secure im

Results 501 - 525 of 525Sort Results By: Published Date | Title | Company Name

Web Threat Protection

Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we will look at factors favoring cloud and SaaS solutions in general, reasons why secure web gateways in the cloud can provide better security than appliances and local servers, and how the Webroot Web Security Service can maximize security and minimize costs using a cloud-based architecture.
Tags : 
web threat, security, could, saas solutions, webroot, knowledge management, electronics, data center
    
Webroot Inc

Webroot Endpoint eBook

Published By: Webroot Inc     Published Date: Sep 14, 2015
Webroot SecureAnywhere® Business Endpoint Protection is the next generation of endpoint security. It's smarter, faster, more effective, and easier to use and deploy than traditional solutions. Learn about our unique approach to endpoint security and more in our complimentary eBook.
Tags : 
endpoint protection, security software, user protection, security
    
Webroot Inc

Webroot Endpoint Security and Virtualization

Published By: Webroot UK     Published Date: Feb 04, 2013
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot Secure Anywhere Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint, security, virtualization, environments, performance, protection, manageability, business technology
    
Webroot UK

Webroot SecureAnywhere Business - Endpoint Protection

Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats
    
Webroot UK

What Customers Want in 2019

Published By: Riskified     Published Date: Aug 06, 2019
By partnering with an end-to-end solution, merchants can increase approval rates and eliminate costly chargebacks and manual reviews. Those have been Riskified’s traditional benefits since we first struck out to change the eCommerce world in 2013. But in 2019, that’s simply not enough anymore. As eCommerce merchants continue to innovate, the expectations of American consumers have also risen. They expect a multitude of fulfillment options, and they demand that merchants provide them securely. For a business to stand out, offering an excellent product or service is not enough — it’s also about limiting confusion, limiting friction, providing reassurance, and creating the smoothest possible purchase journey every single time. It’s hard to do that alone. That’s what we’re here for.
Tags : 
    
Riskified

What is the business cost of content chaos?

Published By: IBM     Published Date: Nov 10, 2016
Within any organization, business content – applications, forms, reports, office documents, audio, video, and social media – is poorly managed and often out-of-reach of critical business processes. And, when business content is invisible, unclassified or unmanaged, it creates chaos. Content chaos causes a breakdown in the flow of information between an organization and its customers, its partners and even within itself – failures that often impact customer engagement, business agility, and the capacity to collaborate securely and effectively. It's time you learn how to put your business content to work.
Tags : 
ibm, analytics, ecm, business cost, business process, enterprise applications, business technology
    
IBM

What You Need to Know About Operationalizing Your AWS Transit Hub

Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix

When your business relies on the cloud, you need an AI-enabled cloud platform

Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM

Whitepaper: Putting Web Threat Protection and Content Filtering in the Cloud

Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications, business technology, cloud computing
    
Webroot

Whitepaper: SAP HANA & Vormetric – Data Security in the Cloud

Published By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : 
sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance
    
Vormetric, Inc.

Who Moved My Secure Perimeter?

Published By: Centrify     Published Date: May 26, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : 
security, endpoint security, access control, authentication, security management
    
Centrify

Why Cylance Beats the Competition When It Comes to Endpoint Protection

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance

Why Data Orchestration Will Fast Track the Energy IoT

Published By: Sierra Wireless     Published Date: Jun 19, 2019
By simplifying the ability of companies to securely extract, orchestrate and act on data from when it is generated by energy assets to when it is transmitted to the cloud, Octave simplifies the development and commercialization of Energy IoT applications. With Octave, energy companies are empowered to realize the Energy IoT’s tremendous potential, with new demand response, energy efficiency optimization, predictive maintenance and other applications that maximize the value created by energy assets and minimize their environmental impact. In doing so, these Energy IoT applications can reduce energy costs, improve customer engagement, lower greenhouse gas emissions and increase energy reliability. Start with Sierra to learn more about how our Octave D2C data orchestration solution can help you bring to market Energy IoT applications that reimagine the future of energy.
Tags : 
    
Sierra Wireless

Why Deliver Skype for Business with Citrix XenApp and XenDesktop?

Published By: Citrix Systems     Published Date: Apr 15, 2016
Deliver secure, high-performance unified communications for your organization with Citrix XenApp or XenDesktop and the HDX RealTime Optimization Pack for Skype for Business—the only Microsoft-endorsed solution for delivering Skype for Business in a virtual environment.
Tags : 
citrix, skype for business, xenapp, xendesktop, better communication, best practices, enterprise software, video conferencing
    
Citrix Systems

Why digital transformation is redefining how people, technology and devices interact in healthcare

Published By: ALE     Published Date: Dec 05, 2018
A highly resilient data and communications network that supports easy accessibility and cost efficiency is a requirement for hospitals and medical facilities that seek to leverage technology to digitally transform their processes. Alcatel-Lucent Enterprise (ALE) provides a broad range of robust and secure networking, infrastructure and communication products and services to connect patients, caregivers, staff and the entire healthcare ecosystem. ALE specialized data and communications networks for healthcare providers optimize the care pathway through improved communications and more efficient processes to provide more timely, safe and effective care. To find out more download this whitepaper today.
Tags : 
    
ALE

Why HIPAA Compliance Is Vital For Your Business

Published By: Auth0     Published Date: May 12, 2016
HIPAA is the Health Insurance Portability and Accountability Act. It’s the legislation that makes sure your protected health information (PHI) is kept private and kept secure. It covers how healthcare providers and associated businesses should keep handle your data and protect your health information, and provides the standards needed to ensure PHI data stored, handled, and accessed correctly at all times.
Tags : 
auth0, hipaa, compliance, health insurance, legislation, business technology
    
Auth0

Why invest in Fraud Management?

Published By: CyberSource EMEA     Published Date: May 04, 2018
The digital economy is dramatically changing how consumers shop and interact with businesses. They expect a fast, convenient and highly secure digital experience. With the average company lifespan decreasing rapidly, merchants have to operate as a true digital enterprise to stay competitive and to stay in business. Payment and fraud management is no longer a back-office utility. It is a prime differentiator, critical to achieving competitive advantage, improving customer experience and reducing risk. Digital transformation is not simply a market buzz word. It is real. And those who don’t embrace it are in a position to lose. By 2020, eCommerce sales as a percentage of retail sales are forecast to be 12.4% compared to 8.0% in 2016, according to eMarketer. And engaging customers digitally across channels remains a top digital initiative. While there are several drivers of growth in the digital economy, none are more significant than the force of mobile and cloud technologies. Innovation
Tags : 
    
CyberSource EMEA

Why it’s harder to protect data on the move and how to solve for it

Published By: Carbonite     Published Date: Jul 18, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite

Why Your Data May Be Vulnerable in Places You Wouldn't Expect

Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America

Windows 10, EMM, and the Future of PC Security and Management

Published By: MobileIron     Published Date: May 23, 2016
Managing your devices keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron makes your life much simpler and streamlines many traditional PC management responsibilities. 415
Tags : 
security, mobileiron, best practices, windows, device management, identity management, security management, mobile computing
    
MobileIron

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 05, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises.
Tags : 
    
IBM

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM

Your Quick Reference Guide to HTTPS Everywhere

Published By: DigiCert     Published Date: Aug 01, 2018
As a leading provider of SSL certificates, DigiCert is here to help you discover the benefits of using HTTPS across your entire site, and to help you successfully implement it. HTTPS Everywhere is a best practice security measure for websites that ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS—the secure web protocol enabled by SSL/TLS—across your entire website instead of selectively. Implementing HTTPS Everywhere on your website secures the user and your organization’s data on every page— from start to finish.
Tags : 
    
DigiCert

Zero Trust Security: A New Paradigm For a Changing World

Published By: Centrify Corporation     Published Date: May 22, 2018
A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade — when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop — Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees. While difficult to identify the precise tipping point, one thing is certain: what were once extraordinarily high-profile, damaging breaches are no longer extraordinary. In just the last 18 months, Yahoo, Accenture, HBO, Verizon, Uber, Equifax, Deloitte, the U.S. SEC, the RNC, the DNC, the OPM, HP, Oracle and a profusion of attacks aimed at the SMB market have all proven that every organization — public or private — is susceptible. The epiphany behind the paradigm shift is clear: Widely-accepted security approaches based on bolstering a trusted network do not work. And they never will. Especially when businesses are dealing with skill
Tags : 
    
Centrify Corporation

“An Introduction to DocuSign for Purchasing Management”

Published By: DocuSign     Published Date: Feb 13, 2017
"O-Demand Webinar: See how workflow can be sped up significantly by removing of paper frmo the equation. A paperless environment with eSignature functionality paves the way for secure, authorized signing of documents in minutes plus the tracking all forms to completion with full visibility anytime, anywhere, on any device. "
Tags : 
    
DocuSign
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.