lan security

Results 176 - 200 of 479Sort Results By: Published Date | Title | Company Name

From Physical Security to Video Intelligence

Published By: Cisco     Published Date: Jan 21, 2015
Guido Jouret makes the case for surveillance that is no longer about a defensive security posture, but an offensive business imperative. Customers want to analyze the data they're collecting from these IP-enabled systems, from heat maps to the tracking of their customers to tighter integration between physical security infrastructure and other data center applications. The time has never been better.
Tags : 
cisco, surveillance, ip-enabled, devices, data, integration, iot, business, security, business technology, cloud computing
    
Cisco

Front-Line Malicious Code Defense for the Enterprise from a Single Management Console

Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : 
network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware, internet security, web security, endpoint security, end point security, end-point security, intrusion prevention, landesk
    
LANDesk

Frost & Sullivan: What you SIEM is what you get

Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault

Future Of Website Security

Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert

Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure

Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner evaluates a variety of networking vendors providing access layer connectivity. Vendors must have an end-to-end hardware solution, but increasingly, vendor differentiation centers on network services, including guest access, onboarding, security and management tools. Read this whitepaper for more information.
Tags : 
wireless lan, infrastructure, hardware solution, network services, security, technology, best practices, networking, wireless, business technology
    
Aruba Networks

Gartner Report: 2017 Critical Capabilities for SIEM

Published By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
    
Splunk

Gartner Report: Load Balancers Are Officially Dead; Refocus on Application Delivery

Published By: F5     Published Date: Feb 07, 2013
Load balancers are officially dead; refocus on application delivery. Read this report and you’ll learn about enterprises that are still focused on load balancing, improving application performance and security, increasing efficiency and more.
Tags : 
application delivery, load balancer, officially dead, gartner report, adc, knowledge management, enterprise applications, data management, business technology, data center
    
F5

Gartner Report: Refresh Authentication Choices to Improve Mobile Workforce Remote Access

Published By: Okta     Published Date: Apr 29, 2015
Authenticating users on a variety of endpoints should provide the right balance of user experience, security and workforce productivity. CISOs and IAM leaders need to keep pace with new methods of remote access for the mobile workforce in a constantly changing work environment. Read this report why.
Tags : 
workforce, ciso, iam, mobile, workforce, security, it management
    
Okta

Gartner Research: Strengthen E-Discovery Readiness To Reduce Cost And Risk

Published By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
    
Mimecast

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report

Published By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.

Getting Comfortable in the Cloud

Published By: Epicor     Published Date: Mar 05, 2018
If you’re a manufacturer and have questions about deploying your enterprise resource planning (ERP) system in the cloud, here’s your answer—it’s time to move. Cloud ERP solutions provide a number of benefits for manufacturers, and those who make the switch are seeing how simple, economic, and reliable this type of deployment can be. In this eBook, you’ll discover the top 10 reasons why Epicor customers are choosing to deploy their ERP in the cloud rather than on premises, including: • Economic benefits • Better use of IT resources • Greater security • Easier updates • Improved mobility and collaboration • Faster time to value Download the eBook to learn more about how cloud ERP from Epicor can help your manufacturing business.
Tags : 
    
Epicor

Getting Comfortable in the Cloud

Published By: Epicor     Published Date: Aug 15, 2018
If you’re a manufacturer and have questions about deploying your enterprise resource planning (ERP) system in the cloud, here’s your answer—it’s time to move. Cloud ERP solutions provide a number of benefits for manufacturers, and those who make the switch are seeing how simple, economic, and reliable this type of deployment can be. In this eBook, you’ll discover the top 10 reasons why Epicor customers are choosing to deploy their ERP in the cloud rather than on premises, including: • Economic benefits • Better use of IT resources • Greater security • Easier updates • Improved mobility and collaboration • Faster time to value Download the eBook to learn more about how cloud ERP from Epicor can help your manufacturing business.
Tags : 
erp software, enterprise resource planning software, saas, cloud erp, epicor erp
    
Epicor

Global Trust / Securing the Enterprise

Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok, identity management
    
Okiok

Go Mainstream with SD-WAN: Migration Best Practices

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
Over the last couple of years SD-WAN technology has matured into a mainstream solution. Yet, the most appropriate migration path is not always clear. While there are many considerations to balance during a migration, the enduring benefit of an SD-WAN architecture is simplification: branch design, data center design, routing, edge platform choices, security choices, management. To ensure an understanding of the fundamental concepts, let’s quickly discuss the architecture and components of SD-WAN, and then move on to cover the best practices of various aspects of an SD-WAN migration
Tags : 
    
VMware SD-WAN by VeloCloud

Guide d’achat Wi-Fi d’entreprise : création d’un réseau plus sécurisé

Published By: Aerohive     Published Date: Jun 15, 2015
Découvrez comment les organisations peuvent intégrer facilement et de manière sûre une gamme d’utilisateurs et de terminaux en fournissant des clés pré-partagées individuelles sur le même SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control, anti spam, anti spyware, application security, firewalls, wifi, wireless infrastructure
    
Aerohive

Happy, Secure, and Reliable: Technology Influencing the Workforce of Today

Published By: Dell     Published Date: Nov 09, 2017
How to empower your workforce and IT. Access this short webcast to hear how new workforce trends have created a paradox between employees desire for greater flexibility and IT's need to control cost and data. Luckily, with a reliable partner like Dell, you can take advantage of our entire Lifecycle Services and Endpoint Security to make both groups happy while still cutting costs. In this webcast you'll hear... - What workforce trends have impacted employee expectations of technology - How IT can balance costs and security with employee happiness - How to apply this approach to the 4 phases of the PC Lifecycle - What solutions can help you save up to 25% of PC Lifecycle costs Watch on-demand now.
Tags : 
    
Dell

Healthcare Overcomes Difficulties With the Advantages of Hybrid Packet-Optical Networks.

    
Ciena

HIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security

Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention, best practices, network architecture, network performance, network performance management, network provisioning, network security, business intelligence
    
Akamai Technologies

Holistic Risk Management: Perspectives from IT professionals

Published By: IBM     Published Date: Jul 13, 2012
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. But this has introduced new challenges and opportunities. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Tags : 
ibm, technology, risk management, professionals, business, security management, emerging threats, productivity, project management, service management, data center design and management, business technology
    
IBM

Holistic Risk Management: Perspectives From IT Professionals

Published By: IBM     Published Date: Jan 23, 2013
Business continuity planning and IT security management are becoming an integral part of enterprise-wide risk management and business resilience frameworks at a growing number of organizations.
Tags : 
    
IBM

How a leading professional services firm enhanced collaboration with Cloud security

Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
    
Cisco Umbrella EMEA

How BYOD is Changing Mobile Security Investments

Published By: Lookout     Published Date: Dec 09, 2016
This whitepaper lays out the landscape on potential threats, how the mobile ecosystem is changing, and what security investment looks like from here out.
Tags : 
    
Lookout

How Do I Balance Robust Security with a Frictionless Online Experience for Cardholders

Published By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : 
ca technologies, cnp, emv, otp, 3dsecure, data management
    
CA Technologies

How do you balance the demands of Workforce Mobility, with data and device security?

Published By: Lenovo     Published Date: Aug 31, 2018
You shouldn't have to trade one for the other. We'll show you where organizations typically make compromises for mobility, to help you avoid the trade-off pitfall and select the best devices for your mobile organization: • Insist on uncompromising productivity • Demand 360° security • Choose reliable durability first Lenovo is the first, best and most innovative leader in building devices to support your mobile workforce.
Tags : 
    
Lenovo

How Hybrid Flash Array Helps Businesses Do More With Less

Published By: NexGen     Published Date: Feb 09, 2015
Data integrity and ultra-high performance dictate the success and growth of many companies. One of these companies is BridgePay Network Solutions, a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Due to the nature of their business, their IT team needed to strike the perfect balance between meeting regulatory-mandated data security measures with the lowest possible levels of latency and response times. As their growth accelerated, BridgePay realized the need to immediately address infrastructure shortcomings and prepare for their future growth. Download the case study now and see how BridgePay built a competitive advantage and scaled transactions by 500% in the same storage footprint using some of the most advanced and differentiated technology available today.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash, it management
    
NexGen
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.