device security

Results 226 - 250 of 507Sort Results By: Published Date | Title | Company Name
Published By: Tripp Lite     Published Date: Jun 28, 2018
When you’re designing a data center, server room or network closet, deciding which racks to deploy and how to configure them should be at the top of your list. Just like building a house, the surface details may steal the spotlight, but it’s the quality of the underlying foundation that makes the difference between success and frustration. Racks organize IT equipment, such as servers and network switches, into standardized assemblies that make efficient use of space and other resources. Depending on the options you choose, they can also improve power protection, cooling, cable management, device management, physical security, mobility, ease of installation and protection from harsh environmental conditions. Choosing the right racks and configuring them to match your needs will ensure that your IT equipment operates reliably and efficiently, saving your organization from costly downtime and other needless expenses.
Tags : 
    
Tripp Lite
Published By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : 
box, mobile first, securing information, mobile device management solutions, applications, enable management, it management, enterprise applications
    
Box
Published By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Okta     Published Date: Nov 09, 2015
Today, 61% of North American and European enterprise information workers are choosing their smartphones for work either on their own or from a company-approved list. According to Forrester’s Business Technographics® Global Devices And Security Workforce Survey, 2014, 53% of employees are unwilling to make any kind of sacrifice to their user experience in the interest of heightened security. Read this report to learn more about the results.
Tags : 
okta, user identity data, mobile security, forrester's business technographics, security, data management
    
Okta
Published By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
    
Cloudroute
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: OKTA     Published Date: Oct 23, 2017
As organizations and workplaces evolve, less control is exercised over devices, services, and people, leading to a gap with traditional security tools. Identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments. Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore what characteristics a strong authentication solution should include as we demo Okta’s Adaptive MFA solution.
Tags : 
    
OKTA
Published By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Motorola Solutions     Published Date: Jul 02, 2018
We all want our nation’s schools to be safe, secure learning environments where students can realize their full potential. This requires reliable, continuous communication among school personnel, both onsite and district-wide, plus the ability to instantly connect with first responders in an emergency. This seamless communication must be delivered over any network, from any location, using any device. Team Communications from Motorola Solutions provides this seamless integration, helping schools preserve the all-important safety of their students. Team Communications empowers educational institutions to transform how they communicate, enabling individuals to share real-time information to make schools safer and staff more productive. Schools across the U.S. use Team Communications from Motorola Solutions to deliver unified voice and data to administrators, teachers, maintenance, security, coaches, and other personnel, improving decision making, increasing visibility into school activit
Tags : 
    
Motorola Solutions
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuovo modello di sicurezza che vale la pena di studiare, e di imitare. La sicurezza enterprise si basa, tradizionalmente, su una strategia che blocca gli endpoint degli utenti e posiziona la rete all'interno di una sorta di perimetro fortificato. Oggi, questa strategia non è in grado di supportare né proteggere l'uso di device mobile e le funzionalità SaaS, che esistono al di fuori di quel perimetro. Di conseguenza, i Chief Information Security Officer (CISO) sono alla ricerca di soluzioni nuove, in grado di tutelare queste tecnologie e di adattarsi al modificarsi di minacce ed esigenze di business.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen ähnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich außerhalb der Festung befinden, nicht mehr unterstützen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lösungen umgesehen, die diese Technologien heute sichern können und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verändern.
Tags : 
    
CA Technologies EMEA
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
By thinking proactively about DDoS defense, organizations can build a comprehensive strategy to mitigate attacks. Choosing from on-premises security devices, cloud-scrubbing services, and a hybrid approach to DDoS protection allows organizations to customize their security strategy to their application architecture and business needs.
Tags : 
ddos, ddos defense, security
    
F5 Networks Inc
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Windows 10 is the best Windows yet, and at Microsoft, we are excited to deliver innovative Windows 10 experiences across a wide variety of world-class devices. Get the most out of Windows 10 with innovative hardware form factors that boost user productivity while reducing security risks—delivering more value at every price point. Download this buyer's guide to discover which Windows 10 Pro devices are right for your business.
Tags : 
    
Microsoft Windows
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
    
Microsoft Windows
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Mobility Helps Enterprises Enter a New Age
Tags : 
entrust, mobile, mobility, secure mobile assets, mobile devices, mobile device security, security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
Know the truth: Mobile devices more secure than traditional PCs
Tags : 
entrust, mobile devices, mobile, security, mobile security, mobile perception
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrust’s latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : 
entrust, security, mobile security, infographic, malware, mobile devices
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
entrust, certificates, mobile devices, security, device certificates, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
device certificates, identity, authentication, mobile world, information technology, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee