secure

Results 1 - 25 of 2340Sort Results By: Published Date | Title | Company Name
Published By: Dell APAC     Published Date: Nov 20, 2019
Users are on the go, working from almost anywhere and on multiple devices, reshaping the traditional work-place. We know for you as an IT leader this means more: ? devices to provision and deploy ? end points to secure ? applications to support ? systems to manage Which results in more headaches for you and less time to focus on more important, strategic initiatives. And your role has transformed too; you’re now a critical partner of the company’s leadership. You’re thinking about bringing the best experience to your users, accelerating collaboration and maximizing productivity. You’re being tasked to help the company remain innovative. With all of these added responsibilities, thinking about the more repetitive tasks like resetting user passwords and giving access to VPN should be a thing of the past. At Dell Technologies, we understand your top priority is transforming your organization for ultimate value and efficiency.
Tags : 
    
Dell APAC
Published By: Rubrik EMEA     Published Date: Dec 16, 2019
Modern businesses are rapidly embracing Microsoft Azure Cloud to fast track their digital transformation, achieve cost efficiency, and gain business agility. Join this on-demand webinar with experts from Rubrik, Microsoft, and joint customer Cranfield University for a deep-dive on how Rubrik and Microsoft Azure accelerate the cloud journey with a simple, integrated solution for data protection and application mobility across the hybrid data center. View this webinar to learn how Rubrik and Microsoft have enabled Cranfield University to: Protect, secure, and manage their entire hybrid cloud across their Microsoft environment including Hyper-V, physical Windows, and instant database recoveries with SQL Live Mount. Automate backup, recovery and archival to Azure via Rubrik's SLA policy. Lower their TCO and reduce their data center footprint by 75%.
Tags : 
    
Rubrik EMEA
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed-breach world. Credential theft is the leading attack type for causing a data breach, and bots are the driving force behind the majority of them. To defend against credential stuffing, prioritizing secure access and bot protection needs to be part of every organization’s security strategy.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: A-lign     Published Date: Dec 04, 2019
In today’s technologically-driven business world, it is imperative for executives of all kinds to understand the importance of cybersecurity and how to protect the organization from threats. While these concerns used to be left to the roles such as the CIO, CTO, CISO or IT department, is it now the responsibility of executives across the organization to keep it secure and lead by example for the rest of the team.
Tags : 
    
A-lign
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: Origami Risk     Published Date: Dec 23, 2019
Medical error is the third-leading cause of death in the United States.Many healthcare providers continue to use lagging systems that don’t efficiently collect or analyze data. Furthermore, a mix of legacy and new systems makes for potential conflicts that add to the confusion and fortify workplace silos. Without the sharing of information, organizations fail to see big-picture strategies and solutions that could help prevent medical errors and increase patient safety. Integrated healthcare risk management software that can work seamlessly and securely with existing software is one of the missing links to knocking down silos and developing strategies that contribute to a reduction in deaths due to human error. Here are some of the specific ways healthcare risk management software accomplishes this.
Tags : 
    
Origami Risk
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Vivek Raman, Head of Security for Yelp explains how they built automation into the company's security practice with Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Do you know what your employees are doing on your network? Do you know about the latest ransomware attack your security team is battling? How about your business partners? Are they secure? With all of these questions swirling around in your head, it’s hard to feel secure about network security. But there is one thing that could help: a solid plan. Perhaps you’re aware that your organization should have a formal incident response plan. Or maybe you already have one. But are you completely clear on all the components that should make up such a plan? Or what to do when things go wrong? Or how to get help when you need it? This eBook provides you with some insight to help you build and strengthen your organization’s incident response plan.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
People make a lot of claims about network security. We’d rather show you proof. If you're looking for speed, reliability, advanced intelligence, and ease of integration with your existing environment, there's only one secure internet gateway that you can build your entire business on: Cisco Umbrella. Check out our infographic to learn just how quickly and easily you can put Cisco Umbrella to the test in your environment.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet, why traditional secure web gateway (SWG) solutions cannot address these gaps, and why a new kind of internet gateway represents an entirely new way of thinking about securing your users
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Do you know DNS Security? Users are working off-hours, off network and off VPN. Are you up on all the ways DNS can be used to secure them? Test your knowledge.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. No wonder it’s gaining traction
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Cisco has been named in the first ever Gartner ‘Voice of the Customer’ report for the Secure Web Gateways (SWG) market for Cisco Umbrella. Gartner Peer Insights is a peer review and ratings platform designed for enterprise software and services decision makers. This document synthesizes Gartner Peer Insights’ content in the SWG market for 2018. Gartner states that "this peer perspective along with the individual detailed reviews, is complementary to expert research and should play a key role in the customer buying process." This report includes: - SWG Peer Reviews and Ratings - Vendor comparisons - Reviewer demographic
Tags : 
    
Cisco Umbrella EMEA
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking
    
Sangoma
Published By: Jamf     Published Date: Oct 18, 2019
Today’s students are accustomed to leveraging technology as part of their education. For in-class and at-home learning, many are leveraging 1-to-1 iPad programs. For many more, a computer lab is made available to offer access to educational materials. Labs are a cost-effective and efficient way to ensure students have access to a computer with the apps they need to be successful, saving students and parents the cost of purchasing computer hardware and software. Labs ensure digital equity for students who would not otherwise be able to afford these luxuries. And, many school computer labs are Mac labs. Mac has a longer shelf life than PC, countless educational apps and students simply prefer them. In order to set students up for educational and professional success, K-12 schools need to equip students with secure technology and a customized experience when they sit down at any computer in the lab.
Tags : 
    
Jamf
Published By: Jamf     Published Date: Oct 18, 2019
Today’s students are accustomed to leveraging technology as part of their education. For in-class learning at K-12 environments, many are offering 1-to-1 iPad programs. While some universities are moving towards a 1-to-1 iPad model, such as The Ohio State University, many others are relying on computer labs to offer the technical tools students need. In order to set these young adults up for professional success, higher education institutions need to equip students with secure technology and a customized experience when they sit down at any computer in the lab. Labs are a cost-effective and efficient way to ensure students have access to a computer with the apps they need to be successful, saving students the cost of purchasing computer hardware and software. Labs ensure digital equity for students who would not otherwise be able to afford these luxuries. And, many university computer labs are Mac labs. Mac has a longer shelf life than PC, countless educational apps and students simply
Tags : 
    
Jamf
Published By: Lenovo - StudioNorth     Published Date: Jan 13, 2020
Computing devices are rising to the challenge. They are more flexible and offer increasingly expanding functionality. That’s good news — CIOs can be assured that the newest devices can handle the demands of technologies such as VDI (virtual desktop infrastructure), AR/VR, and high-resolution imaging. However, new devices must also meet increasing regulatory compliance and requirements for secure, hack-resistant patient data access.
Tags : 
    
Lenovo - StudioNorth
Published By: Panasonic     Published Date: Oct 10, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum.
Tags : 
    
Panasonic
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata
    
ASG Software Solutions
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix
Published By: Group M_IBM Q1'20     Published Date: Dec 10, 2019
Identity and access management (IAM) can be hard to explain and even harder to understand. What is IAM and why is it so important? IT jargon aside, check out the latest interactive whitepaper for a helpful and easy to use metaphor for understanding IAM. Treat your organization like an airport; give the right people access to the right resources in a seamless and secure way with IBM Security.
Tags : 
    
Group M_IBM Q1'20
Published By: Pitney Bowes     Published Date: Apr 20, 2009
This Executive White Paper, sponsored by Pitney Bowes Marketing Solutions, a provider of web-based marketing automation solutions, examines the competitive advantages offered by marketing automation portals and the potential impact of these types of portals on marketing campaigns deployed in complex, rapidly evolving markets.
Tags : 
pitney bowes, automated portals, marketing solutions, web-based marketing, competitive advantage, portal, channel marketing, sustainable
    
Pitney Bowes
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.