enterprise security

Results 226 - 250 of 1055Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More effective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Umbrella is a proven service provider whose security services are completely nondisruptive. Download this whitepaper to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More efective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, frewalls, and sandboxing alone. A mere 30 minutes from now, any business can be more secure than it was before. That’s the simple reality of DNS-layer security.
Tags : 
    
Cisco Umbrella EMEA
Published By: Juniper Networks     Published Date: Feb 01, 2016
Download this eGuide and learn the following: How the cloud and mobile have changed the enterprise How to manage the security risks of shadow IT Benefits and adoption strategies for shadow IT How the Juniper Unite architecture can help
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
Download this TechTarget report and learn how to: Improve operational efficiency Strengthen end-to-end enterprise security Find the right automation solution Deliver bottom-line results
Tags : 
    
Juniper Networks
Published By: IBM     Published Date: Jun 16, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
enterprise infrastructure, big data, mobility, data center, it infrastructure, it security technologies, virtualizing infrastructure, converging technologies, analytics
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : 
risk-based application security, security management, application security, software applications
    
Group M_IBM Q1'18
Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network survival, network security management, best practices, firewalls, hacker detection
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime, networking
    
McAfee
Published By: MobileIron     Published Date: Jul 31, 2015
To better understand what Windows 10 means for the modern enterprise, this white paper provides a technical overview of these and other new features in the latest OS release. It also includes a brief overview of how the enterprise architecture has evolved and how Windows 10 enables IT leaders to use this fundamental architecture shift as a catalyst for business transformation.
Tags : 
modern enterprise, enterprise architecture, business transformation, windows 10, security
    
MobileIron
Published By: MobileIron     Published Date: Jul 31, 2015
Windows 10 is a major OS overhaul that unifies device and security management for the modern enterprise architecture by converging separate OS versions onto one platform managed by an EMM console. This Infographic details 10 tips for ensuring you and your organization are ready to upgrade to Windows 10.
Tags : 
windows 10, emm, enterprise mobile management, mobile it administrators, security
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2015
This is an article about how enterprise mobility management (EMM) suites help organizations integrate mobile devices into their security frameworks and systems and information technology life cycles.
Tags : 
enterprise mobility management, mobile devices, security framework, mobile devices, data encryption
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in mobile and cloud security innovation for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. We ensure customers can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, app security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerry’s new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In today’s highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, application protection, app security
    
MobileIron
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee