safe

Results 901 - 925 of 947Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: May 14, 2014
In today’s world of explosive data volumes, midmarket companies face a growing number of challenges when it comes to safeguarding data, and today's approaches to backup and data protection are falling short. The Brief outlines HP solutions to meet IT needs for backup appliances that tightly integrate deduplication, data protection and recovery.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication, it management, data management
    
HP
Published By: Adobe     Published Date: Mar 03, 2017
Today, customer identity is the only constant in digital marketing. But as consumers switch from desktop to mobile, they are more and more difficult to recognize. But it’s not impossible. The Adobe white paper, Managing Anonymous and Authenticated Experiences Across the Customer Lifecycle, explains best practices to identify your anonymous and authenticated customers while complying with regulations, contracts, and industry standards. Read the paper to learn: • The benefits of well executed personalization • How to navigate the landscape between anonymous and authenticated data • Safe and effective uses of consumer information • The technological building blocks to put these new methods to work
Tags : 
personalization, authenticated data, anonymous data, consumer information, customer life cycle, customer experience
    
Adobe
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
McAfee
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360
Published By: Tyco Integrated Security     Published Date: May 05, 2015
Download this white paper to discover why many pharmaceutical companies are turning to proactive strategies to assess and respond to threats.
Tags : 
global supply chain, medication, security threats, product tampering, security goals, security, data management
    
Tyco Integrated Security
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
This report provides details on the most common attack methods used by cyber-criminals, how they operate, and the technologies you need to stay safe.
Tags : 
mcafee, intel, security, cyber, criminal, networking, data management
    
Intel Security
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
Published By: Flexera     Published Date: Apr 17, 2019
How is enterprise security like a commercial airliner? Preventative maintenance and regular, in-depth inspections keep jumbo jets operating safely, and the same approach will protect your enterprise security, too. When you consider the widespread security vulnerabilities, the massively intertwined application dependencies, the diversity of deployment environments, and the potential device takeover of mobile apps, keeping your applications safe is a mind-boggling job. Traditional manual approaches are no longer practical. Our exclusive white paper, “Keeping Your Application Fleet Flying Risk Free,” will help you establish the preflight checks and regular inspections that keep the applications in your portfolio running reliably and securely. Download it today.
Tags : 
    
Flexera
Published By: Microsoft Office 365     Published Date: Mar 04, 2016
Discover how easy it is to mobilize, improve, and do more for your business when you download the free eBook: Anytime, anywhere – Learn more about how a mobile employee’s working style lead to less stress and increased productivity. Safety first – Learn about moving to cloud storage and how it can lift the burden of securing your data from your shoulders. Teamwork makes the dream work – Read more about syncing your information so your teams’ devices can enable them to stay agile and responsive.
Tags : 
    
Microsoft Office 365
Published By: Cloudroute     Published Date: Jun 01, 2016
Cloud computing has changed the way businesses and people think about using technology to serve their needs. Too many, cloud computing is nothing but hype and overblown as the new direction for Information Technology. But to many more, cloud computing represents the future of how every business should plan, operate and execute applications, systems and processes. Goldman Sachs forecasts spending on cloud computing infrastructure and platforms will grow at a 30% compound annual growth rate (CAGR) from 2013 through 2018 compared with 5 percent growth for overall enterprise IT. Moreover, Forrester recently revised its 2011 forecast of the public cloud market size upward by 20 percent. Regardless, it is important to know what cloud computing is.
Tags : 
    
Cloudroute
Published By: Panaya     Published Date: May 17, 2017
Avoid the top counterproductive UAT practices and gain user adoption. Read the eBook to simplify UAT and execute testing cycles faster and safer.
Tags : 
acceptance testing, uat testing, user acceptance testing, uat environment
    
Panaya
Published By: Citrix ShareFile     Published Date: Apr 12, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: 8x8 Inc.     Published Date: Nov 17, 2016
Effective quality management lets you improve the performance of contact center agents—and deliver the customer experience your business expects. The ICMI Tool Kit: Quality Management in the Contact Center provides valuable tips you can apply to start improving your contact center operations today. Developed by International Customer Management Institute (ICMI), a leader in contact center training and consulting, the tool kit lays out the foundations of an effective quality management program and offers a step-by-step approach to creating an effective program. Then it provides details to help you: • Perform effective coaching using the SAFE coaching framework • Calculate the ROI of your training and coaching investments • Developing a peer mentor program
Tags : 
    
8x8 Inc.
Published By: Cox Business     Published Date: Dec 19, 2016
Exposing data or suffering downtime not only creates risks to patient safety, supports identity theft and damages the hospital's reputation, but can also result in signi?cant HIPAA penalties. The costs include the time your staff spends responding to the attack and lost productivity when systems are unavailable or work needs to be redone. Investing in computer and network security is a smart ?nancial decision for hospitals.
Tags : 
    
Cox Business
Published By: Datastax     Published Date: Aug 03, 2018
When you think enterprise ecommerce in the Right-Now Economy, you need to know that it all starts with a distributed cloud database built for hybrid cloud. From Safeway to eBay to Macy’s to Sony, leading companies across industries use DataStax to power their ecommerce initiatives. Read this ebook for a look into exactly how they use us and the results they’ve achieved.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
The public sector has invested in big time in big data. But there’s one thing most public sector entities are dropping the ball on: real-time data, and how it can be combined with big data to increase citizen safety and make mission-critical digital transformation projects happen on-time and on budget. Read this white paper to learn why public sector entities need both big data and real-time data if they are going to deliver on their digital transformation promises.
Tags : 
    
Datastax
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Partnering with Spectrum Enterprise sustains client loyalty by instilling confidence in how the bank operates, provides superior network service level agreements that ensure minimal downtime and assures smoother state and FDIC audits thanks to cybersecurity safeguards such as built-in redundancy and private network service.
Tags : 
    
Spectrum Enterprise
Published By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : 
gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Jul 09, 2018
Even with the rise of digital payments, cash is still a popular form of payment. According to the Federal Reserve, consumers use cash to pay for nearly one-third of all retail transactions. For many retailers, a completely "cashless society" is nowhere in sight. Cash management remains one of the most important aspects of managing a retail operation, particularly at quick service restaurants (QSRs) and convenience stores, where transactions are smaller and cash is a preferred method of payment. This white paper, Boost Profitability by Automating Cash, sponsored by Fiserv and Fast Casual, details the steps to manage cash properly and boost profit for your business. Uncover the top reasons and flexible options to automate your cash management. • Time savings • Theft deterrence • Higher accuracy • Better customer service • Real-time data
Tags : 
cash automation, smart safe, cash loss, cash handling, automated cash handling, cash management, cash reconciliation, manual cash reconciliation
    
Fiserv
Published By: Cisco and NVIDIA Corporation     Published Date: Apr 02, 2018
These are interesting and challenging times to be in business. Digital forces, such as the cloud, big data, mobility, and mobile apps, are disrupting tried-and-true business models, as well as entire industries. These transformational advances are producing complexity, while workers are demanding simplicity. They require centralized infrastructures to keep information safe, even as agility and flexibility rule the day.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cardinal Health     Published Date: Dec 28, 2017
Identifying process improvements and safety standards, evaluating efficiency of current procedure supply, and uncovering new cost savings initiatives are critical components to understanding hidden waste. In order to find savings in that waste you need to take a critical look at your clinical and supply chain practices. Explore this infographic to understand how a Cardinal Health clinical assessment can benefit your ASC by uncovering waste and identifying savings
Tags : 
    
Cardinal Health
Published By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
    
DigiCert
Start   Previous    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee