securing

Results 426 - 450 of 476Sort Results By: Published Date | Title | Company Name

Securing Data in the Cloud

Published By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : 
messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security, policy based management, data protection, data center design and management
    
Symantec.cloud

Securing Your Mobile Workforce Locking Down Data in Your Environment

Published By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : 
messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce, mobile computing, mobile data systems, mobile workers, wireless communications, workforce management, database development, human resources services, workforce management software
    
Symantec.cloud

Securing the cloud - the need for robust security and SLAs

Published By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : 
cloud, security, data centre, sla, continuity, disaster recovery, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics, business continuity, compliance, ddos, email security, encryption, firewalls
    
The Bunker

Webinar: Red Hat Enterprise Linux 6: Security

Published By: Red Hat     Published Date: Jan 21, 2011
Daniel Walsh - Principal Software Engineer, Red Hat In this session, Daniel Walsh will show attendees new SELinux features and explain how to use them in Red Hat Enterprise Linux 6. He will cover several SELinux topics, including: * Confining users * Securing your virtual environment * Securing the desktop * Controlling grid jobs * Sandboxing: putting the power into the hands of the administrator * Building and shipping your own SELinux policy
Tags : 
red hat virtual tradeshow, live event, enterprise linux 6, security, desktop, selinux, virtual environment, security management, server virtualization, linux, desktop management
    
Red Hat

Educating Decision Makers About the Need for Encryption

Published By: DataMotion     Published Date: Jan 06, 2011
Get a better understanding of the value to your organization of securing email with encryption. Read Educating Decision Makers About the Need for Encryption, a whitepaper by Osterman Research
Tags : 
secure email, encryption, private email, compliance, email security, pci compliance
    
DataMotion

Securing Edge Data at the Center

Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As enterprises focus on consolidation of data centers, they continue to expand the roles and numbers of branch offices, often in locations that are difficult to support and protect. Learn to extend the virtual edge of the data center to branch offices, enabling complete consolidation of servers and data, improving security, and providing LAN performance at the edge via the WAN.
Tags : 
wan, cloud based computing, optimization, performance, data center, data consolidation, servers, disaster recovery, risk, security
    
Riverbed Technology, Inc.

Securing the Mobile App Market

Published By: Symantec     Published Date: Oct 02, 2012
How Code Signing Can Bolster Security for Mobile Applications
Tags : 
mobile app market, securing, code, signing, certificates, business technology
    
Symantec

Securing Your Private Keys As Best Practice for Code Signing Certificates

Published By: Symantec     Published Date: Oct 02, 2012
Stuxnet,a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
malware, code, signing, certificates, software, stuxnet
    
Symantec

Securing Your Software for the Mobile Application Market

Published By: Symantec     Published Date: Oct 02, 2012
The Latest Code Signing Technology
Tags : 
mobile, application, market, software, code, signing, technology, business technology
    
Symantec

Licensing Symantec Certificates

Published By: Symantec     Published Date: Oct 02, 2012
Securing Multiple Web Server and Domain Configurations
Tags : 
symantec, web server, domain configurations, commerce, business technology
    
Symantec

Securing Microsoft Exchange 2010 with Symantec SSL Certificates

Published By: Symantec     Published Date: Oct 02, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : 
exchange 2010, ssl certificates, ssl, exchange implementation, sans, security, business technology
    
Symantec

PCI DSS Compliance with Stingray Traffic

Published By: Riverbed     Published Date: Nov 08, 2012
Payment Card Industry Data Security Standard is a set of best practices and security measures that any organization must follow if they accept and handle cardholder data online. Read on to learn about securing your applications for security standard.
Tags : 
riverbed, stingray, pci dss compliance, stingray traffic, security, enterprise applications, business technology
    
Riverbed

RISE ABOVE WITH TOTAL MOBILITY.

Published By: CDW     Published Date: Jun 30, 2015
Total Mobility Management (TMM) is a comprehensive platform that makes implementing, managing, and securing mobile devices simple.
Tags : 
mobility, apps, strategy, platform, tmm, risk management, productivity, mobile computing, mobile data systems, mobile workers, application integration, application performance management, best practices
    
CDW

Security and HIPAA Compliance: Meeting the Challenge of Securing Protected Health Information

Published By: NETIQ     Published Date: Sep 09, 2013
This white paper looks at the most important elements of securing sensitive health information and meeting HIPAA compliance requirements in a scalable and cost-effective way.
Tags : 
netiq, security, hipaa, compliance, protected health information, hitech act, compliance requirements, healthcare, software development, it management
    
NETIQ

Securing Your Intellectual Data – Oil & Gas Industry

Published By: SafeNet     Published Date: Jun 11, 2013
Understanding the Threats Energy and PetrochemicalFace—and How to Protect Against Them.
Tags : 
safenet, storage, secure, seismic images, data protection, threats energy, petrochemical, electronics
    
SafeNet

Unique Security Challenges in the Datacenter Demand Innovative Solutions

Published By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDC’s Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : 
security challenges, data center demand, innovative solutions, security technologies, innovative solutions, networking, data center
    
Juniper Networks

Securing your Apache Web Server with a Thawte Digital Certificate

Published By: Thawte     Published Date: Dec 29, 2015
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.
Tags : 
security, apache, web server, digital certificate, business continuity, compliance, security management, web service security
    
Thawte

Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certi

Published By: Thawte     Published Date: Dec 29, 2015
Learn how you can build customer confidence around Internet security.
Tags : 
security, internet, web server, customer confidence, business continuity, identity management, security management, web service security
    
Thawte

Securing Your Small Business Online

Published By: Symantec Corporation     Published Date: Oct 09, 2014
Hackers are taking aim at your small business website. Defend yourself—and your customers—with strong, affordable online security.
Tags : 
hackers, online security, cyberattacks, affordable, security
    
Symantec Corporation

Securing the “Internet of Things” Survey

Published By: Norse     Published Date: Mar 10, 2014
Learn about how the internet has changed over the past year and see how these major changes have affected security protocols and how your organization should respond to keep current in a world that is run by the Internet.
Tags : 
norse, sans, internet of things, cybersecurity, nstac, industrial internet, cyber-physical systems, emerging technologies, survey, malware, networking, security, software development
    
Norse

Securing Your Branches for Direct Internet Access

Published By: Cisco     Published Date: Dec 08, 2015
Driven by budget pressures and the growth of cloud-hosted applications, mobility, and bandwidth-hogging applications such as video, many IT organizations are actively considering direct Internet access (DIA) at their branches. DIA offers two compelling benefits: (1) it can substantially reduce operating costs by freeing up costly WAN bandwidth for mission-critical applications, and (2) it offers a better experience for users accessing applications hosted in the public cloud.
Tags : 
direct internet access, cisco, canada, dia, wan, wide area network, networking, wireless, knowledge management
    
Cisco

Securing Your WAN Infrastructure webcast

Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property
Tags : 
    
Cisco

Mobile Data Security: Finding the Balance

Published By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : 
data security, byod, corporate security, mobile data security, user experience, security, it management, data management, mobile data systems
    
IBM MaaS360

UPS Basics: Everything you ever wanted to know about UPSs but were afraid to ask

Published By: Eaton     Published Date: Feb 08, 2017
Budgeting for electricity, securing adequate supplies of it and finding ways to use less of it are all common topics of conversation among data center operators. Ensuring that the power their IT resources rely on is both dependable and clean, sadly, can sometimes be an afterthought.
Tags : 
    
Eaton

Securing the Evolving Datacenter

Published By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
aberddeen, data center, datacenter, cloud, server security, networking, data management
    
Intel Security
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.