saas security

Results 126 - 149 of 149Sort Results By: Published Date | Title | Company Name

The Forrester Wave: Email Content Security

Published By: McAfee     Published Date: Apr 10, 2013
This report details Forrester's findings about how well each vendor fulfills the 47-criteria evaluation and where each vendor stands in relation to each other to help security and risk professionals select the right partner for their email content security solution.
Tags : 
email content security, email encryption, forrester wave, on premises, saas, email security management, mcafee email gateway, security, business technology
    
McAfee

The Human Factor in Laptop Encryption

Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software

The Rise of the Secure Internet Gateway

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, letís face it, employees also donít turn on the VPN if theyíre using their work laptop for personal use ó which means theyíre left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users donít get the protection of your traditional security stack. Not only are more offices connecting directly to the internet ó itís estimated that 70% of branch offices already have some direct internet access ó but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
    
Cisco Umbrella EMEA

The Rise of the Secure Internet Gateway

Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, letís face it, employees also donít turn on the VPN if theyíre using their work laptop for personal use ó which means theyíre left with very little security protection. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet, why traditional secure web gateway (SWG) solutions cannot address these gaps, and why a new kind of internet gateway represents an entirely new way of thinking about securing your users
Tags : 
    
Cisco Umbrella EMEA

The Saas Advantage for Producing Product Catalogs

Published By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‚Äźin, pay‚Äźper‚Äźseat, flat‚Äźrate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies, data management, customer interaction service, customer relationship management, customer satisfaction
    
Catapult

The Saas Advantage for Producing Product Catalogs

Published By: Catapult.     Published Date: Apr 23, 2009
As a software provider for a product information management solution, we were experiencing a myriad of problems supporting and servicing our on premise application – too many versions to maintain, test, install and upgrade. It was becoming increasingly difficult to support our existing customers, let alone sell to new customers.  The following information is a compilation of our research.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‚Äźin, pay‚Äźper‚Äźseat, flat‚Äźrate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies
    
Catapult.

The State of Application Delivery 2016 Report

Published By: F5 Networks Inc     Published Date: Feb 02, 2016
Letís face it, your apps are everywhere. You have more to worry about than ever before: diverse services, cloud and datacenter locations, mission critical SaaS applications and new security threats.† In this report youíll learn which app delivery services your peers have most broadly deployed, how they are approaching the cloud, and how they are addressing the growing sophistication of security attacks.
Tags : 
application delivery, datacenter locations, saas applications, security threats, app delivery service, it management, knowledge management, enterprise applications
    
F5 Networks Inc

Top 5 Benefits to Securing Patient Data

Published By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to learn how strong authentication tools safeguard user login and ensure that only authorized users gain access to confidential patient data.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security, access control, security policies, business technology
    
VASCO

Transform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"

Published By: VASCO     Published Date: Jul 12, 2012
In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application. Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security, access control, security policies, business technology
    
VASCO

UK Service Provider Relies on Trend Micro Hosted Security Solutions to Better Protect Small Business

Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager, anti spam
    
Trend Micro SaaS

Using SaaS to Reduce the Costs of Email Security

Published By: Proofpoint     Published Date: Apr 23, 2010
This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach.
Tags : 
proofpoint, saas, email security, software-as-a-service, total cost of ownership, data protection, messaging
    
Proofpoint

Vulnerability Management Buyer's Checklist - Key Questions to Ask Before You Select a VM Solution

Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys

Web Threat Protection

Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we will look at factors favoring cloud and SaaS solutions in general, reasons why secure web gateways in the cloud can provide better security than appliances and local servers, and how the Webroot Web Security Service can maximize security and minimize costs using a cloud-based architecture.
Tags : 
web threat, security, could, saas solutions, webroot, knowledge management, electronics, data center
    
Webroot Inc

Webcast: iPads and iPhones Go to Work: The Essential Guide for IT Support

Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

Webcast: The Growing Threat Landscape: Why your IT Security Strategy Needs to Evolve

Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

What to Look For When Considering On-Demand Applications

Published By: SpringCM     Published Date: Dec 06, 2006
You’ve made the decision: the overall ease and economics of implementing Software-as-a-Service (SaaS) appeal to you, and you have selected an application that delivers what you need for your business.  The last hurdle is the service component itself — making sure that critical factors like security, speed, and reliability that will affect your users’ experience meet your standards.
Tags : 
saas, on-demand, on demand, real time, real-time, appication selection, vendor selection, software selection, service provider, springcm, spring cm, it management, enterprise applications, ebusiness, web services, web service security, service oriented architecture, web service management, content delivery, content integration
    
SpringCM

WHITEPAPER: 5 Emerging Use Cases for Cloud Integration

Published By: TIBCO Software     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software

Whitepaper: Architecture matters, 7 questions (by Jim Metzler)

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
    
VMware SD-WAN by VeloCloud

Whitepaper: Five Ways Cloud-Delivered Security is BETTER at Enabling your Business

Published By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : 
cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway, web gateway, mobile security, ssl protection, web 2.0, bandwidth management, ips, mobile devices, saml, access control, anti spam, application security, encryption
    
ZScaler

Whitepaper: Putting Web Threat Protection and Content Filtering in the Cloud

Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: ē Better defense against zero-day threats and spam servers ē More comprehensive signature and URL database ē Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications, business technology, cloud computing
    
Webroot

Why Security SaaS makes sense today

Published By: Webroot UK     Published Date: Nov 11, 2009
Service Subscription Takes the Headache Out of Email and Web Threat Management. Read this white paper about the Seven Reasons to Adopt SaaS Security.
Tags : 
webroot, security saas, web security, email security, security management, internet security, web service security, total cost of ownership
    
Webroot UK

Why You Should Consider Hosted Messaging Security

Published By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : 
saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS

Windows 10 Security and VMware AirWatch

Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for†the modern workforce. Whether remote, in the field or in†the office, workers are no longer physically connected to†your network or data center. Todayís employees work in a†digital workspace that features virtualized laptops, desktop†and workstations; a variety of personal systems and smart†devices that may be part of BYOD programs and a diverse†app ecosystem with desktop, remote, mobile, SaaS and†Universal apps. In this mobile-cloud world, new and†unpredictable forms of malicious software continue to†evolve. Traditional network security, perimeter protection†and firewalls are no longer enough to combat these new†threats to the corporate IT infrastructure and company†data integrity.
Tags : 
    
VMware AirWatch
Start   Previous    1 2 3 4 5 6     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.