secure im

Results 351 - 375 of 509Sort Results By: Published Date | Title | Company Name

Reputational Risk and IT in the Banking Industry

Published By: IBM     Published Date: Nov 05, 2014
How security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
IBM

Improving Server Performance and Security: An Impact Comparison of Application Control and Tradition

Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension

Mondelez and Kraft Foods Group Keep Innovation Flowing with Help from HP

Published By: HP Enterprise Services     Published Date: Mar 25, 2014
HP helped plan and deliver secure, next generation infrastructures for Kraft Foods Inc.’s launch as two independent public companies. Read how this fast-paced drive toward business agility through client virtualization and a versatile cloud architecture lowered operational costs, increased efficiencies, and improved resource control; giving the two giant “start-ups” the ability to be immediately productive.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, enterprise applications
    
HP Enterprise Services

Polycom Solutions for Microsoft UC Environments

Published By: Polycom     Published Date: Sep 24, 2014
Dynamic work environments are made-up of people on the move and virtual teams across different time zones. This makes it challenging to access an expert or to secure information. You need a communication solution that anchors fast-moving teams and enables communication from any device, anywhere; and communication tools that integrate with applications you use daily that are managed through a single interface to streamline deployment and speed your return on investment (ROI). Polycom and Microsoft® deliver a complete and interoperable end-to-end unified communications (UC) solution for voice, video, conferencing and collaboration and connect people from any device, and from any location.
Tags : 
solutions, environments, challenging, communication, deployment, roi, secure, information
    
Polycom

Hybrid Cloud Sync and Share

Published By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : 
soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr
    
Soonr

Secure Apps + Instant Access: Connect any user to any app with zero changes to the network

Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development
    
BubblewrApp

Tiering Data to the Cloud: When to Do It and How

Published By: NetApp     Published Date: Feb 14, 2017
Are you facing data management complexities in the hybrid cloud? Watch this short webcast featuring IDC to learn how organizations are building secure on-ramps to the cloud and ways you can achieve cost efficiencies while simplifying IT operations.
Tags : 
netapp, cloud, webcast, it operations, cost efficiencies
    
NetApp

Five Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Dec 09, 2016
The average organization owns about 2,500 apps - making a secure, seamless, scalable virtual workspace strategy easier said than architected. Businesses find themselves scrambling to deploy virtual workspace solutions that meet both mobile end-users' and IT's demands. In this white paper, you'll find five key criteria you must implement in order to effectively execute your mobile workspace plans. Get details on how to offer: A single point of access for productivity and tools Easy app navigation and management Personalization and customization And more
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

Cloud First, Now What? – Cloud Security Alliance paper

Published By: Palo Alto Networks     Published Date: Apr 25, 2017
This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Palo Alto Networks

Accelerate your General Data Protection Regulation (GDPR) Compliance Journey

Published By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to today’s security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365—relieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
    
Microsoft Office 365

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

How to Secure Your Containerized Infrastructure on AWS Cloud

Published By: AWS     Published Date: Jun 03, 2019
Background How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS

Managing Content Beyond the Corporate Walls

Published By: ASG Technologies     Published Date: Apr 25, 2017
In today’s business model, organizations must provide support and flexibility in addressing the needs of a growing mobile workforce, and interactions with external partners, suppliers, and clients. In short, today’s business model must look beyond corporate walls and extend their business processes and access to business information in an effective, and secure manner regardless of device type. In this way, cloud applications can be leveraged to enhance and extend business processes beyond their corporate walls and support the increasing use of mobile devices. This paper presents the challenges and benefits of implementing an integrated cloud solution that provides the flexibility, agility, and security business organizations need to increase operational efficiency, and responsiveness.
Tags : 
    
ASG Technologies

Watson Studio: Simplify and scale AI for hybrid, multi-cloud world

Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
• Do you want to win with AI in the hybrid, multi cloud world? Are you tackling data, algorithms and apps to drive business value from AI? We got you covered. Come and learn how you can simplify and scale your AI projects on Watson Studio. Hybrid cloud use cases spanning cloud, desktop and local are featured. Key Takeaways: • Open, trustworthy and secure approach to put AI to work for business • Go live and scale faster with AI-infused platform • Build train and deploy models across hybrid, cloud environments – including popular public cloud environments like AWS and Azure • Flexibility for cloud, on-premise and desktop deployment, bringing algorithms to wherever data resides • Progressing your AI/data science with Watson Studio • Register now and get ready to simplify and scale your AI investments to work for your business.
Tags : 
    
Group M_IBM Q119

Preparing for planet-scale security: Getting it right in electronics

Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Despite the business-transforming upsides of data from the Internet of things (IoT), there’s a downside: security. Porous networks and lax users offer tantalizing access for hackers. Although most security spending is at the enterprise level, a shift is needed to secure IoT applications and provide improved governance and accountability. Electronics companies must create secure environments that safely collect, consume, share and store data on their networks. But they also must go beyond devices and consumers to close holes to factory, ecosystem and partner networks.
Tags : 
planet scale security, iot, security, iot application, application security, partner networks
    
Group M_IBM Q1'18

Cloud Computing: Considerations and Next Steps

Published By: HP & Intel     Published Date: Oct 04, 2011
Read this whitepaper to understand Intel's Cloud vision for evolving cloud infrastructures to be more secure, simplified,and built and open standards.
Tags : 
network architecture, cloud computing, virtualization, infrastructure, design and facilities
    
HP & Intel

Why Cylance Beats the Competition When It Comes to Endpoint Protection

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance

Emperor II Brochure

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
Group M_IBM Q418

LinuxONE: A Secure, Scalable Data-Serving Infrastructure Accelerates Digital Transformation

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
Group M_IBM Q418

Operationalize Security To Secure Your Data Perimeter

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
Group M_IBM Q418
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.