access

Results 401 - 425 of 2575Sort Results By: Published Date | Title | Company Name

The Impact of Agile

Published By: CA Technologies     Published Date: Nov 02, 2016
Agile and Lean are built on a foundation of continuous improvement: You need to inspect, learn from and adapt your performance to keep improving. Enhancing performance begins with having accurate, comprehensive data. The multitenant architecture of CA Agile Central is uniquely positioned to provide access to anonymized industry benchmarking data from tens of thousands of agile teams. CA Agile Central Insights capabilities, part of a CA Agile Central Unlimited Edition subscription, provide performance metrics and benchmarking data for individual teams, teams of teams and even whole business units, departments and organizations.
Tags : 
    
CA Technologies

CA Technologies Introduces Robust Multicloud Infrastructure Monitoring

Published By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Published By: CA Technologies     Published Date: Aug 22, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
    
CA Technologies

The Payment Card Industry Data Security Standard and CA Privileged Access Management

Published By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies

A Privileged Access Management Maturity Model for Digital Transformation and Automation at Scale

Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies

Brexit—The Impact on Privileged Identities

Published By: CA Technologies     Published Date: Aug 22, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

A How-to Guide to OAuth & API Security

Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies

5 OAuth Essentials for API Access Control

Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Tags : 
    
CA Technologies

OAuth – die fünf wichtigsten Aspekte für API Access Control

Published By: CA Technologies     Published Date: Aug 24, 2017
Mit OAuth kann der Benutzer den Zugriff an eine API delegieren. So kann für diesen Benutzer ein Service in einen anderen integriert werden. Die gleichen Social Web-Anbieter, die dafür gesorgt haben, dass APIs verfügbar gemacht werden, damit externe Entwickler ihre Plattformen optimieren können, waren auch die ersten, die solche Mechanismen für die delegierte Autorisierung angewendet haben. OAuth wurde im Jahr 2006 definiert, um derartige Mechanismen zu standardisieren.
Tags : 
    
CA Technologies

Identity in Mobile Security

Published By: CA Technologies     Published Date: Aug 24, 2017
In recent years, the concept of “Anywhere, Anytime Computing” has become the common denominator in driving personal electronic device sales, as users are adopting to new categories of devices such as smartphones, tablets, and smartTVs. These devices enable consumers and employees to access information and services from almost any device at any time. Gartner studies show that the estimated mobile phone market is to reach 1.8 billion devices in 2013.
Tags : 
    
CA Technologies

Comment protéger efficacement mon entreprise hybride contre les violations de données et les menaces

Published By: CA Technologies     Published Date: Aug 24, 2017
Le vol et l’exploitation des identifiants administratifs sensibles entraînent des infractions et la perturbation des opérations. CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
    
CA Technologies

Global deduplication for encrypted data

Published By: Carbonite     Published Date: Apr 09, 2018
Global data deduplication provides important benefits over traditional deduplication processes because it removes redundant data through entire enterprises, not just single devices. Global deduplication increases the data deduplication ratio—the size of the original data measured against the size of the data store after redundancies are removed. This helps reduce the amount of storage required at a time when businesses face exponential storage growth. Chief benefits of global deduplication include: • Reductions in storage of up to 60% • The most optimal deduplication ratio • Enterprise-wide reach • Massive reductions in backup-related WAN traffic By shrinking storage capacity needs, data deduplication can cut storage costs quickly. At the same time, businesses today need to access and utilize their data in real time, making the most recent and relevant information available. By eliminating redundant data, deduplication technology makes it simpler for data to be managed across various b
Tags : 
    
Carbonite

Driving Innovation With Legacy Systems In FSI

Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab is a centre of innovation provided by Juniper, for business leaders who want to build network-integrated software applications and solutions quickly and securely. This is done by offering hands-on and cloud-based access to Juniper and third-party solutions including SDN sandboxes and NFV interoperability testing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks

OpenLab: Juniper's Global Innovation Center

Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
    
Juniper Networks

Creating the Network for the Future Digital Financial Institution

Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital, connected world is fundamentally changing the dynamics of the financial services industry. Consumers expect anytime and anywhere access with a customer experience commensurate with the Internet world, while fintech start-ups disrupt established value chains, driving a need to deliver faster innovation. This is creating tremendous pressure on the network, with escalating demands for performance and agility, while cost control and compliance imperatives remain as dominant as ever. This paper looks at optimal strategies for CIOs and CTOs, exploring how the future network needs to evolve to both drive operational effectiveness and enable business change, while assessing key investment and strategic considerations for equipping the network for the digital financial institution.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
    
Juniper Networks

Rethink Enterprise Endpoint Security In The Cloud Computing Era

Published By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
    
Google

The Total Economic Impact™ Of The CA Privileged Access Manager Solution

Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager protects an organization’s business and empowers its people. The solution protects critical accounts and endpoints while providing a seamless user experience. CA commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) and enterprises may realize by deploying its Privileged Access Manager solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the CA Privileged Access Manager solution on their organizations.
Tags : 
    
CA Technologies EMEA

CA Threat Analytics for PAM

Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA

Five Best Practices to Manage and Control Third-Party Risk

Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA

How to Harness PoE for Your Network

Published By: D-Link     Published Date: Oct 27, 2017
Identify the top 10 reasons you should use smart PoE switches to improve your network capabilities and seamlessly integrate your infrastructure - from switches to surveillance and access points
Tags : 
networking, swtiching, switches, infrastructure, core network, surveillance, security, reliability
    
D-Link

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks

TIBCO Data Virtualization Technical Overview

Published By: TIBCO Software     Published Date: May 31, 2018
With data the new competitive battleground, businesses that take advantage of their data will be the leaders; those that do not will fall behind. But gaining an advantage is a more difficult technical challenge than ever because your business requirements are ever-changing, your analytic workloads are exploding, and your data is now widely-distributed across on-premises, big data, the Internet of Things, and the Cloud. TIBCO® Data Virtualization is data virtualization software that lets you integrate data at big data scale with breakthrough speed and cost effectiveness. With TIBCO Data Virtualization, you can build and manage virtualized views / data services that access, transform, and deliver the data your business requires to accelerate revenue, reduce costs, lessen risk, improve compliance, and more.
Tags : 
    
TIBCO Software

Seven Deadly Sins of I&O Cost Optimization and Transformational Investment

Published By: VMware     Published Date: Oct 02, 2018
The journey towards upgrading IT infrastructure is fraught with buzzwords and misinformation. In this special report, Gartner identifies the key challenges faced by infrastructure and operations leaders and provides strong recommendations for optimizing IT costs and investments. Submit the form to access the report and discover the ‘seven deadly sins’ I&O leaders must avoid in order to capture efficiency gains and produce strategic, outcome-driven results.
Tags : 
    
VMware

Don’t just keep the pace, set the pace in today’s digital economy.

Published By: VMware     Published Date: Oct 02, 2018
VMware surveyed approximately 200 senior IT leaders at enterprise, commercial, and SMB organizations worldwide to shed light on the evolving role of IT. In the face of increased pressures, IT oganizations are needing to accelerate development and delivery of applications that power faster time-to-market for the business. In this paper, we chart the progress of CIOs, CTOs and other IT leaders and discuss the top challenges they face in building more nimble, responsive organizations to support their business objectives. We also show how data centre modernization can help organizations deliver the agility required to meet ever-increasing demands for faster innovation through a flexible, service-oriented IT model that employs both private and public clouds. Submit the form to discover the access this latest paper and set the pace in today’s digital economy.
Tags : 
    
VMware
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.