secure app

Results 26 - 50 of 502Sort Results By: Published Date | Title | Company Name
Published By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle CX
Published By: Gigamon     Published Date: Oct 25, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing, it management, business technology
    
Digital Realty
Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron
Published By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : 
android, apps, vpn, work, multiple devices, emm
    
MobileIron
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape Note: The report is in english.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and efficiency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
    
Akamai Technologies
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Dell EMC     Published Date: May 12, 2016
Today’s global business model presents both opportunities for business agility and challenges for IT management. To do business effectively, organizations require an IT infrastructure at remote locations that delivers applications and data with high performance and high reliability. Download this paper and learn how you can enjoy the benefits of having remote offices without the need for an entire IT staff to support it.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Enterprises use data virtualization software such as TIBCO® Data Virtualization to reduce data bottlenecks so more insights can be delivered for better business outcomes. For developers, data virtualization allows applications to access and use data without needing to know its technical details, such as how it is formatted or where it is physically located. For developers, data virtualization helps rapidly create reusable data services that access and transform data and deliver data analytics with even heavylifting reads completed quickly, securely, and with high performance. These data services can then be coalesced into a common data layer that can support a wide range of analytic and applications use cases. Data engineers and analytics development teams are big data virtualization users, with Gartner predicting over 50% of these teams adopting the technology by 202
Tags : 
    
TIBCO Software GmbH
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.
Tags : 
mobile connectivity, byod, device security, policy compliance, enduser, pulse secure, mobile worker, networking, security, it management, wireless
    
PulseSecure
Published By: Dell     Published Date: May 09, 2017
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees
Tags : 
it maintenance, pc lifecycle, pc infrastructure, pc support, pc lifecycle management
    
Dell
Published By: Dell EMC     Published Date: May 09, 2018
Millennials are reshaping the world of work through their knowledge of new technologies, work habits, and attitudes of the 21st-century workplace. At the same time, IT departments are working to add flexibility to the way they are supporting the Millennial worker. Yet it’s not just about IT providing the right tools and devices to its employees so they can get their jobs done effectively; IT needs to offer an overall workplace ecosystem that is secure and innovative. In September 2016, Dell commissioned Forrester Consulting to conduct a study with 560 information workers across all industries in Australia, India, the UK, and the US. Learn more about the working habits that emerged and how IT departments can apply these insights to future deployments. Download Report! Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor Intel, the Intel logo, Xeon and Xeon Inside are the trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Entrust Datacard     Published Date: Sep 28, 2016
This white paper approaches details all of the areas that should be deployed properly and regularly monitored and maintained when deploying SSL/TLS.
Tags : 
ssl/tls, ssl/tls best practices, secure sockets layer, transport layer security, security, application security, protection
    
Entrust Datacard
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
    
Red Hat
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Dell     Published Date: Nov 09, 2017
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, security, data center
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee