technology security

Results 301 - 325 of 528Sort Results By: Published Date | Title | Company Name
Published By: Microsoft     Published Date: Jul 20, 2018
When you’re in the software business, your resources can be spread pretty thin. You like to stay focused on building great software, but there are always distractions— from supporting sales opportunities to assisting with customer deployments and troubleshooting existing installations. With so much time spent maintaining the status quo, few cycles remain for modernizing your technology, streamlining internal operations, delivering new customer value, and broadening your customer base. More likely than not, your offerings are based on an on-premises approach, forcing you and your customers to spend considerable time on essential requirements like infrastructure, scalability, availability, and security. Today, you still must deliver on those essentials, but the solutions you’re building—or, more accurately, the solutions you want to be building—need to do a lot more: support millions of users, span the globe, make sense of petabytes of data, and wow users in new ways. At the same time, y
Tags : 
    
Microsoft
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
NetCompany, a services company in the Nordics, needed to provide a state-of-the-art technology solution for document sharing and team collaboration while ensuring robust security for client documents. Learn how Documents Cloud Service helped.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Kaspersky Lab     Published Date: Feb 20, 2014
Don’t get caught in the crossfire. Read our special report "Who's spying on you?" to find out more about the threats of malware to your business.
Tags : 
kaspersky, malware threats, cyberespionage, internet perpetrators, security technology, internet safety, business protection, cybercriminals, cybersecurity, defend your network, defend your data, data management, innovative protection, sophisticated threats, essential data, confidential information, security, it management
    
Kaspersky Lab
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats, zero day attacks, ultimate protection, security
    
Webroot UK
Published By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : 
navisite, technology, cloud comptuing, security, risk management, security management, business security
    
Navisite- A Time Warner Cable Company
Published By: NACR     Published Date: Feb 09, 2015
Do you know what the compliance issues are for your organization and the technology solutions you might consider? Download this guide to learn what you need to know.
Tags : 
nacr, compliance, technology, technology solutions, regulations, software compliance – contact center, data security, customer security, hippa, biometrics, wfo, speech analytics, sarbanes-oxley, big data, telecommuting, remote agent, telemarketing, caller id, call recording, predictive dialers
    
NACR
Published By: IBM     Published Date: Feb 08, 2008
Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.
Tags : 
bank, banks, financial, financial institutions, fisma, compliance, data security, information management, information security, database security, customer data, ibm
    
IBM
Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy, encryption policy, remote access policy, firewall, vpn, intrusion prevention, content security, networking, security
    
Cisco
Published By: Cisco     Published Date: Jan 29, 2009
The following are 10 tips for using network technology to help your business increase operational efficiency, reduce costs, improve customer satisfaction, and stay ahead of the competition.
Tags : 
cisco, increasing operational efficiency, boost operational efficiency, mobile employees, smb employees, secure wireless access, outsource it tasks, improve employee retention, long-term technology plan, value-added resellers, vars, managed service providers, security and vpn, unified communications, cisco business application connectors, cisco systems capital, enterprise applications
    
Cisco
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy, risk management, vulnerability management
    
IBM Software
Published By: EMC Corporation     Published Date: Jun 14, 2013
In this paper, the SMB Group examines different cloud computing models, discusses the types of requirements that each can best address, and consider what midmarket businesses should look for in a cloud solutions provider.
Tags : 
cloud computing, midmarket, solutions provider, technology, business success, performance, security, networking, storage, data management, business technology
    
EMC Corporation
Published By: EMC Corporation     Published Date: Jun 14, 2013
This document describes the top 5 simple benefits of EMC VNX. Download this White Paper for more information.
Tags : 
automated storage, optimization, storage space, increase bandwidth, data warehouse solution, technology, security, networking, it management, storage, data management, business technology
    
EMC Corporation
Published By: EMC Corporation     Published Date: Jun 14, 2013
The City of Denton, Texas encompasses nearly 95 square miles and has a population of more than 113,000 residents. Denton is one of the fastest-growing communities and eleventh largest city of the Dallas-Fort Worth (DFW) Metroplex. In this document we will explore the business challenges the city faced, how EMC helped come to a solution and drive results.
Tags : 
it infrastructure, system performance, unified storage, technology, security, applications, networking, it management, enterprise applications, storage, business technology
    
EMC Corporation
Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.
Tags : 
shavlik, power management, security, cyberattacks, internet attacks, lan, wake-on-lan, csci, climate savers computing initiative, carbon footprint
    
Shavlik Technologies
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report to find out how technology professionals rate factors like security, integration with existing infrastructure, ease of use, etc.
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones
    
Dell Mobility
Published By: IBM     Published Date: Aug 07, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threat detection.
Tags : 
ibm, threat detection, technology, data management, security, it security, networking, it management, knowledge management, data center
    
IBM
Published By: SAP     Published Date: Sep 12, 2012
The impact of new mobile technology can be dramatic for small and midsize firms, and there is clear opportunity for improving worker efficiency while ensuring network security. Read the questions posed by SAP to Raymond Boggs, vice president of IDC's Small/Medium Business Research practice, on behalf of SAP's customers.
Tags : 
mobile resources, mobile solutions, sme, mobile devices
    
SAP
Published By: Intel     Published Date: Aug 10, 2012
What is Intel® CoreT vProT technology? Learn about the security and manageability features that deliver a secure and efficient IT environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, animation, security, enterprise applications, data management, business technology
    
Intel
Published By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to explore critical elements in which strong authentication solutions can be applied with SaaS applications to help drive adoption and improve user experience.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security
    
VASCO
Published By: VASCO     Published Date: Jul 12, 2012
In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application. Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security, business technology
    
VASCO
Published By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to learn how strong authentication tools safeguard user login and ensure that only authorized users gain access to confidential patient data.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security, business technology
    
VASCO
Published By: VASCO     Published Date: Jul 12, 2012
Read more of this white paper to find out how federated identity management can solve the password complexity and the "token necklace" problem while keeping up with increasing security requirements.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security
    
VASCO
Published By: CDW     Published Date: Dec 23, 2014
Learn how to build a more successful business with the new infrastructure provided from Windows servers and see how you can lower costs, increase security, and improve the “speed to solution”.
Tags : 
cdw, data, windows, server, infrastructure, lenovo, technology, operations, compatibility, memory, integration, security, speed, business technology
    
CDW
Published By: CDW     Published Date: Dec 23, 2014
Learn the 5 steps for successfully deploying highly efficient infrastructure for Windows servers and see how you can lower operating expenses and reduce IT workload.
Tags : 
cdw, data, windows, server, infrastructure, technology, operations, compatibility, integration, security, speed, business technology
    
CDW
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee