secure im

Results 126 - 150 of 525Sort Results By: Published Date | Title | Company Name

Multicloud Storage for Dummies

Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
"Now there’s an innovative new way to move enterprise applications to the public cloud while actually reducing risks and trade?offs. It’s called multicloud storage, and it’s an insanely simple, reliable, secure way to deploy your enterprise apps in the cloud and also move them between clouds and on? premises infrastructure, with no vendor lock?in. Multicloud storage allows you to simplify your infrastructure, meet your service?level agreements, and save a bundle."
Tags : 
    
Hewlett Packard Enterprise

The EHR Imperative: A proactive approach to health data security

Published By: ServiceNow     Published Date: Aug 20, 2018
Find out how leading healthcare providers are using a proactive approach to keep their EHR and supporting infrastructure continually running and compliant with strict regulations for health data security and privacy. Learn more about keeping critical systems operational and sensitive data secure. Download this white paper to see how eliminating outages and combatting cyberattacks can help improve patient care.
Tags : 
    
ServiceNow

Enterprises Need the Best Distribution of Apache Cassandra™ and So Much More!

Published By: Datastax     Published Date: Aug 15, 2018
Today’s enterprises continue to differentiate themselves via their cloud applications. But differentiation is getting harder and harder to accomplish. To stand out, you need a flexible, nimble, scalable, always-on data platform that can deliver powerful, game-changing, customer-facing applications. Read this white paper to learn how DataStax Enterprise delivers comprehensive data management through a secure, operationally simple platform built on the best distribution of Apache Cassandra™.
Tags : 
    
Datastax

AWS Security & Cost Optimization Guide

Published By: Ahead     Published Date: Aug 08, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, they’re realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is well-intended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular-- Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through missteps and how to get it right.
Tags : 
    
Ahead

Your Quick Reference Guide to HTTPS Everywhere

Published By: DigiCert     Published Date: Aug 01, 2018
As a leading provider of SSL certificates, DigiCert is here to help you discover the benefits of using HTTPS across your entire site, and to help you successfully implement it. HTTPS Everywhere is a best practice security measure for websites that ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS—the secure web protocol enabled by SSL/TLS—across your entire website instead of selectively. Implementing HTTPS Everywhere on your website secures the user and your organization’s data on every page— from start to finish.
Tags : 
    
DigiCert

Make the right moves to hit the cloud security target

Published By: IBM     Published Date: Jul 31, 2018
Simplify and secure identity and access management with IBM Cloud Identity for single sign-on, seamless access and improved efficiency.
Tags : 
    
IBM

Why it’s harder to protect data on the move and how to solve for it

Published By: Carbonite     Published Date: Jul 18, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite

Are you fulfilling your responsibilities for cloud security?

Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG

Simplifying large-scale Internet of Things (IoT) device deployments

Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS

Oracle Cloud Threat Report - Are you fulfilling your responsibilities for cloud security?

Published By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG

Why Cylance Beats the Competition When It Comes to Endpoint Protection

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance

IBM Delivers Innovative Cloud Infrastructure Solutions Spanning On-Premises & Hybrid Cloud

Published By: IBM     Published Date: Jul 02, 2018
Cloud has evolved from a technological innovation to an integral part of business. Companies in every industry are investing in Digital Transformation initiatives to evolve and grow; often, cloudbased platforms are foundational elements of these transformations, as businesses increasingly seek the flexibility and agility to roll out new software services in days or weeks, versus months or years. As Digital Transformation initiatives unfold, one key challenge is to modernize the data center to facilitate rapid delivery of new applications and services—while still ensuring that existing missioncritical applications remain high performing, available, and secure. Another challenge relates to new requirements for accelerating the analysis of organizational data to near real time, much faster than previously possible with earlier incarnations of Business Intelligence (BI). Agile businesses are demanding faster access to the information contained within operational and business data stores to
Tags : 
    
IBM

The Power of Team Communications For Schools

Published By: Motorola Solutions     Published Date: Jul 02, 2018
We all want our nation’s schools to be safe, secure learning environments where students can realize their full potential. This requires reliable, continuous communication among school personnel, both onsite and district-wide, plus the ability to instantly connect with first responders in an emergency. This seamless communication must be delivered over any network, from any location, using any device. Team Communications from Motorola Solutions provides this seamless integration, helping schools preserve the all-important safety of their students. Team Communications empowers educational institutions to transform how they communicate, enabling individuals to share real-time information to make schools safer and staff more productive. Schools across the U.S. use Team Communications from Motorola Solutions to deliver unified voice and data to administrators, teachers, maintenance, security, coaches, and other personnel, improving decision making, increasing visibility into school activit
Tags : 
    
Motorola Solutions

Emperor II Brochure

Published By: IBM     Published Date: Jun 29, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
IBM

LinuxONE: A Secure, Scalable Data-Serving Infrastructure Accelerates Digital Transformation

Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM

Operationalize Security To Secure Your Data Perimeter

Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM

Transform Supply Chain transparency with IBM Blockchain

Published By: IBM     Published Date: Jun 25, 2018
Complex and strictly regulated supply chains require trust between involved parties to function properly and maximize efficiency. Addressing a wide range of challenges, IBM Blockchain efficiently streamlines the supply chain by digitizing the process to provide a secure, trustworthy and shared record of ownership. Making relevant information available to parties involved, the blockchain addresses transparency issues and open standards. It can also simultaneously track the supply chain status for risks and triggers remediation actions before a crisis emerges. Learn more about how IBM Blockchain can transform your supply chain to get more business value out of your processes and data. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market. https://www-07.ibm.com/ibm/au/businesspartners/embed/
Tags : 
    
IBM

Evolving ECM to Business Content Services: What You Need to Know

Published By: Box     Published Date: Jun 22, 2018
Content is a core element of digital business. Companies must create, secure, manage, and collaborate upon content with both internal and external participants. But traditional ECM technology is costly and dated while EFSS is limited in functionality. The result? Too many content repositories, leading to silos and broken communication. Companies need a better way to work! • Join us as we chat with Cheryl McKinnon, our featured speaker from Forrester Research, to learn how to make the most of your content investment and drive innovation through IT. Takeaways from the webinar include: o 5 key trends shaping the market o Key capabilities of content management vendors o Essential use cases and recommended tactics to accelerate digital transformation
Tags : 
    
Box

Secure App Service. Unrivaled code signing key security to protect business integrity

Published By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
    
DigiCert

The Guide to Multi- Dimensional ADC Scaling for Digital Transformation

Published By: Citrix     Published Date: Jun 15, 2018
The world of IT is undergoing a digital transformation. Applications are growing fast, and so are the users consuming them. These applications are everywhere—in the datacenter, on virtual and/or microservices platforms, in the cloud, and as SaaS. More and more apps are now being moved out of datacenters to a cloud-based infrastructure. In order for an optimized and secure delivery of these applications, IT needs specific network appliances called Application Delivery Controllers (ADCs). These ADCs come in hardware, virtual, and containerized form factors, and are sized by Network Administrators based on the current and future usage of applications. The challenge with this is that it’s hard to foresee sizing or scalability requirements for these ADCs since users are constantly increasing, and applications are consistently evolving, as well as moving out of datacenters. Complicating matters, most ADCs are fixed-capacity network appliances that provide zero or minimum expansion capability
Tags : 
    
Citrix

Remote Access and Security Challenges & Opportunities

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies

Enabling Single Sign-On Across All Application Types 

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies

How Securing Recursive DNS Proactively Protects Your Network

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies

Three Questions You Must Answer for GDPR Readiness

Published By: Symantec     Published Date: Jun 13, 2018
The General Data Protection Regulation (GDPR) takes effect May25, 2018. If you process European Union (EU) personal data, GDPR likely applies to you—even if you’re not in the EU. That’s because the regulation is truly global in scope and applies to any organization that processes EU personal data, irrespective of where the companies are based or where the data is processed. At its heart, the GDPR legislation is about ensuring privacy is respected as a fundamental right and that personal data is kept private and secure. Elizabeth Denham, of the EU Information Commissioner Office (ICO), says “This law is not about fines. It’s about putting the consumer and citizen first” and “Issuing fines has always been and will continue to be, a last resort.” However, it’s important to note the costs of noncompliance can be severe. These can include a fine of up to 4 percent of global turnover (revenues) or €20m, whichever is higher; a temporary or permanent suspension of the right to access or proce
Tags : 
    
Symantec

When your business relies on the cloud, you need an AI-enabled cloud platform

Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.