RSS feed Get our RSS feed

News by Topic

securing

Results 126 - 150 of 472Sort Results By: Published Date | Title | Company Name
By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : data loss, security, file sharing, mobile workforce
     Citrix ShareFile
By: Entrust Datacard     Published Date: Jun 09, 2017
The rapid adoption of Office 365 means that work created using the Microsoft product contains a large amount of the business world’s sensitive information. In fact, in most enterprises using Office 365, more than half of that highly valuable information — including business plans, sales data, product designs, M&A details and financial forecasts — is contained within Excel, PowerPoint, Word, Outlook and other Microsoft software. Securing the information created with its products has emerged as a primary concern for CSOs, CIOs, IT departments and other C-level executives.
Tags : 
     Entrust Datacard
By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
     IBM
By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
     Palo Alto Networks
By: Juniper Networks     Published Date: May 17, 2017
Securing the road map to your future-ready netowork. Download now to learn more!
Tags : 
     Juniper Networks
By: Entrust Datacard     Published Date: May 10, 2017
The rapid rise of digital business is moving public key infrastructure (PKI) into the spotlight. Once commonly viewed as a deep-weeds technology reserved for niche applications, PKI is now emerging as a core technology for securing cloud, mobile and Internet of Things (IoT) initiatives.
Tags : digital, cloud, cloud computing, internet of things, intrastructure
     Entrust Datacard
By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
     IBM
By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : endpoints, employees, security landscape, security leaders, it security, unified endpoint management
     IBM
By: IBM     Published Date: May 01, 2017
In October 2016, IBM commissioned Forrester Consulting to evaluate the means by which enterprises are managing and securing various endpoint form factors today and how strategies will change over the next three years. In conducting an in-depth survey of 556 IT and security leaders in the US, the UK, Germany, India, and Australia, Forrester found that while enterprises have a decentralized approach to managing and securing smartphones, tablets, laptops, and IoT today, they will move to a more consolidated and cognitive approach by 2020. Download report to learn more.
Tags : ibm, consulting, it security, smartphones, tablets, laptops, enterprise management
     IBM
By: Lenovo and Intel®     Published Date: Apr 28, 2017
The Real Impact of Body Cameras: Unprecedented Secure Storage Demand Body cameras have become a critical component of campus and community policing — they protect everybody’s interests. However, gathering, securing, storing, and managing the terabytes of content created on a monthly basis can be daunting even for the most sophisticated IT teams. In this eBook, we provide a comprehensive look at this growing challenge and how you can get in front of it! Read this eBook now.
Tags : lenovo, higher education, body cameras, campus policing, campus security, data managing, securing data, securing content
     Lenovo and Intel®
By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
     Entrust Datacard
By: Palo Alto Networks     Published Date: Apr 25, 2017
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Here’s what you need to know.
Tags : 
     Palo Alto Networks
By: Okta     Published Date: Apr 17, 2017
In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.
Tags : 
     Okta
By: Comcast Business     Published Date: Apr 13, 2017
The Internet of Things is perhaps one of the most transformative technologies of our time. The ability to connect devices and services to increase efficiencies, streamline operations and reduced manual labor has permeated multiple facets of our lives, enabling us to interact with technology and data in ways previously thought impossible. Download now!
Tags : 
     Comcast Business
By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
     Code42
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise for enterprise IT. Within the SDDC, the benefits of server virtualization are extended to storage and networking, so the entire infrastructure can be abstracted and centrally managed under a unified platform. IT teams are able to leverage unprecedented levels of virtualization, orchestration, and automation to achieve the services-based delivery model that enables true digital transformation.
Tags : data center, networking
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise forenterprise IT. Within the SDDC, the benefits of server virtualization areextended to storage and networking, so the entire infrastructure can beabstracted and centrally managed under a unified platform. IT teams areable to leverage unprecedented levels of virtualization, orchestration, andautomation to achieve the services-based delivery model that enables truedigital transformation.
Tags : data center, networking
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise for enterprise IT. Within the SDDC, the benefits of server virtualization are extended to storage and networking, so the entire infrastructure can be abstracted and centrally managed under a unified platform. IT teams are able to leverage unprecedented levels of virtualization, orchestration, and automation to achieve the services-based delivery model that enables true digital transformation.
Tags : data center, networking
     McAfee
By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : enterprise, mobile security, basics, ebook, lookout, emm, mdm
     Lookout
By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
     Entrust Datacard
By: DigiCert     Published Date: Mar 16, 2017
This webinar provides an overview from both a healthcare provider organization and medical device manufacturer perspective.
Tags : internet of things, healthcare, cybersecurity, medical devices, risk assessment
     DigiCert
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
By: Extreme Networks     Published Date: Feb 23, 2017
ABI Research’s Securing Medical Devices Technology Analysis Report analyzes the current risks posed by medical devices, noting various security issues, potential vulnerabilities, and the threat landscape. It reviews implementation mechanisms and efforts in medical device cybersecurity and safety. The final section looks at how the healthcare ecosystem is responding to the issues and the vendors driving change.
Tags : abi. healthcare, cybersecurity, medical
     Extreme Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics