RSS feed Get our RSS feed

News by Topic

securing

Results 276 - 300 of 458Sort Results By: Published Date | Title | Company Name
By: Trend Micro, Inc.     Published Date: Nov 25, 2009
The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.
Tags : trend, trend micro, webcast, security, hitrust, web, privacy, ehrs
     Trend Micro, Inc.
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
By: McAfee     Published Date: Nov 14, 2012
Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers are as determined as ever, and employee-related abuses are on the rise.
Tags : sql, security, database, mcafee, hackers
     McAfee
By: OpenDNS     Published Date: Jan 07, 2013
This whitepaper examines how the dramatic shift toward mobility has impacted IT's ability to effectively secure users, wherever they choose to work. Inside, you'll find advice for securing your users that's both practical and easy to implement.
Tags : security, network security, cloud, mobile, nomadic users
     OpenDNS
By: Five9     Published Date: Apr 29, 2013
Far from being a reason to dismiss a cloud alternative,the increasing complexity of securing both company and customer data is a great reason to consider shifting applications to the cloud.
Tags : five9, cloud, cloud computing, cloud security, cloud alternative, data, securities and exchange commission, customer data
     Five9
By: Intralinks     Published Date: Mar 12, 2014
In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and up-time, and the availability of reporting and audit trails.
Tags : intralinks, technology, saas, confidential data, dada cloud computing, security
     Intralinks
By: Lumension     Published Date: Oct 20, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
     Lumension
By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
     Lumension
By: Citrix     Published Date: May 08, 2014
This white paper reports on the increasing desktop virtualization and the products designed to meet the new requirements.
Tags : virtual desktop infrastructure, security, mobility, citrix netscaler
     Citrix
By: Dropbox for Business     Published Date: Jun 09, 2014
Losing data is costly. According to the Ponemon Institute, the average data breach costs US organizations an estimated $200 per record, or $5.4 million total per breach. And apparently these breaches are equally likely to be from criminal attack as from employee or contractor negligence. It makes sense then that surveys point to data loss via unsecured file sync and share solutions as one of IT’s biggest concerns. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?
Tags : dropbox, data, workplace, breach, security
     Dropbox for Business
By: Great Bay Software     Published Date: Jan 24, 2018
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : iot, security, security systems, iot deployments
     Great Bay Software
By: Palo Alto Networks     Published Date: Apr 25, 2017
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Here’s what you need to know.
Tags : 
     Palo Alto Networks
By: Code42     Published Date: Jan 13, 2016
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : code42, best practices, platform-specific data, endpoint backup, data migration, real-time data backup, data solutions, security
     Code42
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
By: Workday     Published Date: Nov 03, 2017
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business.
Tags : 
     Workday
By: VeriSign     Published Date: Feb 10, 2011
This white paper will detail the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : verisign, mobile apps, code signing, mobile application development, signing certificates
     VeriSign
By: IBM     Published Date: Sep 30, 2015
Big data analytics to help better protect and secure.
Tags : healthcare, enterprise, security, data
     IBM
By: IBM     Published Date: Sep 30, 2015
Diverse and proliferating data relationships are a source of growing security concern.
Tags : enterprise, security organization
     IBM
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : artificial, intelligence, cybersecurity, machine
     BlackBerry Cylance
By: Dell Software     Published Date: May 10, 2013
Have you ever had problems securing Active Directory? In this Dell technical brief, learn about three critical tasks administrators often overlook – and why doing them helps maximize AD security.
Tags : dell software, active directory, ad security, dell technical brief
     Dell Software
By: BlackBerry     Published Date: Mar 03, 2009
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy. Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Tags : blackberry, mobile applications, mobile security, cio, pim, voip, smartphones, it communication
     BlackBerry
By: Siemon Company     Published Date: May 12, 2010
Siemon, a global leader in network cabling solutions and data center physical layer infrastructure, offers this new 66-page E-Book focused on guiding data center professionals and service providers through key infrastructure challenges.
Tags : siemon, ieee, cooling, data center, cabling, cooling, networking, physical infrastructure
     Siemon Company
By: HP     Published Date: Jan 12, 2012
Once the cloud migration begins, finalizing SLAs with third parties, locking down the security of virtualized environments and investing in identity management, access control and reporting tools to support the new cloud business models will be essential steps to success.
Tags : cloud computing, cloud environment, virtualization, technology
     HP
By: Intel Corp.     Published Date: Apr 25, 2012
Read the paper now and learn how to implement secure virtualization and discover the benefits that could be achieved.
Tags : virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
     Intel Corp.
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics