RSS feed Get our RSS feed

News by Topic

securing

Results 451 - 460 of 460Sort Results By: Published Date | Title | Company Name
By: VMware, Inc     Published Date: Dec 05, 2013
This executive level paper highlights trends and findings from CIO’s 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter. Featured content includes debunked myths of securing cloud environments, how the secure cloud is a key business enabler for the CSO, as well as strategies for how to get started building a secure cloud initiative. Please download the white paper for more information.
Tags : vmware, global cloud computing adoption, security and compliance, virtualized datacenter, securing cloud environments, secure cloud initiative
     VMware, Inc
By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance
     Vormetric, Inc.
By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching
     Waratek
By: WatchGuard     Published Date: Oct 16, 2012
Businesses of all sizes have leveraged virtualization to improve utilization and reduce costs. Virtualization - Are You Secure? This white paper explores the advantages of virtualization and the potential security challenges that come with it.
Tags : watchguard, infrastructure, virtualization, cloud computing, security, it security, data security
     WatchGuard
By: Websense     Published Date: Feb 16, 2010
This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.
Tags : tco, websense, web security, osterman, hybrid, security solutions
     Websense
By: Websense     Published Date: Sep 27, 2010
Social media isn't coming to banking institutions-it's here. For banks and their customers, social networks such as Facebook, LinkedIn and Twitter have become an integral part of everyday life.
Tags : websense, social network, facebook, linkedin, twitter, data risk, data security, web security
     Websense
By: Workday     Published Date: Jul 19, 2017
Today’s business climate demands that corporations have a flexible computing infrastructure. Because of the agility it provides, cloud computing is garnering interest in many organisations. As they look at such possible deployments, however, some CIOs become hamstrung by security concerns. They feel that the traditional method of securing information in premises-based systems is the best way. While that option worked for many years, the threat landscape today is more diverse and more potentially damaging than ever before.
Tags : security, it department, system set-up, cloud suppliers, frameworks, human resources, enterprise financial, planning data
     Workday
By: Workday     Published Date: Nov 03, 2017
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business.
Tags : 
     Workday
By: Zebra Technologies     Published Date: Jul 06, 2017
Stay ahead of risks inherent in modern connectivity, mobile integration and securing thermal barcode printers. This paper helps you leverage your IT know-how, by evaluating common security risks and tightening control with remote device management systems.
Tags : printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy
     Zebra Technologies
By: Zingbox     Published Date: Nov 08, 2017
The Internet of Things (IoT) is a rapidly expanding part of the global information economy, yet security exploits show that more attention needs to be paid to making the IoT safe. Companies deploying IoT infrastructure, whether for their own use or to provide IoT services, as well as the manufacturers of IoT devices, should look to build in security from day one. This report describes the challenges inherent in securing the IoT. And explains how IoT security differs from conventional IT security.
Tags : 
     Zingbox
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics