Vertical Industries  >  

Hunting Industry

RSS Feed   
Hunting Industry Reports
 
Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

TOPICS: 
ComputerWeekly.com

Sun World International: A case study in smarter planet leadership
sponsored by IBM
CASE STUDY: This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre.
Posted: 22 May 2012 | Published: 22 May 2012

TOPICS: 
IBM

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

TOPICS: 
ComputerWeekly.com

Digital Transformation of the Mobile Workforce in Water Utilities
sponsored by Capita AMTSybex
EBOOK: The water industry needs a way to combat extreme storm water flows and resume normal operations quickly after a catastrophic event. In this white paper, explore how mobile work management tools can help water utilities managers meet the needs of the changing water industry, and improve operational performance.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
Capita AMTSybex

5 Ways Document Management is a Game-Changer for Streamlining Construction Projects
sponsored by M-Files
WHITE PAPER: Poor document management can cost construction teams 20% of their final project costs, according to the Federal University of Technology Minna. In this white paper, discover how a document management platform can help construction teams improve overall outcomes, and explore 5 reasons to make the shift.
Posted: 15 Feb 2019 | Published: 15 Feb 2019

TOPICS: 
M-Files

Retail: Where to Invest in 2019
sponsored by SoftServe
WHITE PAPER: To help paint a clearer picture of today's retail investment priorities, this eight-page article walks through the four areas where innovation can take place: engagement, technology, operations, and decision making. Click inside to learn more.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
SoftServe

Oil & Gas Operations in the Digital Age
sponsored by Schneider Electric
WHITE PAPER: Inside this 42-page eBook, uncover exactly how modern oil and gas companies are keeping pace with digitization trends, modernizing operations, and more – and how they're keeping continuity at the forefront of it all.
Posted: 02 Jan 2019 | Published: 31 Dec 2017

TOPICS: 
Schneider Electric

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

TOPICS: 
Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

TOPICS: 
Xtore

SANS 2018 Threat Hunting Survey Results
sponsored by DomainTools
WHITE PAPER: Threat hunting is a focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defender's networks. Threat hunting is a hypothesis-driven approach to validating the collection, detection and analysis of data ahead of an incident. In this white paper, learn about all things threat hunting.
Posted: 11 Jan 2019 | Published: 30 Sep 2018

TOPICS: 
DomainTools

Information Security Magazine – The Hunt for Data Analytics
sponsored by SearchSecurity.com
EZINE: Big data and analytics show promise for better threat detection. Should these technologies be combined with SIEM products, or is it time to move beyond these high alert systems?
Posted: 02 Mar 2015 | Published: 02 Mar 2015

TOPICS: 
SearchSecurity.com

Allure of the threat hunter draws companies large and small
sponsored by SearchSecurity.com
EZINE: Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

TOPICS: 
SearchSecurity.com

Allure of the threat hunter draws companies large and small
sponsored by SearchSecurity.com
EZINE: Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
SearchSecurity.com

Donnelley Financial Solutions Case Study
sponsored by Empow Cyber Security
CASE STUDY: Discover how Donnelley Financial Solutions, a global financial risk and compliance provider, was able to meet its security and compliance objectives after adopting a new SIEM strategy.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

TOPICS: 
Empow Cyber Security

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

TOPICS: 
Information Security Magazine

Kettering Health Network and their use of P4800 and VDI
sponsored by HP and Intel® Xeon® processors
CASE STUDY: This white paper demonstrates how Kettering Health Network - a top 10 U.S. health system three years running - adopted client virtualization technology to make it easier for clinicians to access applications and records no matter where they are located in the facility. This helps maximize clinician-patient time by reducing clinician-PC time.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

TOPICS: 
HP and Intel® Xeon® processors

Visibility into Virtual Environments
sponsored by Gigamon
WEBCAST: Check out this brief webcast to discover how a network traffic visibility tool works, and if it would be a good fit for your organization's IT environment.
Posted: 09 Apr 2014 | Premiered: Apr 9, 2014

TOPICS: 
Gigamon

Enrich Client Relationships at Scale with Intelligent Sales Advisor
sponsored by Microsoft
CASE STUDY: In this case study, explore an example of how personalized engagement, powered by cutting-edge technology, helped to rebuild customer trust, loyalty, and satisfaction. Learn how you can deliver differentiated experiences with AI and relationship-based selling to better engage customers with personalized interactions.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

TOPICS: 
Microsoft

Healthcare IT Security Evaluation Guide
sponsored by Cylance
PRODUCT LITERATURE: Healthcare IT staff plays a critical role in safeguarding PHI. Prioritizing data protection can be difficult for IT departments primarily focused on maintaining technology for vital day-to-day operations. Discover how you can protect healthcare technology by using AI to solve cybersecurity challenges.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

TOPICS: 
Cylance

Managed Detection and Response (MDR): An overview of 24/7 alert monitoring and threat hunting services
sponsored by Trend Micro, Inc.
WHITE PAPER: Organisations are facing stealthy threat actors who are employing techniques designed to bypass existing security measures. Enterprises have to be aware of the ways in which their organisation might be targeted. In this white paper, learn about how a Managed Detection and Response service can help your organisation.
Posted: 30 Jan 2019 | Published: 30 Nov 2018

TOPICS: 
Trend Micro, Inc.

Computer Weekly – 18 July 2017: Airbus secures critical infrastructure
sponsored by ComputerWeekly.com
EZINE: This week, Computer Weekly explores how to secure industrial control systems, which have often lagged behind the leading edge of IT security and pose serious risks to critical national infrastructure. Airbus believes that despite the vulnerabilities of individual components, industrial control systems as a whole are quite resilient.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

TOPICS: 
ComputerWeekly.com

CW Nordics ezine November 2018
sponsored by ComputerWeekly.com
EZINE: Given the controversy surrounding some recent elections and fears of interference by foreign actors, it is hardly surprising that the Swedish government is seeking support from the IT sector as it attempts to guarantee elections remain trustworthy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

TOPICS: 
ComputerWeekly.com

Security of Medical Technology Devices Solution Brief
sponsored by Cylance
PRODUCT LITERATURE: With 6,000 hospitals in the U.S. and five to 10 connected devices per hospital bed, medical technolgy devices are a large and attractive attack surface for cybercriminals, utilizing malware and ransomware. Learn more about how you can uniquely address the threats that medical technology devices face.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

TOPICS: 
Cylance

AI Retail Playbook: Transformation Strategies For Intelligent Retail
sponsored by Microsoft
WHITE PAPER: In our digital world, consumers have an entirely new set of expectations when it comes to retail shopping. Access this whitepaper to see how retailers can incorporate AI and machine learning into their shopping experiences to keep customers coming back.
Posted: 23 Feb 2018 | Published: 23 Feb 2018

TOPICS: 
Microsoft

UKtech50 2018: The 50 most influential people in UK IT
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you will find our definitive list of the movers and shakers in UK IT – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy. This is our top 50 most influential people in UK IT for 2019.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

TOPICS: 
ComputerWeekly.com

August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders
sponsored by Information Security Magazine
EZINE: This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

TOPICS: 
Information Security Magazine

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by SearchHealthIT.com
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

TOPICS: 
SearchHealthIT.com

CW ANZ: Flash makes a spash
sponsored by ComputerWeekly.com
EZINE: Find out why more Australian enterprises are now turning to all-flash storage technology to replace spinning disk storage systems, thanks to lower costs and reduced complexity. Sensing this business opportunity, Optus Business has teamed up with storage supplier Pure Storage to offer on-premise and cloud-based all-flash storage and services.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

TOPICS: 
ComputerWeekly.com

CW Nordics August 2017
sponsored by ComputerWeekly.com
EZINE: The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.
Posted: 23 Aug 2017 | Published: 24 Aug 2017

TOPICS: 
ComputerWeekly.com

Computer Weekly – 22 January 2013: Technology takes off at Heathrow Terminal 2
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at the building of Heathrow's high-tech Terminal 2 and hear from its CIO about the IT innovations. John Lewis saw 44% online sales growth over Christmas – we find out how the IT team delivered. And News International talks about moving its IT to Amazon's public cloud. Read the issue now.
Posted: 21 Jan 2013 | Published: 22 Jan 2013

TOPICS: 
ComputerWeekly.com

Computer Weekly networking case studies
sponsored by ComputerWeekly.com
CASE STUDY: Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

TOPICS: 
ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement