RSS feed Get our RSS feed

News by Topic

asp

Results 326 - 350 of 510Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: Feb 05, 2015
This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.
Tags : integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.
Tags : cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This guide provides information on how to reduce risk in today's IT environment.
Tags : reduce risk in it environment, it environment security, data security breach prevention, preventive measures for data security
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This paper reveals how important is effective security software for banking threats.
Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.
Tags : security, virtualization, security approaches, kaspersky
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks
     Kaspersky
By: Workforce Software     Published Date: Feb 02, 2015
Leave administration is one of the most challenging aspects of workforce management and an area that continues to become more complicated as leave regulations—and lawsuits—increase. For employers, having to understand and comply with complex federal regulations, such as the Family and Medical Leave Act (FMLA), in addition to myriad local laws, union rules and company policies can be overwhelming. The task of complying with these many regulations often consumes a great deal of time for HR teams, especially those operating across multiple geographies.
Tags : workforce software, software, automate, outsource, fmla, act, cloud, management
     Workforce Software
By: Sage     Published Date: Jan 30, 2015
An appropriate time and attendance system that meets your organization’s needs can help to eliminate and even prevent many, if not most, of the negative aspects of inaccurate and unreliable timekeeping. Maintaining accurate and reliable time and attendance information makes it easier to keep a handle on labor costs, increases the accuracy of payroll, and reduces administration in the human resources (HR) department, thus saving time. This white paper outlines the top benefits of a time and attendance system and the positive effect automating your time and attendance process can have on your organization.
Tags : sage, payroll, labor costs, employee, attendance processes
     Sage
By: ThreatTrack Security     Published Date: Jan 22, 2015
According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”
Tags : threattrack, security, threat, track, information, admins, best, practices
     ThreatTrack Security
By: ThreatTrack Security     Published Date: Jan 22, 2015
South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.
Tags : threattrack, security, threat, track, information, admins, best, practices
     ThreatTrack Security
By: HP     Published Date: Jan 20, 2015
"Improving the operational aspects of a business can span the organizational chart, from line of business teams focused on the supply chain to IT teams reporting on communication networks and their switches. The goal is to capture the data streaming in from these various processes, and put Big Data techniques to work for you."
Tags : big data, hp haven, scalable, secure data platform, ecosystem, security
     HP
By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : collaboration solutions, risk management, business productivity, it efficiency, business users
     Intralinks
By: Kaspersky     Published Date: Jan 07, 2015
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.
Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
     Kaspersky
By: F5 Networks Inc     Published Date: Dec 22, 2014
The new requirements for application delivery mean adopting the principles behind cloud, DevOps, and SDN, and enabling emerging security models. Now you must provision apps in minutes instead of months, and with significantly reduced operational costs. Read this whitepaper to learn how you can manage every delivery aspect of users, applications, systems and infrastructure with an elastic, dynamic infrastructure designed to support these requirements.
Tags : application delivery, cloud, devops, sdn, operational costs
     F5 Networks Inc
By: Polycom     Published Date: Dec 18, 2014
Polycom and Quocirca surveyed over 800 business video conferencing users around the world on the state of video adoption. The global findings revealed that there distinct advantages beyond travel savings, including improved team work and productivity. This report explores why some organizations have embraced and benefited from the use of video communications and why some have not. It outlines the positive visual cultural aspects that drive adoption, as well as the challenges that seem to hold some organizations back.
Tags : business, video, advantages, travel, productivity, benefits, adoption, challenges
     Polycom
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, security
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Download Kaspersky Lab’s Security for Virtualization: Getting the Balance Right to answer your most pressing questions.
Tags : kaspersky, virtualization, security, virtual environment, business protection, business transformations
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity to learn more.
Tags : kaspersky, cybersecurity, employee knowledge, internet safety, cybercrime, security policy, phish, threats
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization? A new whitepaper from Kaspersky Lab, "Virtualization Security Options: Choose Wisely" will tell you.
Tags : kaspersky, virtualization, security, virtual environment, business protection, business transformations
     Kaspersky Lab
By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : video surveillance, access control, business intelligence, security
     Tyco Integrated Security
By: IBM     Published Date: Dec 02, 2014
Across the automotive industry, organizations are using analytics to transform all aspects of their business. In the vast majority of instances, the analytics performed is on data that is already available within the organization or wider automotive ecosystem, but has not yet been tapped to use its full potential. Analytics can unlock the value held in this data, helping to answer key “what if” questions across the organization and the value chain. For example, what if dealerships could better understand their customers’ digital journey? Or what if manufacturing could improve visibility into parts, assembly and vehicle inventory?
Tags : automotive analytics, automotive ecosystem, automotive manufacturing, advanced analytics
     IBM
By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, you’ll learn how Worklight Application Scanning helps you deliver applications that aren’t susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, you’ll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : application screening, user feedback, mobile app development, cloud-based services
     IBM
By: Kaspersky     Published Date: Nov 12, 2014
Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.
Tags : kaspersky, cybersecurity, cyberattack, hackers, it security, data protection
     Kaspersky
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics