RSS feed Get our RSS feed

News by Topic

cloud data security

Results 276 - 295 of 295Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: Jul 20, 2017
Take a look at our cloud-first, modern Windows management and security solution that fundamentally changes how IT approaches PC lifecycle management. Join us to learn how unified endpoint management helps organizations lower the cost of managing Windows deployments; streamlines securing endpoints, apps and data on any network; and delivers peak user experience across any Windows device. • Consolidate your Windows management across devices on or off the domain • Deliver and install Win32 software more reliably and quickly • Deploy security patches instantly and remediate vulnerabilities faster • Unify your endpoint management functions across desktops and mobile • First look at how organizations are using UEM for Windows 10
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Jul 20, 2017
Take a deeper look into how AirWatch enables Windows management to evolve from a rigid PC-centric approach to one offering a flexible and over-the-air configuration model. This session will delve into the specific configuration, security and OS patch management technologies that AirWatch introduces, as well as leveraging AirWatch alongside conventional Windows management tools that are in use today. • Leverage product provisioning and native configuration management features for policy management from the cloud • Integrate with the new Windows Update as a Service to flexibly manage OS updates and patches on or off the domain • Ensure endpoint security and data protection via advanced security features in the management platform and Windows 10
Tags : 
     VMware AirWatch
By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
     Microsoft
By: DellEMC and Intel®     Published Date: Sep 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Oct 18, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. New Possibilities Outside Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
     DellEMC and  Intel®
By: Citrix ShareFile     Published Date: Apr 12, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : cloud security, client data protection, data encryption, cloud, user behavior
     Citrix ShareFile
By: IBM     Published Date: Oct 26, 2017
Many organizations face access management chaos. As applications and resources have spread across on-premise data centers and multiple cloud providers, users are often accessing these resources from anywhere and on multiple devices. These simultaneous trends have left access management systems fragmented and access polices inconsistent, resulting in an environment that is expensive to maintain and challenging to secure.
Tags : access management, integrated platform, cloud security, enterprise security, data security
     IBM
By: OnBase by Hyland     Published Date: Jun 26, 2017
Confidence in the cloud is growing—and more companies than ever are looking to entrust their content management to a solution that is deployed in the cloud. A new survey conducted by IDG Research explores the rapidly expanding trend of companies moving their critical content and data storage to the cloud. Download the report to discover what your industry peers are saying about the cloud today and how, in the next year, everything could change.
Tags : cloud, solutions, ecm, onbase, hyland, data, availability, encryption
     OnBase by Hyland
By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx
     Juniper Networks
By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
     CA Technologies EMEA
By: Dell and VMWare     Published Date: Oct 26, 2017
Dell EMC PowerEdge servers with Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
     Dell and VMWare
By: Dell and VMWare     Published Date: Oct 26, 2017
Dell EMC PowerEdge servers with Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
     Dell and VMWare
By: Dell and VMWare     Published Date: Oct 26, 2017
Dell EMC PowerEdge servers with Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
     Dell and VMWare
By: Dell and VMWare     Published Date: Oct 26, 2017
Dell EMC PowerEdge servers with Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
     Dell and VMWare
By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
     Tenable
By: Google Chrome Enterprise     Published Date: May 04, 2018
As companies embrace cloud services and encourage employee mobility, digital interactions with company resources have become more distributed and virtualized, blurring the traditional concept of the endpoint. Forrester Research surveyed 1000+ IT professionals to better understand how endpoint security challenges are changing for enterprises. To protect company and customer data, it is increasingly necessary for enterprises to revisit how they approach endpoint security. Read the research brief to uncover key trends in enterprise security, and how IT can protect their enterprise through a more secure and managed web browser.
Tags : 
     Google Chrome Enterprise
By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
     Ruckus Wireless
By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
     Cisco Umbrella EMEA
By: Alert Logic     Published Date: May 23, 2019
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
     Alert Logic
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics