enterprise security

Results 1 - 25 of 860Sort Results By: Published Date | Title | Company Name
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Unlock the benefits of Ethernet – An Expert Q&A Guide provided by Spectrum Enterprise. Find out how technology experts are using reliable Ethernet solutions to boost business performance. Get actionable insights from experts and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
It’s time to make working together what it should be—intuitive. Cisco Webex Teams enables teams to meet, create and communicate continuously on a single easy-to-use platform. Tools adapt, so teams don’t have to. The same page? Everyone is on it, no matter what device or apps they like to use or where they are. Innovation and work keep moving forward, even after a meeting ends. And everyone enjoys an exceptional experience safeguarded by enterprise-grade security no matter how big the business scales.
Tags : 
cisco, webex, collaboration
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs. When carefully managed, this approach can still be very effective in guarding against malware. But recent events have shown that many companies are finding it a challenge to manage their code signing certificate deployments—and failures in certificate management can have serious consequences. To discover how our Secure App Service solution can help you manage your codesigning efforts and provide enterprise-level support, all at a predictable cost, download this whitepaper today and find out more.
Tags : 
    
DigiCert
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Juniper Networks     Published Date: May 04, 2018
The role of IT is changing from a traditional focus on cost-efficient enablement to a more strategic contribution. Total Cost of Ownership (TCO), while important, is being surpassed by a growing focus on automation and orchestration that is needed to fulfill enterprise demands for security, agility, and innovation. The cloud-grade enterprise network – spanning the campus, data center, and branch – must be able to respond to rapid changes in business, growing reliance on hybrid cloud architectures, and the needs of users and customers.
Tags : 
    
Juniper Networks
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Genesys     Published Date: Feb 22, 2018
Move to the Cloud with Confidence If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: • The size of your contact center, and business requirements such as customer journey management • The location and quantity of contact centers being managed • The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
contact center, cloud, ebook, customer journey
    
Genesys
Published By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Wave: Translytical Data Platforms, Q4 2017 report reviews companies that offer “translytical data platforms”, which Forrester defines as an “emerging technology” that delivers “faster access to business data to support various workloads and use cases.” Download the report if you want to learn: -Why Forrester named DataStax a leader among 12 companies it identifies as “the most significant translytical vendors. -What constitutes a “translytical data platform” and why translytical data platforms are so critical for enterprise data strategies today. Why performance, scale, security, and use-case support are the key differentiators."
Tags : 
    
Datastax
Published By: IBM     Published Date: May 30, 2018
This book is designed to help you get the upper hand on managing your enterprise security through an integrated threat management strategy.
Tags : 
    
IBM
Published By: Boardwalktech     Published Date: Jun 05, 2018
Blockchain is reimagining the way enterprises operate. It’s a powerful new enterprise technology that can be used across vertical and application domains to realize greater efficiency, support new business models and revenue sources, and enhance the security and elevate the trust of enterprise transactions.
Tags : 
    
Boardwalktech
Published By: Google Chrome Enterprise     Published Date: May 11, 2018
IT can add a critical layer of security with the web browser. Chrome Browser is setting the standard for web safety and stability in the enterprise. Watch this animation to hear about how Chrome is protecting your users' browser experience as they do more work in the cloud.
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As enterprises contine to adopt web-based apps, users spend more time their web browser than ever before. With Chrome Browser, IT can set a variety of policies to help users be more productive across the web. From enabling security policies that protect users, to making to making it easy to access needed boomarks and extensions, IT can offer users a better browsing experience to support users as they get their job done.
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
Browsers combined with cloud-based services have effectively replaced desktop software, with an average of 1,053 cloud services in user per enterprise. This guide identifies key security features for IT administrators to consider when selecting a browser.
Tags : 
    
Google Chrome Enterprise
Published By: Genesys     Published Date: Jun 08, 2018
If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: • The size of your contact center, and business requirements such as customer journey management • The location and quantity of contact centers being managed • The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
cloud, contact center, customer journey, hybrid
    
Genesys
Published By: CA Technologies EMEA     Published Date: May 23, 2018
To move your business from its current state to the connected enterprise, you have to define a common API to your database and other systems, while providing the infrastructure to support the new model. The new systems must incorporate the security safeguards while ensuring the infrastructure can support the new growing, but variable, load. With the rapid adoption of mobile and web-based services across the industry, the REST architecture has emerged as the de facto standard for API integration across systems. This white paper addresses the concepts of REST, creating REST APIs for your databases and integrating with other systems: • What is REST? • Why use REST for database access? • Building REST infrastructure for database access • The REST enabled database • Integrating REST with other services • Criteria for selecting REST services platform
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA Live API Creator erstellt Back Ends von Anwendungen, die REST/JSON-APIs der Enterprise-Klasse offenlegen und den Zugriff auf bestehende Daten und Anwendungen ermöglichen. So können Entwickler neue REST-Endpunkte erstellen, durch die sich Daten per Mausklick mit unterschiedlichen Datenquellen verbinden lassen. Verantwortliche erhalten die Möglichkeit, APIs mit deklarativen Unternehmensregeln, JavaScript-Ereignisverarbeitung, rollenbasierter Security und interaktivem Testing zu erweitern.Durch das deklarative Modell von CA Live API Creator entstehen zudem hochgradig skalierbare und zuverlässige Systeme. Diese optimierten Services sind viel effizienter und weniger anfällig als die von versierten Entwicklern und Architekten manuell programmierten Services.
Tags : 
    
CA Technologies EMEA
Published By: Trend Micro     Published Date: May 03, 2018
The evolution of cyber threats ad the cybercriminal community has evolved from the days of pranksters launching annoying viruses and spam that would be considered primitive today. While enterprises make concentrated efforts to protect their critical data, the lack of correlated and contextual network visibility can leave IT security organizations unable to prioritze the threats that matter the most.
Tags : 
    
Trend Micro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.