business security

Results 1 - 25 of 1158Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: Citrix     Published Date: Mar 26, 2020
Your small business is primed for a growing future—but with every new employee and client, you have more files to store and manage. Without a strong file sharing solution, it’s tough for your IT team to manage secure, anywhere access to key files for all your users. The solution is to adopt an enterprise-grade file sharing platform that grows with you. In this e-book, you’ll learn how enterprise-grade file sharing supports your growth with: • More efficient collaboration processes • Streamlined security and compliance • Unified access to files across locations and devices
Tags : 
    
Citrix
Published By: Citrix     Published Date: Mar 26, 2020
There's a lot to think about when it comes to securing your sensitive data — like controlling access and meeting compliance. It can be overwhelming for small and medium-sized businesses. But we can help you boost your knowledge and simplify your approach to protecting important data so you can stay a step ahead in the security game. Download this e-book, and get your step-by-step guide to managing risk across: • Physical vulnerabilities • Unsecured networks • Mobile devices
Tags : 
    
Citrix
Published By: F5 Networks Singapore Pte Ltd     Published Date: Mar 04, 2020
In today’s information-flooded business world, access to sufficient data isn’t a problem. But we often struggle with a different challenge—inefficient data. Data and analytics are increasingly important tools that help us decide where to invest and develop. They are a critical means of measuring the success of current strategies, justifying decisions, and building confidence in plans for growth. Engagement with customers is what matters, and that engagement is often measured in clicks. We track where site visitors are coming from, how many pages they visit, whether they click on ads and banners, and how long they ultimately choose to interact with our site or service. Without this information, we’d be making decisions in the dark. The hidden ROI of an advanced WAF solution: - Advanced security solutions can help you manage the explosion of bot traffic, while cutting costs and improving overall business outcomes – finding ROI in the automation age. - Eliminating bot traffic results i
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Secure Code Warrior     Published Date: Mar 10, 2020
As more businesses move to agile methodologies, providing more online services to customers and exposing data and APIs, the need for “Shifting Left” and building security into the start of the (continuous) development cycle grows every day. CIOs and CISOs need to think carefully about when, where and how to deploy a security uplift program to maximize business impact and not overload the core function of the developers. In this e-book , we share six steps companies should take before deploying a program, based on our learnings from more than fifty enterprise deployments. These steps will help you get he strategy, data and processes in place to drive success. Download this report now.
Tags : 
    
Secure Code Warrior
Published By: LastPass APAC     Published Date: Mar 30, 2020
"LastPass has analyzed over 47,000 businesses to bring you insights into security behavior worldwide. The takeaway is clear: Many businesses are making significant strides in some areas of password and access security – but there is still a lot of work to be done. Use of important security measures like multifactor authentication is up, but the continued reality of poor password hygiene still hampers many business’ ability to achieve high standards of security. In the report, we not only highlight key trends by company size, sector, and location, we provide analysis and recommendations to help IT and business leaders take action where it’s needed most. Download the free report today to see the current state of password security, access, and authentication around the world – and learn what you can do today to better secure your company."
Tags : 
    
LastPass APAC
Published By: LastPass APAC     Published Date: Mar 30, 2020
"Digital and Business transformation is having a major impact on the role of the security team. Cloud, on-premise and hybrid services are now the norm resulting in the traditionally secure perimeter disappearing. This has given rise to a new challenge; managing the identity, access and authentication of anyone who is adding value to the business. This is now the new perimeter of security; the front line of your organisation. We sat down with Mark Child, Research Manager, European Security, IDC to hear about the evolving identity landscape and what this means for the modern security workforce. We covered a number of areas including: What an effective identity solution looks like -Are we witnessing the demise of the password? -Key business drivers behind identity solution implementation -Business benefits of IDT (Identity & Digital Trust) deployment or upgrade -Balancing security and end user experience"
Tags : 
    
LastPass APAC
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed breach world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: CheckMarx     Published Date: Mar 04, 2020
What’s making your software essential to your business, is also making it more dangerous. When software is everywhere, everything becomes an attack surface. The way your organization develops and depends on software has changed - and never has it exposed you to more risk. And while software security has never been more business critical, organizations know if it gets in the way of DevOps, it just won’t work. Security must be inseparable from software development.
Tags : 
    
CheckMarx
Published By: Genesys APAC     Published Date: Mar 24, 2020
If you are considering the right deployment model for your contact centre, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centres and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact centre, including: • The size of your contact centre, and business requirements such as customer journey management • The location and quantity of contact centres being managed • The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
    
Genesys APAC
Published By: TIBCO Software     Published Date: Mar 16, 2020
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software
Published By: Motorola Solutions APAC     Published Date: Apr 01, 2020
We live in extraordinary times that test businesses' abilities to navigate change and disruptions. Here’s a scenario you may relate to. You just stepped out of the office, and of course, something urgent crops up that requires your attention. There are so many advantages in having more flexible working styles, easier information flow and instant communication. So many businesses today rely on an efficient team management and network - be it to connect drivers to the right destinations, coordination of security personnel, or store front with warehousing crew, every team can benefit from having a more intuitive communication service. You cannot be onsite at every moment, but with an effective Push-to-Talk (PTT) communication service, you can be quickly and easily connected in those moments that require your decision or to keep you posted about an emerging incident. Motorola Solutions’ Wave PTX service provides your business with an affordable and scalable PTT communication servic
Tags : 
    
Motorola Solutions APAC
Published By: ARM Insight     Published Date: Feb 21, 2020
Companies in the FinTech and banking industries sit on a data treasure trove, but few truly maximize their valuable raw data. Senior-level executives often embrace the idea of monetization, but they are held back by fear of potential negative repercussions. The Three Data Types is your ticket to monetizing data safely and securely in a manner both business executives and security teams can embrace. Explore the roles played by raw and anonymous data in the monetization process, and learn how synthetic data could be the key to managing even the most complicated compliance issues. Download now, and read more today!
Tags : 
    
ARM Insight
Published By: Cisco Umbrella EMEA     Published Date: Feb 11, 2020
We work everywhere: at home, in the office, airports, and coffee shops, yet traditional security solutions still focus on protecting employees only while on the corporate network. This eBook will educate IT pros about the risks of only relying on legacy defenses like firewalls, web gateways, and sandboxes for network security. What if you could leverage a secret weapon that you already have in your security stack to see attacks and protect roaming users, on any device? We'll describe how Cisco Umbrella provides visibility into all internet requests across your network, across every port, protocol or app to uncover and block connections to malicious domains and IPs. See why Fortune 50 enterprises and small businesses are realizing the security multiplier effect by using DNS to complement existing security measures.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Mar 12, 2020
TIM – also known as Telecom Italia – is the largest Italian telecommunications services provider with a footprint around the world. Cisco Umbrella is an integral part of TIM Safe Web, which protects more than 600,000 business and SMB customers. TIM recently expanded these security protections to more than 100,000 mobile SMB customers.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q2'20     Published Date: Mar 20, 2020
As security monitoring and analytics initiatives mature, a platform approach reduces the time to identify, investigate, and respond to security-related incidents — and drives a significant reduction in risk. Learn more about the success of a secure, compliant, and well-managed infrastructure.
Tags : 
    
Group M_IBM Q2'20
Published By: Workday APAC     Published Date: Mar 05, 2020
Today, businesses have access to more information than ever before. But turning data into insights often means managing a patchwork of systems, data models, security settings, and tools. That’s where one source for data and Workday come in. Watch this video to learn how we give business leaders tailored, self-service access to insights they can act on—while keeping security intact.
Tags : 
    
Workday APAC
Published By: HP Inc.     Published Date: Mar 06, 2020
On behalf of HP Inc., IDC surveyed 500 security decision makers and influencers at organizations in keyNorth American (200 respondents from the U.S. and Canada) and European (300 respondents from the U.K., France, and Germany) markets, across vertical sectors from across the spectrum including banking and finance, telco, and energy. Respondents were questioned on a wide range of key factors related to their organizations’ approach to endpoint security. The results, as described in this IDC InfoBrief, indicate considerable scope for critical improvements in business cybersecurity awareness. Based on responses to key questions, IDC also segmented the respondents into two groups: “Leaders” (defined by a proactive, best practice approach to endpoint security throughout) and “Followers” (often unaware of the risks associated with their endpoint devices and still with a way to go in terms of adopting a safe approach to managing their endpoint estate).
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Mar 06, 2020
The far-reaching financial, legal and reputational implications of a data loss mean that information security is a business imperative. Safeguarding the ever-increasing volumes of valuable corporate data against unauthorised access has become integral to maintaining business operations and adhering to increasingly vigorous data privacy compliance requirements. For many organisations, their cyber-attack surface area is increasing as connected Internet of Things (IoT) endpoints proliferate. These include both legacy and the new breed of smart printers and multifunction printers (MFPs). Consequently, businesses must take a proactive approach to print security as these print devices can provide an open door to corporate networks. By taking steps to analyse the potential vulnerabilities of print environments, businesses can mitigate risks without compromising productivity. This report discusses the risks of unsecured printing and recommends best practices for integrating print into an overa
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Feb 04, 2020
The Cybersecurity landscape is constantly changing and expanding. Businesses are increasingly having to confront cyberattacks that threaten their information—and their customers’ private data. This guide is designed to help those small and medium-sized businesses with limited IT resources to strengthen their cybersecurity today, with little to no cost.
Tags : 
    
HP Inc.
Published By: M-Files     Published Date: Feb 24, 2020
Content management and collaboration is not sexy or flashy, but it is essential to the success of any business. Last year content management and collaborative services focused on security, due to the implementation of general data protection regulations (GDPR) and frequency of reported data breaches. Users also said that storage and scalability, embedded offerings, and reporting were their primary concerns. This year user feedback has been radically different thus far; leading with AI/ML, automation, integration, capture, and collaboration. Users stated that although security is still on their radar, they expect vendors to deliver secure products and are more concerned with innovation as a differentiator.
Tags : 
    
M-Files
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Genesys     Published Date: Jan 13, 2020
If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: The size of your contact center, and business requirements such as customer journey management The location and quantity of contact centers being managed The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
    
Genesys
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.