RSS feed Get our RSS feed

News by Topic

securing

Results 26 - 50 of 460Sort Results By: Published Date | Title | Company Name
By: Blue Lane     Published Date: Aug 31, 2007
Needing to implement a patch management solution to comply with SAS 70, Davidson found the solutions on the market lacking. They either required significant resources to test all patches, or were expensive automated solutions. Then, Davidson learned about Blue Lane Technologies, a concept that Davidson loved.
Tags : server virtualization, server security, network security, patch management, sas70, sas 70, compliance, sox compliance
     Blue Lane
By: Blue Lane     Published Date: Oct 01, 2007
The healthcare industry has benefited from the breakneck pace of digitization - spanning everything from payments to patient records to X-ray film - but it has also been increasingly exposed to greater risk. Efforts to increase healthcare provider productivity via increased digitization and system interconnectivity have to be counterbalanced against the growing concerns for patient privacy and a backdrop of increasing liability.
Tags : healthcare, health care, patient privacy, privacy, patch management, patch, patch server, hipaa
     Blue Lane
By: Bluecore     Published Date: Apr 03, 2019
If the very purpose of technology is to make our lives easier and allow us to work smarter, why do most email marketers use technologies that do the exact opposite? Itís time to break out of the Email Death Spiral and advance your marketing program with the next generation of email marketing technology. This guide explores exactly what your team needs to know to prepare for a successful change and how to best evaluate this next generation of email marketing technology, including: Understanding the next generation of email marketing technology Determining when itís time for a change Prioritizing value with a proof of concept Approaching the ESP selection process Securing buy-in for the change Building a successful retail marketing program around your new ESP Creating a foundation for long term success
Tags : retail marketing, esp, email marketing, marketing technology
     Bluecore
By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content Ė effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a ďmobile firstĒ strategy that manages and secures both mobile apps and content.
Tags : box, mobile first, securing information, mobile device management solutions, applications, enable management
     Box
By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing Systemô(UCS), and Cisco Nexus Switches.
Tags : nexgen, hybrid, flash, qos, quality of service
     Box
By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : ciso, cybersecurity, esg, it/security, it architecture
     Box
By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : cloud, it pros, security, dlp, cloud securiity
     Box
By: Brightidea     Published Date: Feb 05, 2016
Whatís in the Paper? We all know innovation is critical to a companyís survival, but how do you execute innovation? Todayís economic climate requires executives to amplify their innovation programs and processes. Innovation program management platforms can Ė and should Ė become the backbone of a sustained innovation program, propelling business value. How do you achieve innovation program ROI? With software that supports sustained innovation. Download this paper to learn how! Gain Insights On: - Securing Buy-In and Financial Commitment from Stakeholders - Supporting Processes with Innovation Program Management Software - Maintaining Momentum with Employee Engagement
Tags : 
     Brightidea
By: Brother     Published Date: Mar 08, 2018
Documents are an integral component to the successful operation of an organization. Whether in hardcopy or digital form, they enable the communication, transaction, and recording of business-critical information. To ensure documents are used effectively, organizations are encouraged to continually evaluate and improve surrounding workflows. This may involve automating elements of document creation, securing the transfer and storage of information, and/or simplifying the retrieval of records and the data contained within. These types of enhancements can save time, money, and frustration. This white paper will discuss top trends and requirements in the optimization of document-related business processes as well as general technology infrastructures for document management. It will also address how some office technology vendors have reacted to these trends to guide their design and development of products, solutions, and services.
Tags : documents, workflows, business process, document management
     Brother
By: CA Technologies     Published Date: Jan 09, 2015
This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely ó and reap the benefits of agile integration promised by this exciting new technology.
Tags : apis, risks of apis, apis can increase organization's risks, api security
     CA Technologies
By: CA Technologies     Published Date: Mar 12, 2015
Learn five simple strategies for securing APIs and see why they are an emerging technology for integrating applications using web technology.
Tags : api, mobile apps, mobile app, security
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely ó and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
     CA Technologies
By: CA Technologies EMEA     Published Date: Aug 03, 2017
APIs represent a great opportunity for the enterprise to integrate applications quickly and easily. But APIs can be a double-edged sword: promising agility, while at the same time increasing risk. But if an organization can address API security as an architectural challenge long before any development takes place, it can reap the rewards of this technological breakthrough safely and securely.
Tags : api, application programming interface, psd2, open banking, json, github
     CA Technologies EMEA
By: CareCloud     Published Date: Oct 25, 2013
In this white paper, you'll learn about: ē Gauging the success of your revenue cycle management processes ē Uncovering factors that hurt your practiceís finances ē Ensuring your practice is securing reimbursements in a timely manner ē Identifying missed revenue opportunities ē Finding areas where your practice could yield higher returns, and more.
Tags : carecloud, metrics for practice, practice profitability, resolution rate, first-pass resolution rate, fprr, revenue cycle management, accurate patient demographics
     CareCloud
By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‚Äźin
     Catapult
By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. Itís abouta change in your organizationís culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : cdw, external threats, malware, defense, internal threats, security
     CDW
By: CDW     Published Date: Jun 18, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program.
Tags : cdw, byod, bring your own device, mobile computing, smartphones, tablets, wireless, security
     CDW
By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data
     CDW
By: CDW     Published Date: Jun 30, 2015
Total Mobility Management (TMM) is a comprehensive platform that makes implementing, managing, and securing mobile devices simple.
Tags : mobility, apps, strategy, platform, tmm, risk management, productivity
     CDW
By: CDW-Trend Micro     Published Date: Mar 26, 2015
In todayís Ďalways on, always connectedí world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In todayís business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : endpoint security, data security, endpoint protection, enterprise protection, technology, security
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, itís critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security
     CDW-Trend Micro
By: Centrify     Published Date: Sep 08, 2015
Download this white paper to learn about managing and securing Macs and other mobile devices.
Tags : device management, security management, mobility, application security, management solutions
     Centrify
By: Centrify     Published Date: May 26, 2016
This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, todayís threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.
Tags : data security, security, cyber attacks, threat and vulnerability management
     Centrify
By: Centrify     Published Date: May 26, 2016
In todayís mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this ďperimeterlessĒ world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : security, endpoint security, access control, authentication
     Centrify
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics