secure im

Results 226 - 250 of 525Sort Results By: Published Date | Title | Company Name

How Novagalicia Secured Critical Applications With HP Fortify

Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Novagalicia Banco secured critical applications with HP Fortify improving the security of the discrete applications that were coming from myriad sources
Tags : 
novagalicia, applications, hp fortify, financial service industry, saas, security, fortify on demand, application security
    
HP - Enterprise

How Pokémon Secures Data for Hundreds of Millions of Users with Sumo Logic

Published By: AWS     Published Date: Oct 07, 2019
Pokémon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokémon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokémon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
    
AWS

How Pokémon Secures Data for Hundreds of Millions of Users with Sumo Logic

Published By: AWS     Published Date: Oct 09, 2019
Pokémon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokémon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokémon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
    
AWS

How Securing Recursive DNS Proactively Protects Your Network

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies

How to Enable Fast and Secure Network, Cloud, and Application Access

Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.
Tags : 
mobile connectivity, byod, device security, policy compliance, enduser, pulse secure, mobile worker, networking
    
PulseSecure

How to Gain Control of Complex Applications in the Time of Digital Transformation

Published By: Gigamon     Published Date: Jun 07, 2019
You know that complex microservices-based apps can be difficult to monitor, but did you know Application Intelligence provides both the visibility and the context needed to discover, manage and secure these apps? Download the Gigamon white paper “How to Gain Control of Complex Applications in the Time of Digital Transformation” to solve the challenges of capturing application traffic on the network, identifying apps and microservices, extracting information and metadata and distributing that information to tools.
Tags : 
    
Gigamon

How to prepare for your next security breach

Published By: Lenovo - APAC     Published Date: Jul 02, 2019
Your guide to security Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC

How to prepare for your next security breach

Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Your guide to security. Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC

How to prepare for your next security breach

Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide
Tags : 
    
Lenovo - APAC

How to Properly Manage Your Organization’s Air Travel Budget

Published By: Egencia     Published Date: Jun 18, 2014
In today’s business world, there is usually a lot of travelling taking place to secure contracts, meet clients, or visit satellite offices around the world. However, all of this moving around can be costly and poorly managed. Nevertheless, there are simple solutions for your travel managers. Download this whitepaper to learn how to properly manage your organization’s air travel budget and understand how air contracts are built and designed in order to balance your organization’s maximum cost savings with achievable contract obligations.
Tags : 
air travel budget, travel managers, business travel, business travel cost savings, travel expenses, travel budgeting, corporate travel options, human resource technology
    
Egencia

How to Secure a Moving Target with Limited Resources

Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia

How To Secure Government Data With Limited Resources

Published By: SailPoint Technologies     Published Date: Aug 02, 2019
Find out how cloud identity governance cost-effectively reduces security and compliance risk, while also providing timely access to information. Download the brief.
Tags : 
    
SailPoint Technologies

How to Secure Your Containerized Infrastructure on AWS Cloud

Published By: AWS     Published Date: Jun 03, 2019
Background How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS

How to Secure Your Containerized Infrastructure on AWS Cloud

Published By: AWS     Published Date: Oct 07, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS

How to Secure Your Containerized Infrastructure on AWS Cloud

Published By: AWS     Published Date: Oct 09, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS

How to Tackle the Three Biggest Barriers to Business Mobility

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
business mobility, efficiency, productivity, data security, employee satisfaction
    
Citrix ShareFile

How to Tackle the Three Biggest Barriers to Business Mobility

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
data security, business mobility, efficiency, employee satisfaction, productivity
    
Citrix ShareFile

How to Transform into a Digital Workspace

Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Download the free guide to learn how to give employees secure, flexible access to the apps, content, and data that they need to work from any device and location. In the guide, you will discover: • If your current productivity and collaboration tools are falling short. • 3 questions that will help you spot gaps in your mobile device security that are putting your company at risk. • Quick ways to improve employee collaboration while enhancing your data security.
Tags : 
    
Citrix ShareFile

How You Can Build Trust Between Your Security and Developer Teams

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

HP Converged Storage: Simplify and Optimize Your Virtualization and Cloud Deployment

Published By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
What’s needed today is storage that’s flexible enough to be used for both legacy IT and virtual systems environments and repurposed as new needs arise. Storage must be quickly expandable and must enable data and applications to be easily and securely migrated, with workloads automatically rebalanced. Applications need to be online 24 x 7, so high availability is paramount. Management of the entire storage pool, as well as coordination with virtualized servers and networking, must be streamlined and simplified. This Tech Dossier reveals how HP Converged Storage can meet your organizations storage requirements.
Tags : 
converged storage, optimize, virtualization, cloud deployment, high availability
    
HP - Intel® Xeon® processors

HP Flex-Bundles for Microsoft Hyper-V

Published By: HP     Published Date: Aug 26, 2014
Virtualizing with Microsoft Hyper-V allows you to control and cut costs while improving the scalability, flexibility, and reach of your IT systems. HP and Microsoft have joined together to create a portfolio of virtualization solutions designed for the needs of a growing businesses like yours. HP Flex-Bundles for Microsoft® Hyper-V are pre-defined, affordable configurations that combine the world’s most intelligent servers—HP ProLiant Gen8—with HP software, storage, networking, and Microsoft software to get you started and keep your business moving in your virtualization journey.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution
    
HP

HP Flex-Bundles for VMware vSphere with Operations Management

Published By: HP     Published Date: Aug 26, 2014
Start or expand your virtualization efforts quickly and affordably. HP and VMware provide a portfolio of virtualization reference configurations designed for growing businesses like yours. Based on HP ProLiant Gen8 servers, the HP Flex-Bundles for VMware, provide predefined virtualization solutions that include everything you need to reduce application downtime by 30 percent, slash diagnostics and problem resolution time by 26 percent, boost VMware capacity utilization by 40 percent, and increase consolidation ratios by 37 percent. Discover how.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution
    
HP

HP Haven: See the big picture in Big Data

Published By: HP     Published Date: Jan 20, 2015
HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the capability to handle 100 percent of your enterprise data—structured, unstructured, and semi-structured—and securely derive actionable intelligence from that data in real-time.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

HP Proactive Care Support for Gen9 Servers Customer Brief

Published By: HP     Published Date: Nov 05, 2014
HP Proactive Care helps prevent problems and stabilize IT by utilizing secure, realtime, predictive analytics and proactive consultations when your products are connected to HP. Benefits include: • Problem prevention • Predictive analytics for proactive reports • Personalized consultation with a Technical Account Manager • Rapid access to advanced technical experts Download this customer brief now.
Tags : 
proactive care, it stability, problem protection, reduce risks, prevent it issues, care service, gen9, customer brief
    
HP

HP ServeIT

Published By: HP     Published Date: Aug 26, 2014
Focus on running your business, not your business IT. HP ServeIT combines the world’s most intelligent servers with associated software options, and services, to solve today's challenges while preparing you for future business growth. Whether you are just starting out in defining your IT requirements, are ramping up your IT investments and capabilities to prepare for further business growth, or you are growing your infrastructure to support a booming business, HP and our robust partner community are ready to help you take the next step on your business journey. Start today.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution
    
HP
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.