secure im

Results 26 - 50 of 525Sort Results By: Published Date | Title | Company Name

6 Essentials of a Modern B2Bi Architecture

Published By: IBM     Published Date: Jun 07, 2017
Read this eBook to get insight on the essential elements of a modernized B2B integration architecture. Companies need a strategy as they think about modernizing their B2B integration capabilities. This eBook describes what to look for and how IBM can help. You’ll learn about: · Operating a single, secure B2B integration gateway · Simplified onboarding and partner management. · High availability business operations and disaster recovery · Adaptable capabilities to help react to changes to your business processes · Visibility and analytics that provide actionable insight over those processes · Supporting a mix of hybrid deployment models including on-premises and cloud
Tags : 
b2bi, ibm, b2b integration, modernization, b2b architechture
    
IBM

6 Steps to Overcoming PCI DSS Compliance Challenges in Mult-Cloud and Hybrid Environments

Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic

7 Key Questions to Ask When Selecting an Incident Response Service Provider

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017

8 Digital Best Practices for Procurement Professionals

Published By: DocuSign UK     Published Date: Nov 16, 2017
"Today’s procurement leaders are using technology to achieve greater procedural and financial efficiencies, secure the best products and services, and improve vendor relationships. However with the lack of technology to boost efficiency and strengthen the partnership with vendors and employees, saving costs and speeding up procurement processes can be quite cumbersome. Industry experts predict that successful businesses will soon become 100% digital for all transactions. The challenge is how to “go digital” in the right ways. Download this best practices paper to learn the eight important ways that procurement teams can make meaningful progress in their digital transformations. "
Tags : 
procurement, professionals, practices, departments, digital, docusign, esignature
    
DocuSign UK

A holistic approach to your BYOD challenge

Published By: HP     Published Date: Aug 26, 2014
More and more enterprises are adopting “bring your own device” (BYOD) initiatives to let employees choose the device they use. The HP BYOD solution, based on the HP Intelligent Management Center (IMC), offers a single-pane-of-glass network and user management solution for your entire network. With an HP BYOD solution, you can efficiently manage your entire infrastructure, secure personally owned devices, and monitor BYOD traffic. HP IMC also goes beyond the unified BYOD essentials by delivering converged management across various networks—physical and virtual, wired and wireless, and Software-Defined Networking (SDN). Discover how.
Tags : 
byod, holistic, data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork, agility, cost-saving, software development
    
HP

A practical guide to optimizing the care pathway for hospitals

Published By: ALE     Published Date: Dec 05, 2018
A hospital’s network is the foundation for the critical applications that run on it, where most of those applications are related to the hospitals core businesses. The return on the investments made in EMR (electronic medical records), PACS (picture archiving and communication system), clinical imaging systems and workstations on wheels, can only be truly realized if those assets are always available to the people in need in a reliable, secure and highly optimized way, at a fixed location, or while mobile. Find out how to simplify network management and enhance application and service visibility with Smart Analytics and PALM by downloading this whitepaper today.
Tags : 
    
ALE

A Repeatable Cloud-First Deployment Process Model

Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9

A single, secure solution for document-sharing, web meetings, social business and more

Published By: Central Desktop     Published Date: Aug 05, 2011
Central Desktop is the ideal collaboration software for technology companies looking for a secure, powerful solution that will reduce costs, enhance team collaboration and improve project management. It helps IT directors and teams keep documentation up-to-date, share files, manage versions, and keep internal business units from using unapproved, non secure services for sharing documents online and internally. >>>Register to learn more
Tags : 
social collaboration, online collaboration, collaboration software, team collaboration, sharepoint alternative, project collaboration, online team collaboration, online project management, it collaboration, it project management, microsoft sharepoint, internet security, network security appliance, security management, single sign on, analytical applications, business intelligence, configuration management, data integration, collaboration
    
Central Desktop

Accelerate GDPR readiness by keeping your company’s data secure

Published By: IBM     Published Date: May 25, 2018
Accelerate GDPR readiness bykeeping your company’s data secure is important.
Tags : 
    
IBM

Accelerate Your Digital Transformation with UEM

Published By: Kaseya     Published Date: Mar 01, 2019
The increasing number of endpoints and the growing complexity of IT landscape brings in the need of having a unified method of managing IT. Unified Endpoint Management (UEM) gives organizations a simple, flexible way to manage and secure endpoints from an all-in-one single platform. With capabilities such as centralized discovery and management, automation and remote control, UEM equips enterprises to address complex problems encountered by IT in the current landscape. Download this ebook to learn how to enable your IT teams to eliminate roadblocks and increase productivity and move forward on their way to the digital transformation of the enterprise. Few salient points: -The challenges faced by modern IT teams -How Unified Endpoint Management helps address these challenges -Benefits of Unified Endpoint Management in the enterprise -Kaseya’s approach to UEM
Tags : 
    
Kaseya

Accelerate your General Data Protection Regulation (GDPR) Compliance Journey

Published By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to today’s security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365—relieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
    
Microsoft Office 365

Accelerating digital transformation with IBM API Connect

Published By: IBM     Published Date: Aug 08, 2016
IBM API Connect is a comprehensive management solution that addresses all four aspects of the API lifecycle: create, run, manage and secure. This makes API Connect far more cost-effective than limited point solutions that focus on just a few lifecycle phases and can end up collectively costing more as organizations piece components together. Download this datasheet and find out how IBM API Connect can help your organization.
Tags : 
ibm, api, api economy, integration, application program interface, cloud, middleware, digital transformation, ibm api connect, enterprise applications, business technology
    
IBM

Accelerating digital transformation with IBM API Connect

Published By: IBM     Published Date: Nov 17, 2016
IBM API Connect is a comprehensive management solution that addresses all four aspects of the API lifecycle: create, run, manage and secure. This makes API Connect far more cost-effective than limited point solutions that focus on just a few lifecycle phases and can end up collectively costing more as organizations piece components together. Download this datasheet and find out how IBM API Connect can help your organization.
Tags : 
ibm, api, api economy, integration, application program interface, cloud, middleware, digital transformation, ibm api connect, knowledge management, enterprise applications, business technology
    
IBM

Accelerating Government IT Innovation

Published By: MuleSoft     Published Date: Jan 16, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on these expectations grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: How agencies have increased IT agility with reusable microservices Why government IT teams must move beyond point-to-point integration How microservices enable secure data sharing within and across agencies How API-led connectivity supports microservices adoption in government
Tags : 
    
MuleSoft

Accelerating Government IT Innovation

Published By: MuleSoft     Published Date: Nov 27, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on digital transformation grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: Why government IT teams must move beyond point-to-point integration How API-led connectivity supports microservices adoption in government How government can use MuleSoft’s FedRAMP In Process integration platform to rapidly develop APIs and microservices
Tags : 
    
MuleSoft

Accounts Payable Field Guide: How to Treat the Top 5 Pains in Your AP Team

Published By: Esker     Published Date: Mar 18, 2016
You know how to run an effective AP operation - we're not here to lecture you. This field guide is simply a handy resource for pinpointing the pains in your AP process and exploring potential solutions to fix them. Expect to take home some best practices on how to: - Secure AP invoicing cost savings of up to 80% - Drastically reduce your rate of invoice exceptions - Gain significantly more early payment discounts - Simplify workflow for every AP stakeholder Download the Accounts Payable field guide to learn more!
Tags : 
esker, accounts payable, ap team, best practices, ap stakeholder, invoice exceptions, it management, enterprise applications, data management, business technology
    
Esker

AEROSPACE & DEFENSE: MANAGE AND SECURE YOUR INTELLECTUAL PROPERTY

Published By: Dassault Systčmes     Published Date: Aug 08, 2017
Intellectual Property (IP) is the life-blood of your Aerospace & Defense business. It’s the product designs that required thousands of man-hours and millions of dollars to create, or the 10-year strategy overviews that can give a competitor a huge advantage. The stakes for safeguarding IP within the Aerospace & Defense industry are at an all-time high, given the costs, complexity and potential military applications of their products. Read this White Paper to learn how you can secure and manage your IP by implementing the right strategy.
Tags : 
intellectual property, aerospace, defense business, product design, security
    
Dassault Systčmes

Agile Data Masking for a Faster, More Secure Enterprise

Published By: Delphix     Published Date: Mar 24, 2015
Data masking has long been a key component of enterprise data security strategies. However, legacy masking tools could not deliver secure data, undermining their impact. Explore how data as a service can deliver on the promise of masking, while increasing organizational flexibility and agility.
Tags : 
    
Delphix

Agility is the new TCO. Is your team ready?

Published By: Juniper Networks     Published Date: Oct 02, 2018
Design your data center to be agile, automated, secure—and reduce TCO by as much as 25%. • Stay agile through automation • Increase security without increasing spending • Simplify and streamline through a common OS
Tags : 
    
Juniper Networks

Always On SSL: Protect online users from start to finish

Published By: Thawte     Published Date: Oct 05, 2015
As online attacks become more frequent and easier to execute, organisations around the world are under increasing scrutiny to ensure all online transactions involving confidential data are secure. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL that helps protect the entire user experience from start to finish, making it safer to search, share and shop online. Discover more about this best practice protection by downloading our new reference guide now.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection, security
    
Thawte

An advertiser’s guide to higher return on ad spend

Published By: Adobe     Published Date: Oct 17, 2019
The advertising world was once unscalable and manually labor intensive, but with AI, you can transcend your sense of what’s possible. Increase your efficiency, raise your return on ad spend, improve the customer experience, and secure your competitive advantage—all free of the manual processes that hold other advertisers back. With the help of Adobe Sensei across the entire Adobe Advertising Cloud suite, better advertising planning, forecasting, optimization, and experiences are within your reac
Tags : 
    
Adobe

An Application-Centric Approach to Digital Transformation

Published By: F5 Networks Inc     Published Date: Apr 15, 2016
As enterprises evolve to the 3rd Platform of IT, they will reap many benefits and face many challenges. Meeting the rapid pace of business and taking control of the customer experience must be balanced with keeping assets secure as the enterprise perimeter expands or dissolves altogether.
Tags : 
application, transformation, cloud, enterprise, mobile, social, technology, networking, it management, enterprise applications, data management, it career advancement, business technology, telecom
    
F5 Networks Inc

An IT-Friendly Approach to Secure Messaging

Published By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : 
access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
    
Sigaba

Android for Work: 8 Security Considerations

Published By: MobileIron     Published Date: Apr 13, 2015
Enterprises around the world have been searching for a way to securely enable Android™ devices for work, but have shied away from the platform due to ongoing security and fragmentation concerns. Delayed or non-existent Android security patches, malicious app store activity, and other security gaps have led organizations to distrust the platform, particularly those in industries with tight security and compliance requirements. This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.