RSS feed Get our RSS feed

News by Topic

securing

Results 101 - 125 of 465Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : secure web gateway, web application, cloud application, encryption, web threats
     Symantec
By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security
     Secure Computing
By: DocuLex     Published Date: Jan 01, 2001
Simply the most cost efficient option for securing your organizations email awaiting data discovery and fulfilling regulatory compliance.
Tags : storage management, compliance, retention management, electronic discovery, regulatory compliance, retention
     DocuLex
By: VMware AirWatch     Published Date: Sep 21, 2016
Digital transformation (DX) is the driving force behind new worldwide initiatives in financial services. However, a recent IDC survey discovered that fewer than 5% of institutions have started or completed a digital transformation strategy. Historically, financial institutions focused on the use of mobility to directly drive improved customer experiences to their customers' devices. However, as consumer sophistication with mobility increases — particularly among younger generations —so too does the need to enable mobility for the enterprise worker. This Market Spotlight explores these issues in the larger DX context.
Tags : 
     VMware AirWatch
By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : cloud, cloud service providers, cloud security, cloud applications
     Symantec
By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : entrust, enterprise authentication, security, identity security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices, security
     Entrust Datacard
By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : enterprise, mobile security, basics, ebook, lookout, emm, mdm
     Lookout
By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
Securing Mobile Identities & Devices
Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency.
Tags : identity guard, cloud services, secure, mobile devices, business efficiency, corporate networks, secure email, security
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s cloud-based PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.
Tags : entrust, identityguard, pki, certificate based security, security, pki software, cloud
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI).
Tags : identity guard, cloud services, pki, secure, mobile identities, devices, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : identity guard, enterprise, securing identities, corporate network, mobile platforms, security
     Entrust Datacard
By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
     Lookout
By: F5 Networks Inc     Published Date: Feb 18, 2015
In this article, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve when it comes to securing apps in a mobility-focused world.
Tags : application security, mobility-focused world, application solutions
     F5 Networks Inc
By: IBM     Published Date: Sep 30, 2016
See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise’s data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more
Tags : ibm, security, office 365, access management deployment, access management, enterprise data, cloud, security measures
     IBM
By: Juniper Networks     Published Date: May 17, 2017
Securing the road map to your future-ready netowork. Download now to learn more!
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 21, 2017
IHRE ROADMAP FÜR EIN ZUKUNFTSSICHERES NETZWERK
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 21, 2017
TRACEZ LA VOIE DE VOTRE RÉSEAU DE DEMAIN
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Aug 08, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
     Juniper Networks
By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
     Venafi
By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
     Venafi
By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance
     netForensics
By: NetProspex     Published Date: May 12, 2014
While collecting marketing data is easy, that data is not cast in stone. Securing a marketing data management plan that you can rely on is imperative. This guide provides actionable steps to clean up your data and increase conversions.
Tags : marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services
     NetProspex
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics