technology security

Results 176 - 200 of 532Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Jun 06, 2019
Unlike traditional network architectures, software-defined wide-area networking (SD-WAN) makes it possible to harness existing network technology to better align operations and business policies. While many companies identify a need to evolve to SD-WAN, they are not always convinced SD-WAN can deliver the necessary enterprise capabilities. Join us for a webinar with Link-Connect to learn how they use Forcepoint NGFWs to deliver enterprise-class SD-WAN to manage more than 400 sites from a single management console. In this webcast, learn how Forcepoint NGFW: Simplifies operations. Management is easier with central management, visibility and hierarchical policies. Saves investment dollars. Smarter use of capacity and the ability to visualize and prioritize traffic reduces connectivity costs. Boosts business outcomes. Optimized capacity, increased security and ensured high availability
Tags : 
    
Forcepoint
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: ForeScout     Published Date: Nov 16, 2017
"Cyberattacks on Internet of Things (IoT) and operational technology now expose businesses to greater risk. But, with all the security technology available today, we asked ourselves the question, why do they keep happening? ForeScout commissioned Forrester Consulting to see if organizations can adequately and accurately secure their networks with the rise of IoT-connected devices. Read the Report to learn more about the findings.
Tags : 
    
ForeScout
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
    
Fortinet EMEA
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
    
Fortinet, Inc.
Published By: Foxit     Published Date: Sep 18, 2014
IT organizations are being asked do to more with less, as tight budgets get stretched ever tighter. Companies of all sizes are being challenged to find savings that can be reinvested in new money-saving or revenue-generating technologies. From storage to security, every cost is being scrutinized in the search for savings, yet many organizations overlook one area—document management—where significant savings can be readily had. Now is definitely the time to take a close look at your PDF solution, and ask a basic question: Can you get the same capabilities from new PDF solution but at much lower cost?
Tags : 
foxit, document management strategy, revenue generated technology, storage, security, tight budgets, pdf solutions, enterprise applications, data management
    
Foxit
Published By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
Published By: Genesys     Published Date: Feb 27, 2018
Everyone says they’re “in the cloud,” but most technology leaders would agree that not all clouds are created equal. When evaluating a cloud contact center solution for your business, it’s important to understand the difference between a true Cloud 2.0 application and traditional software, including which features to look for and why those features are important. Download this eBook and learn: • How a true Cloud 2.0 model is built to provide levels of reliability, scalability, flexibility and security that far exceed those of previous generations • The benefits of utilizing a platform built on microservices architecture • How to take your business to the next level with a built to scale cloud contact center platform
Tags : 
cloud contact center, ebook, cloud 2.0 model, microservices architecture
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
Everyone says they’re “in the cloud,” but most technology leaders would agree that not all clouds are created equal. When evaluating a cloud contact centre solution for your business, it’s important to understand the difference between a true Cloud 2.0 application and traditional software, including which features to look for and why those features are important. Download this eBook and learn: How a true Cloud 2.0 model is built to provide levels of reliability, scalability, flexibility and security that that far exceed those of previous generations The benefits of utilising a platform built on microservices architecture How to take your business to the next level with a built to scale cloud contact centre platform
Tags : 
    
Genesys
Published By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, phishing, website protection, phishing scams, sensitive information, extended validation, validation, ssl technology, spam, scam, ev ssl, safety threats, ecommerce
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
What is it about e-commerce that causes online businesses to fail?Take a look at this E-commerce 101 Guide to help with avoid pitfalls and be successful when selling on the web.
Tags : 
nethawk, geotrust, ecommerce, web security, ssl, online selling, technology, solution, encryption, website owner, ssl certificate, validation, encryption, authentication, security indicators, extended validation, social networking, branching business, business technology
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
Learn more about typical situations where multiple domain certificates are the ideal solution. After this whitepaper, you'll know how to select the right multi-domain certificate for your needs.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, unified certificates, secure communications, multiple domains, certificates, certificate extensions, secure independence, certificate authority, vital security, business protection, uc environments, security, business technology
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
    
GeoTrust
Published By: GFI     Published Date: Sep 18, 2012
Decreasing budgets, an increasingly mobile workforce, limited staff, time constraints, a growing dependence on e-solutions - you face unique challenges as an IT professional. And you can't afford to disrupt your end users or clientele to implement security solution after security solution. That's where the IT Security Kit comes in. This handy kit provides everything you need to quickly and easily find the antivirus product that's manageable, reliable, cost-effective and just right for your organization.
Tags : 
technology, security, it security, antivirus, antispam, virus detection
    
GFI
Published By: GFI Software     Published Date: Feb 24, 2012
Social networking has changed the way businesses communicate with their customers and partners, with most organizations now incorporating social media into their marketing and communications strategies. Unsurprisingly, the popularity of this new media has also created an influx of social-specific malware. Read to find out more about this trend.
Tags : 
gfi software, technology, security, malware, social media, smb, internet security, identity security
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2012
There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.
Tags : 
gfi software, technology, security, malware, internet security, intrustion detection, anti-virus
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2012
During this webcast, GFI Senior Threat Researcher Chris Boyd discussed:How to identify botnets in your systems, how to remediate botnet malware, how to maximize protection against botnets and how to educate users to prevent infections.
Tags : 
gfi software, technology, security, application security, anti virus, intrusion detection
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2012
This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Test drive VIPRE Business today.
Tags : 
gfi, anti virus, anti spyware, technology, security, business technology
    
GFI Software
Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Security Delivery Platforms for Dummies introduces IT professionals to a class of technology that transforms how security and monitoring tools are deployed on the network to provide pervasive visibility. Learn how to detect threats faster by removing network blind spots, see what matters across the global enterprise and optimize your security tools’ performance and efficacy. If you’re responsible for protecting a corporate network or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 25, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Despite increasing security budgets, companies find there is too much data for new tools to analyze, not enough skilled IT security professionals and little confidence in current technology investments. Read the “2018 Cyberthreat Defense Report” to learn how your peers are managing increased breaches, vulnerabilities and encrypted traffic. How does your cyberthreat approach compare to other security pros who are protecting their organizations? Learn now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Perimeter-based solutions for network security do not work, leading to tool sprawl and performance issues. Read CSO Magazine’s interview with Gigamon CISO, Simon Gibson, to learn why a new, more intelligent approach is needed to build resilience into technology operations. “Security Should Be an Enabler” talks about an architectural approach that distributes only relevant data to appropriate tools, enabling an adaptable, simplified model at a reduced cost. Read now.
Tags : 
    
Gigamon
Published By: Gomez IT     Published Date: Dec 14, 2011
So how can you ensure that your selection process for cloud service providers and partners is fast but well-informed, based on reliable data and mitigates the risk of hidden surprises? Read to find out.
Tags : 
gomez, technology, cloud computing, cloud service provider, security, roi
    
Gomez IT
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
You can’t slow down technology. But you can get ahead of it. Learn how in this mobile trend report from Gartner. Learn the latest in devices, app stores, and cloud services. You’ll even get operational tips to manage mobile costs, risk, and support.
Tags : 
consumerization, mobile technology, infrastructure and operations, mobile management, mobile security, enterprise mobility, mobile application management
    
Good Technology Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee