secure im

Results 276 - 300 of 525Sort Results By: Published Date | Title | Company Name

International Dreams, Regulatory Realities: Strategies for navigating rules and regulations abroad

Published By: HSBC     Published Date: May 31, 2019
International expansion is a dream for many organizations. It’s often the key to unlocking opportunities and tapping into new markets. If you’re planning to expand across borders, it’s essential to have a thorough understanding of the rules and regulations in the respective geographies you’re seeking to settle into. The reality is, this knowledge is critical to your success. And while you may feel secure in your knowledge of domestic rules and regulations, the rules outside of the US can be entirely different. From the ingredients in your products to CO2 emissions to employment practices and beyond, you can expect to see rules and regulatory differences everywhere. It’s never safe to assume that procedures and practices will be similar to the ones you’re used to. Navigating new rules can be extremely complex, with nuances and ambiguities that are often difficult to foresee without proper strategic advisory. Fortunately, there are ways you can overcome these challenges. In this eBook, y
Tags : 
    
HSBC

Internet security for nomadic workers: 7 things you need to know

Published By: OpenDNS     Published Date: Jan 07, 2013
This whitepaper examines how the dramatic shift toward mobility has impacted IT's ability to effectively secure users, wherever they choose to work. Inside, you'll find advice for securing your users that's both practical and easy to implement.
Tags : 
security, network security, cloud, mobile, nomadic users, best practices, data protection
    
OpenDNS

Interxion meets the demands of the digital economy with tailored solutions from Schneider Electric

Published By: Schneider Electric     Published Date: May 31, 2019
Data centers are evolving. They are much more than the data storage facilities of the past—they are gateways to emerging markets and platforms from which businesses can expand their reach through greater connectivity. These evolutions require the deployment of secured IT platforms capable of supporting and treating a huge amount of data generated in real time. Learn how Interxion partnered with Schneider Electric to meet the needs of its customers and stay relevant in the rapidly evolving colocation market.
Tags : 
customer insight, colocation business, schneider electric
    
Schneider Electric

Interxion meets the demands of the digital economy with tailored solutions from Schneider Electric

Published By: Schneider Electric     Published Date: Jun 05, 2019
Data centers are evolving. They are much more than the data storage facilities of the past—they are gateways to emerging markets and platforms from which businesses can expand their reach through greater connectivity. These evolutions require the deployment of secured IT platforms capable of supporting and treating a huge amount of data generated in real time. Learn how Interxion partnered with Schneider Electric to meet the needs of its customers and stay relevant in the rapidly evolving colocation market.
Tags : 
customer insight, colocation business, schneider electric
    
Schneider Electric

Introducing the Next Generation of SPARC Servers E-Book

Published By: Oracle     Published Date: Apr 04, 2012
Fast, Scalable, Secure, Integrated, Optimized - discover the benefits of Oracle's new SPARC T4 servers and how they deliver world record performance for a wide range of enterprise applications, and offer enhanced reliability and security.
Tags : 
supercluster, sparc, t4-4, workloads, oracle exalogic elastic cloud, oracle, elastic capacity, infrastructure, data management, virtualization, cloud computing, design and facilities
    
Oracle

iOS Security Checklist

Published By: Jamf     Published Date: Jun 07, 2018
The Center for Internet Security (CIS) benchmark for iOS is widely regarded as a comprehensive checklist for organizations to follow to secure iPad and iPhone devices. This white paper explains how to implement the independent organization’s recommendations and walks you through: • CIS and iOS management basics • Securing institutionally-owned devices • Securing personally-owned devices
Tags : 
    
Jamf

IT Silos Are Hurting Your Company: Make IT Data a Strategic Asset

Published By: Splunk Inc.     Published Date: Jun 02, 2009
According to Forrester, organizations spent $1.5 trillion globally managing IT last year. 75% of this was spent on silos, legacy systems that still don't get answers to the most important questions: troubleshooting outages, investigating security incidents, and demonstrating compliance. Learn about the innovative software product forward-thinking organizations are using to dramatically improve their productivity and change the way they manage and secure IT.
Tags : 
it management, forrester, silos, legacy, data center, compliance, security, troubleshooting, secure data access, silo, splunk, secure, operations, compliance, audit, soa, virtualization, service-oriented architecture, service desk, productivity
    
Splunk Inc.

It’s Time Businesses Wake up to Mobile Security Reality

Published By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, mobile, byod
    
ThreatTrack Security

Kimpton Hotel Case Study: Utilizing VCE to Ensure Hotel Guests Always Feel at Home

Published By: EMC Converged Platforms     Published Date: Feb 01, 2016
Kimpton Hotels and Restaurants prides itself on the personalized connection between hotel staff and guests. In order to be successful, their IT infrastructure needs to be agile, secure, and reliable. After deploying EMC converged infrastructure from VCE, Kimpton achieved a 25 percent reduction in operating expenses, and they can now stand up virtual machines (VMs) in minutes to capitalize on business opportunities, compared to days or weeks with the old infrastructure. Read this customer case study to find out more about how Kimpton was able to reduce their costs while improving the performance of their IT environment.
Tags : 
vce, vblock, kimpton, converged infrastructure, legacy infrastructure, agile, availability, performance, enterprise applications, storage, business technology
    
EMC Converged Platforms

Leitfaden zur digitalen Transformation für den Chief Digital Officer

Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA

LinuxONE for Dummies

Published By: IBM     Published Date: Aug 26, 2019
To be successful, businesses must select a secure, scalable and reliable computing platform. At the same time, they also demand openness so development teams can slect tools & technologies they are skilled in using. In this book, discover how IBM LinuxOne platform can play a critical role in developing your enterprise computing strategy and understand the full overview of the value of LinuxONE when compared to other platforms.
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM

LinuxONE: A Secure, Scalable Data-Serving Infrastructure Accelerates Digital Transformation

Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM

LinuxONE: A Secure, Scalable Data-Serving Infrastructure Accelerates Digital Transformation

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
Group M_IBM Q418

Live Webinar: Simplify Networking with Riverbed SD-WAN & Amazon Web Services

Published By: Riverbed     Published Date: Apr 12, 2017
AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That’s where Riverbed comes in. Riverbed’s SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Register for the upcoming webinar to experience a fundamentally new approach to networking, with real users sharing their experience in addition to a joint customer, OpenEye that has saved time and money by utilizing this approach to cloud networking. OpenEye Scientific Software leveraged Riverbed SteelConnect to very quickly and easily establish secure connections to and between AWS VPCs, saving hours of network administration time.
Tags : 
    
Riverbed

Long-term Care Facility Uses Akario Backline® to Foster Stronger Transitions of Care

Published By: DrFirst     Published Date: Mar 13, 2015
Long-term care facilities are highly regulated institutions that are often reluctant to implement new health technology. Cedar Creek Nursing Center chose Akario Backline® secure chat to help improve care transition processes by minimizing phone calls and faxes.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario, backline, teams, groups, text, secure, patient experience, response, message, regulation, staff
    
DrFirst

macOS Security Checklist

Published By: Jamf     Published Date: May 04, 2017
The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. This white paper from Jamf—the Apple Management Experts—will show you how to best implement the independent organizations’ recommendations
Tags : 
    
Jamf

Magic Quadrant for WAN Optimization Controllers

Published By: Blue Coat Systems     Published Date: Jul 05, 2011
The wide-area network optimization controller market is maturing rapidly, but remains dynamic, with a high level of innovation from vendors. Organizations looking to acquire WOC capabilities should identify their specific needs and conduct real-life trials before committing to any purchase.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, magic quadrant, optimization controllers, network performance management, wide area networks, enterprise resource planning
    
Blue Coat Systems

Make the right moves to hit the cloud security target

Published By: IBM     Published Date: Jul 31, 2018
Simplify and secure identity and access management with IBM Cloud Identity for single sign-on, seamless access and improved efficiency.
Tags : 
    
IBM

Making IoT Connectivity Secure and Simple for Retailers

Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel

Making Passwordless Possible For Healthcare IT

Published By: SecureAuth     Published Date: Sep 07, 2017
How SecureAuth is eliminating passwords while improving security and user experience
Tags : 
    
SecureAuth

Manage Secure Shell (SSH) Access with Time-Bound Certificates

Published By: AWS     Published Date: Oct 02, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
    
AWS

Managing Content Beyond the Corporate Walls

Published By: ASG Technologies     Published Date: Apr 25, 2017
In today’s business model, organizations must provide support and flexibility in addressing the needs of a growing mobile workforce, and interactions with external partners, suppliers, and clients. In short, today’s business model must look beyond corporate walls and extend their business processes and access to business information in an effective, and secure manner regardless of device type. In this way, cloud applications can be leveraged to enhance and extend business processes beyond their corporate walls and support the increasing use of mobile devices. This paper presents the challenges and benefits of implementing an integrated cloud solution that provides the flexibility, agility, and security business organizations need to increase operational efficiency, and responsiveness.
Tags : 
    
ASG Technologies

Managing Mobile Risk in Healthcare

Published By: MobileIron     Published Date: Feb 12, 2019
Mobile solutions can be insecure and risk-prone. With MobileIron Threat Defense, healthcare organizations can immediately determine if a user’s mobile device is compromised, if any network attacks are occurring, and if malicious apps are installed on the device.
Tags : 
    
MobileIron

Managing Software Exposure Report

Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx

Market Trends: Take Advantage of Opportunities IoT Creates for Micro Data Centers at the Edge

Published By: Schneider Electric     Published Date: Oct 31, 2017
In some cases, adopting cloud IoT platform may make more sense where required processes, communication costs and cloud costs meet sufficient total cost of ownership against deploying MDC. Additionally, in situations that an end-user organization already has a secure room or a modular data center solution where infrastructure can be housed and/or the amount of infrastructure involved may be too small to benefit from power/cooling advantages of being housed in an MDC, the organization may not see a need for an MDC. An MDC is nothing more than a smaller form of a modular data center, and a number of providers have entered the modular data center solutions space in the past. These modular data center solution providers came into the market with high expectations for growth and ROI only to find that high sales were not forthcoming due to limited use cases, so many exited the space.
Tags : 
algorithm analysis, buyer trend, iot, workloads, market, vendors, data centers
    
Schneider Electric
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.