safe

Results 901 - 925 of 938Sort Results By: Published Date | Title | Company Name
Published By: Avaya     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Tags : 
new technology, best practices, competitive advantage, smart campus
    
Avaya
Published By: Symantec     Published Date: Oct 01, 2015
If you’d like to better understand Website Security or know somebody else who should, Website Security for Dummies is the book you’ve been waiting for. Symantec demystifies the science behind SSL authentication, encryption and more in the world-famous 'For Dummies' style, it’s The How-To Guide to keeping a company safe from online threats.
Tags : 
website security, ssl authentication, company security, online threats, security
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
This book can help you keep your websites and your business safe.
Tags : 
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Health O Meter     Published Date: Mar 08, 2016
When was the last time you really thought about your hospital’s scales? Most patients will step on a scale as part of their hospital visit. Caregivers record weight to track health, measure fluid retention, or calculate medication dosages. While many scales function well, overlooking your hospital’s scales can be costly.
Tags : 
asset management, hospital products, cost optimization, product management
    
Health O Meter
Published By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : 
mimecast, whaling, phishing, email attacks, email security, internet security, security, enterprise applications, business technology
    
Mimecast
Published By: AppDynamics     Published Date: Sep 20, 2017
Every industry is going through digital transformation. Whether retail, manufacturing, media, finance, or software - in order to survive organizations are changing the way they operate in order to meet the demands of today’s connected customers. Whether it’s Uber redefining urban transportation for consumers, Slack enabling teams to collaborate in totally new ways, or Docker rivaling legacy virtualization providers, innovation is being powered by technology, and it’s happening faster than ever before.
Tags : 
development operations, digital transformation, application, automation, safeguards
    
AppDynamics
Published By: CA Technologies     Published Date: Sep 13, 2017
"There's new legislation in place, that's expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across testing and development environments. It's the General Data Protection Regulation (GDPR). Are you ready for it? In this session, we’ll demonstrate how CA Test Data Manager helps to both mask your production data and to generate synthetic test data; a powerful combination to help you meet compliance needs and deliver quality applications. There will be a short section on the future of the tester self-service model that will enable testers to efficiently get access to the right test data."
Tags : 
    
CA Technologies
Published By: ESET     Published Date: Sep 07, 2011
This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.
Tags : 
eset, pua, potentially unwated application, software, unsafe, antivirus, unwanted, malware
    
ESET
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
An infographic showing how HP provides continuity for and from the cloud to keep your business running and your data safe whatever the scenario.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, data center
    
HP Enterprise Services
Published By: HP Enterprise Services     Published Date: Mar 25, 2014
An infographic showing how HP provides continuity for and from the cloud to keep your business running and your data safe whatever the scenario.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, enterprise applications
    
HP Enterprise Services
Published By: Eaton     Published Date: Jun 01, 2012
This white paper aims to fill that knowledge gap byproviding introductory-level information about what arc flashes are, why they're so hazardous and what steps data center managers should take to safeguard their employees and infrastructure.
Tags : 
arc flash, mitigation strategy, hazard analysis, ppe, personal protective equipment, ieee 1584, nfpa 70e, nclb, high-resistance grounding, business technology, data center
    
Eaton
Published By: Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : 
arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
    
Schneider Electric
Published By: Zebra Technologies     Published Date: Jun 15, 2017
Labeling blood and other samples at the time they are collected improves patient safety and helps prevent a host of problems related to misidentification — including many of the estimated 160,900 adverse events that occur in U.S. hospitals annually because of sample identification errors. There is a strong and growing body of evidence within medical literature that creating specimen identification labels on demand at the patient bedside with a mobile printer can significantly reduce errors. The Joint Commission’s National Patient Safety Goals (NPSG) advocate the use of two patient-specific identifiers, such as name and birthdate, whenever taking blood or other samples from a patient, and to label the sample collection container in the presence of the patient.
Tags : 
specimen, labeling, benefit, hospitals
    
Zebra Technologies
Published By: Commdex     Published Date: Nov 18, 2013
Commdex will provide tips for how FirstNet Can Deploy a National Public Safety Broadband Network - Quickly and Cost Effectively.
Tags : 
    
Commdex
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security, business technology
    
Webroot
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Read this whitepaper—Give All the People What They Want (Safely)—to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.
Tags : 
bring your own device, byod security, byod management, byod challenges, byod strategy, emm, enterprise mobility
    
Good Technology Corporation
Published By: Kaspersky Lab     Published Date: Feb 20, 2014
Don’t get caught in the crossfire. Read our special report "Who's spying on you?" to find out more about the threats of malware to your business.
Tags : 
kaspersky, malware threats, cyberespionage, internet perpetrators, security technology, internet safety, business protection, cybercriminals, cybersecurity, defend your network, defend your data, data management, innovative protection, sophisticated threats, essential data, confidential information, security, it management
    
Kaspersky Lab
Published By: UsedCisco.com     Published Date: May 14, 2008
An incredible array of organizations from both the public and private sector are buying pre-owned. These organizations include global public commercial enterprises, small businesses, ISP's, telecoms, non-profits, local and US government, military and educational institutions of all kinds. An overwhelming majority of the customers we've surveyed mention the same fact - they just didn't know pre-owned was a real, safe and viable option. In this guide, we'll present you with critical information you need to make the switch.
Tags : 
pre-owned, used, cisco, usedcisco, used cisco, green, cost, usedcisco.com
    
UsedCisco.com
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture. We also share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, buyer's guide, data safety, cybersecurity
    
Akamai Technologies
Published By: ALE     Published Date: Dec 05, 2018
A highly resilient data and communications network that supports easy accessibility and cost efficiency is a requirement for hospitals and medical facilities that seek to leverage technology to digitally transform their processes. Alcatel-Lucent Enterprise (ALE) provides a broad range of robust and secure networking, infrastructure and communication products and services to connect patients, caregivers, staff and the entire healthcare ecosystem. ALE specialized data and communications networks for healthcare providers optimize the care pathway through improved communications and more efficient processes to provide more timely, safe and effective care. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: Red Hat     Published Date: Dec 27, 2012
In this paper, Frost & Sullivan examines historical concerns about Linux virtualization, and assess why, when, and how enterprises can safely virtualize their critical Linux workloads. They also review a Linux virtualization that meets needs.
Tags : 
red hat, linux, workload, virtualization, critical workload, enterprise applications, it environment, data management, business technology, data center
    
Red Hat
Published By: HERE Technologies     Published Date: May 28, 2019
Loss of life in traffic death accidents in the U.S. is on the same scale as 25 full Boeing 747s crashing and leaving no survivors, in six months. It is a stark statistic which explains why the US Department of Transportation and the National Safety Council want to eliminate traffic deaths in the US within 30 years with their Road to Zero campaign. HERE location intelligence already supports more than half of the new elements included in the Federal Highway Administration (FHWA) guidance on crash reporting In the U.S. alone HERE currently works with more than 20 departments of transport and several large cities on improving traffic safety. As the world’s leading location platform, HERE also supports the global drive to Vision Zero.
Tags : 
impact, traffic, data, security, transportation, congestion, highway, crashes, vision, intelligence
    
HERE Technologies
Published By: Rosetta Stone     Published Date: Jul 05, 2017
Virtually all growth in the U.S. Labor force in the next four decades is expected to come from immigrants and their children. With this growth comes the need for manufacturers to enable their workforce to communicate more effectively. In order to increase productivity and reduce safety incidents, manufacturers are implementing English language learning programs.
Tags : 
workforce communication, language learning, language software, english, manufacturing
    
Rosetta Stone
Start   Previous    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee