technology security

Results 176 - 200 of 472Sort Results By: Published Date | Title | Company Name
Published By: CEB     Published Date: May 19, 2014
This document helps general counsel identify potential information technology issues that may create legal or regulatory risks. General counsel should use the ten questions and our guidance on what to listen for in the CIO's response to pressure test the company's IT management and security controls.
Tags : 
ceb, cio, information risk, it management, security controls, general counsel, regulatory risks, security
    
CEB
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Founded in 1997, Benchmark Senior Living is the largest senior living provider in New England. The community in Shelton, Connecticut is just a short drive from the Connecticut coastline—the Split Rock community is home to about 50 assisted living and memory care residents. In addition to being a LEED-certified facility, Split Rock also exemplifies Benchmark Senior Living’s goal to leverage technology to enrich the lives of residents. To that end, the facility incorporates a range of communication technologies to promote engagement with family and the community. Read this case study to learn about how Benchmark Senior Living selected an integrated solution from STANLEY Healthcare and STANLEY Security encompassing emergency call from portable pendants and fixed call points, wander management, environmental monitoring and access control to improve resident's lives.
Tags : 
healthcare, resident safety, senior living, assisted living, locating system, wi-fi
    
STANLEY Healthcare
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Electronic infant protection systems have, to date, been department-level solutions. A new generation of Wi-Fi technology, however, expands infant protection hospital-wide, presenting new opportunities. This white paper reviews the steps required for healthcare IT professionals to select, design and deploy a Wi-Fi Infant Protection solution, in cooperation with clinical and security peers.
Tags : 
wi-fi, infant protection, hospitals, security, healthcare
    
STANLEY Healthcare
Published By: Mitel     Published Date: Jun 29, 2016
It's no secret that mobile technology has revolutionized the way consumers conduct their lives. Mobile technology has become ubiquitous, influencing the business workplace and workforce. Last year, IDC predicted that 75% of the US and nearly 40% of the global workforce would be mobile and signs indicate that the rate of mobile growth is only being accelerated by the advancement of cloud technology, improved security, and more reliable network access.
Tags : 
mitel, workplace, mobile technology, idc, business communications, business technology
    
Mitel
Published By: Mitel     Published Date: Mar 30, 2017
It's no secret that mobile technology has revolutionized the way consumers conduct their lives. Mobile technology has become ubiquitous, influencing the business workplace and workforce. Last year, IDC predicted that 75% of the US and nearly 40% of the global workforce would be mobile and signs indicate that the rate of mobile growth is only being accelerated by the advancement of cloud technology, improved security, and more reliable network access.
Tags : 
    
Mitel
Published By: Genesys     Published Date: Feb 12, 2019
Everyone says they’re “in the cloud,” but most technology leaders would agree that not all clouds are created equal. When evaluating a cloud contact centre solution for your business, it’s important to understand the difference between a true Cloud 2.0 application and traditional software, including which features to look for and why those features are important. Download this eBook and learn: How a true Cloud 2.0 model is built to provide levels of reliability, scalability, flexibility and security that that far exceed those of previous generations The benefits of utilising a platform built on microservices architecture How to take your business to the next level with a built to scale cloud contact centre platform
Tags : 
    
Genesys
Published By: Juniper Networks     Published Date: Aug 03, 2017
Security, network complexity and growing volumes of traffic are the top factors affecting enterprise network strategy, based on a recent IDG Research Services poll among IT leaders. Here’s what they’re planning to do about these issues
Tags : 
information technology, data security, network complexity, traffic volume, network strategy
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Business evolution and technology advancements during the last decade have driven a sea change in the way data centers are funded, organized, and managed. Enterprises are now focusing on a profound digital transformation which is a continuous adjustment of technology management resources to deliver business results, guided by rapid review of desired outcomes related to end clients, resources, and budget constraints. These IT transitions are very much part of the competitive landscape, and executed correctly, they become competitive differentiators and enable bottom line growth. These outcomes are driving data centers to virtualization, service-oriented architectures, increased cybersecurity, “big data,” and “cloud,” to name a few of the key factors. This is completely rethinking and retooling the way enterprises handle the applications, data, security, and access that constitute their critical IT resources. In essence, cloud is the new IT.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 05, 2018
The role of IT is fundamentally changing from a cost-efficient enablement technology to a more strategic element of the enterprise. For companies born before the digital era, IT is a key player on their path to digital transformation; for more recent businesses designed with technology at their core, IT represents a foundational pillar on top of which everything else is built. With this shifting role, IT’s decades-long emphasis on TCO is being eclipsed by a new-found focus on security and automation. Whether it’s the continuous risks posed by a dynamic threat landscape, the threat of digital disruption, or an inability to keep pace with the latest trends, virtually every enterprise needs to be more agile. And, with the continued evolution of compute, storage, and applications, networks have been exposed as a bottleneck to change.
Tags : 
enterprise, cloud, data, center, networking, juniper
    
Juniper Networks
Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : 
cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits, business technology
    
Webroot UK
Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management
    
Brainloop
Published By: Microsoft Azure     Published Date: Apr 05, 2018
Even when you’re confident that a move to the cloud is good for your business, it’s natural to have questions and concerns about making the change. After all, if your business is running effectively with on-site technology, you’ll likely want to learn more about the security and payoffs from a cloud-based suite of tools before taking the next step.
Tags : 
    
Microsoft Azure
Published By: Symantec     Published Date: Jul 30, 2014
This Symantec paper shows how SSL technology can help a start-up build its business online.
Tags : 
ssl technology, start up security, case study, symantec, norton, security
    
Symantec
Published By: F5 Networks Inc     Published Date: Sep 05, 2012
This paper takes a close look at the causes of bottlenecks throughout the delivery chain, and explores an integrated approach that eliminates inefficiencies to boost performance and security.
Tags : 
delivery optimization, application, technology, integrated approach, performance, security
    
F5 Networks Inc
Published By: IBM Corporation     Published Date: Oct 20, 2011
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Tags : 
ibm, guardium, technology, data, security, privacy, risk reduction
    
IBM Corporation
Published By: Enterprise Mobile     Published Date: Sep 30, 2013
: Interested in knowing what CIOs and other IT executives really think about the future of enterprise mobility? Enterprise Mobile uncovers the results of a survey conducted to assess the business impact of enterprise mobility based on input from technology leaders. The webinar provides tips to prepare for the future of enterprise mobility, secrets to removing barriers to mobile strategy implementation, and shares trends around how other companies are embracing mobile security.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Published By: Intralinks     Published Date: Jun 18, 2013
Intralinks a New York based company, has announced the general availability of its new Intralinks VIA service, and unveiled new brand containers for existing core services in extra-corporate document-based collaboration. Intralinks VIA, in development for nearly two years, is initially positioned to serve "the rest" of the employee population inside customers, which already use Intralinks. Download this white paper to learn more about the role of Intralinks in the broader business collaboration market, with more robust security, controls, and other necessary features for enterprise use.
Tags : 
enterprise, file sharing, collaboration, technology, market, security, new news, networking, knowledge management, business technology
    
Intralinks
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
Published By: AWS     Published Date: Nov 15, 2018
"Cloud migration can be fraught with inevitable speed bumps. IT management must keep pace while infrastructures grow more complex, and security teams must safeguard their organization’s posture even as they relinquish control over some key technology—all while business teams must continue to predict and manage costs along the way. There are ways to navigate this process more effectively. Register for your complimentary copy of the ebook How to Get Your Cloud Migration Strategy Right. You’ll learn how to make your cloud migration journey successful, including: • How to make the transition to the cloud as seamless as possible • Why you need full visibility into your infrastructure before, during, and after migration • How IT, security, and operations teams can maximize the ROI from moving to the cloud"
Tags : 
    
AWS
Published By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee