access

Results 26 - 50 of 2626Sort Results By: Published Date | Title | Company Name

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks

2-Min Teaser VOD: Get Ready for 802.11ac Wave 2

Published By: Cisco     Published Date: Apr 10, 2015
Get Ready for 802.11ac Wave 2, prepare your access network for new innovations with Cisco Catalyst Multigigabit Technology.
Tags : 
cisco, catalyst, networks, byod, mobile computing, wifi, mobile data systems, mobile workers, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wlan
    
Cisco

2-Min Teaser VOD: Get Ready for 802.11ac Wave 2

Published By: Cisco     Published Date: Jun 02, 2015
Prepare your access network for new innovations with Cisco Catalyst Multigigabit Technology.
Tags : 
gigabit, networking, wireless solutions, data, cisco, gigabit networking, network management, quality of service
    
Cisco

20 Reasons to host your contact center in the cloud

Published By: New Voice Media     Published Date: May 22, 2017
Business is going through rapid, unprecedented change. We are accustomed to having access to information and resources wherever we are. Our anticipations and expectations of business have changed, and we expect the same when we deal with any organization, whether as a customer, employee, stakeholder or partner.
Tags : 
    
New Voice Media

2012-2013 WLAN Buyer's Guide

Published By: Aerohive     Published Date: Apr 11, 2012
Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase.
Tags : 
aerohive, wlan, lan, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services, business continuity, teleworker, remote office, call center, virtual office, disaster recovery, zero touch wireless, retail pci, networking
    
Aerohive

2014 WLAN Buyer’s Guide

Published By: Aerohive Networks     Published Date: Aug 22, 2014
Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase. It will highlight top 10 features for a WLAN, help you decide on architectural choices and summarize how to use the RFP process to select a vendor.
Tags : 
wlan, wi-fi, network, rfp, process, vendor, requirements, networking, wifi
    
Aerohive Networks

2015 Cybersecurity: Attack Resiliency Challenges Industry Collaboration

Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies, anti spyware, email security, internet security
    
Cisco

2015 Forrester Wave™: B2E Cloud IAM

Published By: Okta     Published Date: Mar 10, 2016
The Forrester Wave report identifies the six most significant solution providers in the market, evaluating the strengths and weaknesses of each vendor against 15 criteria, including current offering, strategy and market presence. Access your complimentary Forrester Wave report and learn why Okta is named a leader in the space.
Tags : 
    
Okta

2015 Gartner IDaaS Magic Quadrant

Published By: Okta     Published Date: Oct 30, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas, enterprise applications
    
Okta

2015 Gartner IDaaS Magic Quadrant

Published By: Okta     Published Date: Nov 03, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas, networking, security, it management, knowledge management, data management, business technology
    
Okta

2015 Gartner IDaaS Magic Quadrant

Published By: Okta     Published Date: Nov 09, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas, it management, data management, business technology
    
Okta

2016 Magic Quadrant for Enterprise Integration Platform as a Service, Worldwide

Published By: MuleSoft     Published Date: Feb 06, 2017
Application managers and directors of integration are being challenged to integrate hybrid application portfolios as well as provide easy access to the data within those systems. This Magic Quadrant can be used to assess the ability of iPaaS vendors to meet these rapidly evolving needs.
Tags : 
    
MuleSoft

2017 Commerce Trends

Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto

2017 Retail Vision Study

Published By: Zebra Technologies     Published Date: Sep 07, 2017
In the age of evolving shopper expectations and technology advancements, the global retail industry is in the midst of a profound shift in retail operations. To gain a deeper understanding of retailers’ focus, concerns and investment plans, Zebra conducted a global research study across a wide spectrum of retail segments, including: specialty stores, department stores, apparel merchants, supermarkets, electronics, home improvement and drugstore chains. The results of this study are shared in this 2017 Retail Vision Study.
Tags : 
inventory management, staff communication, guest safety, guest security, mobile ordering, payment solutions, loyalty/membership/rewards, access card printers, state of the hospitality industry, smart data dives, automating convenience, the personalization equation, location technologies, key qr code applications, customer service, customer satisfaction
    
Zebra Technologies

2017 State of Cybercrime Report

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017

2018 Gartner Magic Quadrant for Full Life Cycle API Management

Published By: Google Apigee     Published Date: Jun 08, 2018
A must-read for IT professionals that provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. APIs are the de-facto standard for building and connecting modern applications. But securely delivering, managing and analyzing APIs, data and services, both inside and outside an organization, is complex. And it’s getting even more challenging as enterprise IT environments grow dependent on combinations of public, private and hybrid cloud infrastructures. Choosing the right APIs can be critical to a platform’s success. Likewise, full lifecycle API management can be a key ingredient in running a successful API-based program. Tools like Gartner’s Magic Quadrant for Full Life Cycle API Management help enterprises evaluate these platforms so they can find the right one to fit their strategy and planning. Apigee is pleased to offer you a complimentary copy of the Gartner report. Access in-depth evaluations of API managemen
Tags : 
    
Google Apigee

2018 Global State of Priviledge Access Management

Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19

2018 Motorola Solutions Energy Communications Survey Report

Published By: Motorola Solutions     Published Date: Nov 29, 2018
In today’s increasingly mobile world, Energy workers require instant communication and access to data intelligence wherever the job may take them. From the oil rig to the electric grid and everywhere in between, having the right data, in the right hands, at the right time, no matter the environment or device of choice — is simply non-negotiable. Organizations across various Energy segments — oil & gas, electric utilities, water utilities, and mining — are currently juggling a mix of communication devices and are hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions. Yet, citizens rely on their homes being heated in the winter, on clean running water, and on lights that turn on when they flip the switch. Meeting these expectations requires reliable, clear voice and data communications for Energy workers day-in and day-out. So oil & gas workers can communicate safely in hazardous environments. So precious resources are
Tags : 
    
Motorola Solutions

2018 Outlook: Customer Experience and Security Strike a Balance

Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv

2019 Digital Trends: Advertising in Focus

Published By: Adobe     Published Date: Oct 10, 2019
The 2019 Digital Trends: Advertising in focus report, produced by Econsultancy in partnership with Adobe, explores the key trends in advertising set to dominate the agenda over the next year. This report explores attitudes to technology and innovation, including how advertisers risk losing the balance between creativity and measurement, and the challenge posed by walled gardens that restrict access to data.
Tags : 
    
Adobe

2019 Gartner Magic Quadrant for Data & Analytics service Providers, Worldwide

Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
IBM has been named a Leader in Gartner's Magic Quadrant for Data & Analytics Services. According to the report, by 2022, 90% of corporate strategies are expected to view information as a critical enterprise asset, and analytics as an essential competency. Data and analytics service providers can help leaders accelerate and transform their ability to deliver data-driven insights and innovation solutions to businesses. Get complimentary access to Gartner's latest Magic Quadrant report for Data & Analytics Service Providers.
Tags : 
    
Group M_IBM Q4'19

2019 Gartner MQ for Access Management

Published By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
For the third consecutive year, Gartner has named IBM a Leader in the 2019 Gartner Magic Quadrant for Access Management. We believe that IBM’s global reach, commitment to innovation, and extensive integrations for access management helped us earn this recognition. Register now to get your complimentary copy of the report.
Tags : 
    
Group M_IBM Q4'19

24/7 Uptime for Electronic Health Records

Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical, medical grade servers, electronic medical records, emr, patient health records, phrs, computerized health record system, community health record (chr), diagnostic records, lab results, prescribed medication, downtime risk, stratus ftserver
    
Stratus Technologies

3 businesses share why they chose Citrix XenDesktop over VMware View

Published By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : 
mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience, deliver, access, app, cost, management, it management, wireless
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.