RSS feed Get our RSS feed

News by Topic

technologies

Results 376 - 400 of 3514Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : dns, rdns, security, zero trust security, malware, data, network security
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : security, perimeter security, zero trust, cloud, enterprise security
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile."
Tags : zero trust, security, cyber security, cloud
     Akamai Technologies
By: CA Technologies     Published Date: Aug 01, 2014
This paper offers a look at the obstacles of prior generations of service management platforms, and it reveals how a new generation of solutions addresses some of these fundamental limitations.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Aug 01, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).
Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.
Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A buyer's guide for executives.
Tags : it service management solutions, itsm
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
How CA Cloud Service Management Speeds Deployment and Time to Value.
Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A buyer's guide for executives.
Tags : it service management solutions, itsm
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
How CA Cloud Service Management Speeds Deployment and Time to Value.
Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : improving consumer experience, optimal it service delivery, cloud service management
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.
Tags : cloud service management
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A buyer's guide for executives.
Tags : it service management solutions, itsm
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A buyer's guide for executives.
Tags : it service management solutions, itsm
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
How CA Cloud Service Management Speeds Deployment and Time to Value.
Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
How CA Cloud Service Management Speeds Deployment and Time to Value.
Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
How CA Cloud Service Management Speeds Deployment and Time to Value.
Tags : cloud service management, speed up deployment, ca cloud service management, accelerate time to value
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : improving consumer experience, optimal it service delivery, cloud service management
     CA Technologies
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics