse
Published By: SAS     Published Date: Jan 17, 2018
The Industrial Internet of Things (IIoT) is flooding today’s industrial sector with data. Information is streaming in from many sources — equipment on production lines, sensors at customer facilities, sales data, and much more. Harvesting insights means filtering out the noise to arrive at actionable intelligence. This report shows how to craft a strategy to gain a competitive edge. It explains how to evaluate IIoT solutions, including what to look for in end-to-end analytics solutions. Finally, it shows how SAS has combined its analytics expertise with Intel’s leadership in IIoT information architecture to create solutions that turn raw data into valuable insights.
Tags : 
    
SAS
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Juniper Networks     Published Date: Oct 20, 2015
How did firewalls develop to provide the strong, deep security and sophisticated capabilities that they offer us today? It’s a long story that took place over a relatively short period of time, and most likely you were part of it.
Tags : 
juniper, firewall, packet, filter, security, networking
    
Juniper Networks
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Filtration Group     Published Date: Nov 07, 2017
Saubere Luft steht im Fokus vieler Umweltschutzmaßnahmen und ist für industrielle Fertigungsprozesse Thema Nummer eins. Entstaubungsanlagen und die eingesetzten Filtermedien sind alles andere als triviale Technik. Deshalb arbeiten wir, Filtration Group (ehemals MAHLE Industriefiltration) zusammen mit unseren Schwesterunternehmen Clear Edge CFE GmbH und Filtrair B.V. seit über 50 Jahren an der Optimierung von Entstaubungsanlagen und Luftreinhaltungssystemen, um für Sie die optimale Lösung zu finden und Ihre Umwelt sauberer und produktiver zu gestalten. Die Planung, Entwicklung und Produktion wirtschaftlicher, energieeffizienter und hochwirksamer Filtersysteme steht bei uns seit jeher im Fokus. In unserem Whitepaper erfahren Sie, welche weiteren Vorteile der Einsatz unserer Kompaktfilter für Sie bringt und wie Sie mit dem Einsatz der richtigen Filter für Ihren speziellen Anwendungsfall Ihren Betrieb effizienter gestalten können.
Tags : 
lufttechnik, filterplatte, entstaubungsanlage, ersatzfilter, kompaktfilter, industriefiltration
    
Filtration Group
Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : 
bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern, detection, bpm, business process management, latency, soa, smartblocks, apama, correlator, event processing technical society, epts, rfid, scada
    
Progress Software Corporation CEP
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Tags : 
fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, content management
    
Fortinet, Inc.
Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft, governance, grid computing, infrastructure
    
ZScaler
Published By: ZScaler     Published Date: Nov 21, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft
    
ZScaler
Published By: Datawatch     Published Date: Dec 16, 2015
In this paper, the Top 10 Ways to Supercharge Analyst Productivity with Data Preparation, learn how a self-service data preparation solution saves analysts’ time by allowing them to manipulate, filter, enrich, blend and combine disparate data sets in a matter of minutes.
Tags : 
data preparation, data wrangling, analyst productivity, data analysis, cleaning data, data blending
    
Datawatch
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: Reputation.com     Published Date: Oct 02, 2017
1.Meet the new consumer The migration to mobile and social media will challenge — and change — everything we know about consumer marketing. 2. Who owns your brand? Brand equity can no longer be bought. Online reviews now generate total market transparency for location-based businesses. Reviews tilt the balance of branding power away from companies and into the hands of customers. 3. The battle for brick-and-mortar customers is won or lost on the social web. To win, marketers must actively enlist customers as online advocates. Those who scale online review volume and quality will be rewarded with higher search visibility and more business at street level. 4. “Dark data” provides priceless operational insights Vast amounts of unstructured, unmined sentiment data on social media provides feedback about the customer experience that you can filter using thematic analysis and use to improve operations at the national or location level. 5. Business implications Online reputation stands betwee
Tags : 
    
Reputation.com
Published By: TIBCO Software APAC     Published Date: Aug 14, 2018
Increasing your non-interest revenues without increasing customer fees that ultimately drive customers away can be a challenge. The digital economy is opening up new ways to drive additional revenue from existing customers. The same technical innovations are also opening up new ways to communicate with customers about both digital and traditional offerings. But that results in customers becoming overwhelmed with advertising and marketing messages. They are forced to decide upfront who is providing relevant information and who to completely ignore. Ultimately, it comes down to trust. Customers consider generic messages to be spam and learn to filter them out, even if they come from a known vendor. Over the long run, these types of marketing campaigns not only see diminishing returns, they can even damage your long-term relationship with customers and decrease revenues. Micro-marketing overcomes the noise that traditional spam-marketing creates and establishes news levels of trust betwee
Tags : 
    
TIBCO Software APAC
Published By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? This is not the right question to ask first. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services – or add additional ones – that are appropriate for your business. After examining each use case, we’ll show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering, http traffic, application awareness
    
McAfee
Published By: Marketo     Published Date: Mar 23, 2015
Not all email is created equal. Customers and prospects have learned to filter out noise, so your email needs to be more trusted, more relevant, and more conversational. Download our new Definitive Guide to Engaging Email, a jam packed 150+ guide, to move beyond basic batch and blast email to a whole new level of engagement.
Tags : 
marketo, email marketing, customer engagement, email marketing metrics
    
Marketo
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Turning on firewall features can sometimes result in a significant performance hit, creating an obstacle for network architects. In this Network World Clear Choice test, learn about a firewall solution that can help your business overcome these performance challenges by maxing our network capacity while also offering filtering and attack protection capabilities.
Tags : 
network world, data center, firewall, load balancer, scalability, data center management, dos protection, security, network, server traffic, application perforamce, server loading, application delivery controllers, cloud computing
    
F5 Networks Inc
Start   Previous   1 2 3 4 5 6    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.