security infrastructure

Results 351 - 375 of 421Sort Results By: Published Date | Title | Company Name

The Secure Data Center: An Integrative Approach to Achieving Holistic Security

Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing, it management, business intelligence, business technology, infrastructure management
    
Digital Realty

The Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
    
VeriSign Incorp.

The Smart, Secure Cloud for Australia

Published By: Google     Published Date: Aug 09, 2017
This document gives an overview of how security is designed into Google’s technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google.
Tags : 
cloud, cloud computing, security, infrastructure
    
Google

The Smart, Secure Cloud for Singapore

Published By: Google     Published Date: Aug 09, 2017
This document gives an overview of how security is designed into Google’s technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google.
Tags : 
cloud, cloud computing, security. infrastructure
    
Google

The Surprising Ways that Inline Bypass Protects Business Operations

Published By: Gigamon     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon

The Threat Landscape

Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud
    
Kaspersky Lab

The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
    
Tripwire

The Ultimate Guide to Video Conferencing

Published By: Polycom     Published Date: Oct 17, 2016
With demand for video conferencing growing rapidly, solutions need to provide a robust, resilient, scalable, and manageable infrastructure that delivers unparalleled quality of experience. The Polycom RealPresence Platform is the software infrastructure that underlies Polycom’s video conferencing, and binds it together by integrating with core networking and security infrastructure. This enables secure collaboration for any number of users across heterogeneous networks, with up to 50% less bandwidth consumption than other competitor solutions. By delivering an architecture based upon open standards, Polycom has created a flexible, state of-the-art video conferencing platform that provides superior investment protection, at the lowest total cost of ownership. Download to learn more!
Tags : 
    
Polycom

The Unwitting Danger Within - Understanding and Mitigating User-Based Risk

Published By: Rapid7     Published Date: Oct 15, 2013
This eBook explores the different kinds of user-based risks in today's corporate environment, including mobile devices and cloud services, and gives actionable guidance on how to mitigate these risks.
Tags : 
rapid7, risk, security, real-time, infrastructure, intrusion detection, intrusion prevention, mobile computing
    
Rapid7

Think Your Network is Secure? Think again: Trend Micro Security Assessment eBook

Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
Trend Micro SPN

Three Key Considerations in Securing the Software-Defined Data Center

Published By: McAfee EMEA     Published Date: Nov 15, 2017
The transition to the SDCC gives IT managers and security professionals the opportunity to build in a security architecture that is designed from the ground up to meet the needs of the cloud era. With the right architectural model, security can be much simpler to deploy, provision, manage, and scale. Organizations can save money, enhance protection, and leverage the agility of private and hybrid cloud infrastructures. IT teams can expand their visibility from the data center into the cloud, uncovering threats wherever they appear and coordinating an appropriate and comprehensive response.
Tags : 
software, data center, security, managers, professionals, organizations, money
    
McAfee EMEA

Three Ways System Downtime Affects Companies and Four Methods to Minimize It

Published By: Globalscape     Published Date: Jul 31, 2014
Downtime happens and often at the worst time possible. Organizations experiencing downtime face direct and indirect costs from the loss of critical systems. This whitepaper discusses a Globalscape survey of 283 IT professionals and end users revealing the frequency of unplanned downtime, the effects on organizations, including average costs, and what IT administrators can do to minimize core system failure.
Tags : 
globalscape, downtime, productivity, it environments, critical systems, mission-critical systems, data loss prevention, security
    
Globalscape

Tolly Test Report: Antivirus Effectiveness VMware vSphere 5 Virtual Environments

Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec

Too Much of a Good thing? Enterprise Cybersecurity Adoption Trends across Asia Pacific

Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 42.3% of respondents in ASEAN countries saying they deal with more than 50 alerts each day. Shockingly, for 7% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in ASEAN.
Tags : 
    
Juniper Networks

Too Much of a Good Thing? Enterprise Cybersecurity Adoption Trends across Asia-Pacific

Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks

Top 10 Best Practices for Cloud Security Posture Management

Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware

Top 10 Best Practices for Cloud Security Posture Management

Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware

Top 10 Ways that Foglight for Virtualization, Free Edition Can Help You

Published By: Dell Software     Published Date: Aug 30, 2013
In this new technical brief, discover the top 10 ways Foglight for Virtualization, Free Edition, can help you with troubleshooting virtualization challenges. Read this technical brief today.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology, it management
    
Dell Software

Top 5 IT Benefits of the Next-Generation Workplace

Published By: Aruba Networks     Published Date: Nov 15, 2013
With more Internet-connected mobile devices than people in the world in 2013, IT must provide seamless connectivity to every class of user — employees, contractors, guests and even customers — appropriate to their role and type of device. Mobility in the workplace isn’t just for user benefit and productivity. The migration to mobility begets several IT benefits.
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks

Top 5 IT Benefits of the Next-Generation Workplace

Published By: Aruba Networks     Published Date: Nov 15, 2013
Le lieu de travail nouvelle génération repose sur la mobilité. À l’heure où le nombre d’appareils mobiles connectés à Internet dépasse la population mondiale, il est essentiel que les services informatiques soient en mesure d’offrir à chaque catégorie d’utilisateurs (employés, entrepreneurs, invités et clients) une connectivité fluide et adaptée à leurs besoins et types d’équipement. Outre les atouts évidents pour les utilisateurs et l’effet bénéfique sur la productivité, la migration vers la mobilité est source de nombreux avantages pour les services informatiques. Téléchargez ce livre blanc pour les découvrir…
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks

Top 5 IT Benefits of the Next-Generation Workplace

Published By: Aruba Networks     Published Date: Nov 15, 2013
Der Next-Generation Workplace steht für Mobilität. Im Jahr 2013 gab es mehr mit dem Internet verbundene Mobilgeräte als Menschen weltweit. Aufgabe der IT ist es, die dafür notwendigen Verbindungen und Netzwerke zu schaffen und dafür zu sorgen, dass diese an die Anforderungen der unterschiedlichen Benutzergruppen, an ihre Aufgaben sowie die eingesetzten mobilen Geräte angepasst sind – sei es für Angestellte, Unternehmer, Gäste oder Kunden. Mobiles Arbeiten steigert die Produktivität und bietet zahlreiche Vorteile für den Anwender – aber auch IT-Verantwortliche können profitieren. Laden Sie unser Whitepaper herunter und überzeugen Sie sich von den Vorteilen...
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks

Top 5 IT Benefits of the Next-Generation Workplace

Published By: Aruba Networks     Published Date: Nov 15, 2013
El lugar de trabajo de la próxima generación se centra totalmente en la movilidad. En este año 2013 hay más dispositivos móviles con conexión a Internet que personas en el planeta, de modo que la tecnología informática debe proporcionar una conectividad sin restricciones a cada tipo de usuario —trabajadores, contratistas, invitados e incluso clientes— apropiada para la función de cada uno y el tipo de dispositivo que utiliza. Se pone de manifiesto que la movilidad en el lugar de trabajo no es sólo para el beneficio propio del usuario y de la productividad. La migración hacia la movilidad genera varias ventajas en TI. Descárguese este documento técnico para descubrir las ventajas....
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks

Top 5 IT Benefits of the Next-Generation Workplace

Published By: Aruba Networks     Published Date: Nov 15, 2013
Il luogo di lavoro di nuova generazione sarà tutto concentrato sulla mobilità. Già nel 2013 nel mondo ci sono più dispositivi mobili che persone, e l'IT deve fornire una connettività senza interruzioni ad ogni tipo di utente — dipendenti, appaltatori, ospiti e persino clienti — che si adatti al loro ruolo e al tipo di dispositivo che utilizzano. E così, la mobilità sul posto di lavoro non giova solo agli utenti e alla produttività. La migrazione verso la mobilità genera numerosi vantaggi informatici. Scaricate questo libro bianco per scoprirli tutti…
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks

Top 5 Reasons To Modernize Your Data Center With Oracle SPARC

Published By: Oracle     Published Date: Oct 20, 2017
Replacing your aging infrastructure with a modern Oracle SPARC and Solaris architecture boosts the security, efficiency and performance of your data center. But, what about ongoing business growth and expansion? With the same architecture on-premises and in the Oracle Cloud, SPARC provides the easiest, most cost effective approach to modernizing your business infrastructure. Download this whitepaper to completely understand the value of the Oracle SPARC and the 5 reasons to modernize your data center with Oracle SPARC.
Tags : 
    
Oracle

Top 5 Reasons To Modernize Your Data Center With Oracle SPARC

Published By: Oracle CX     Published Date: Oct 20, 2017
Replacing your aging infrastructure with a modern Oracle SPARC and Solaris architecture boosts the security, efficiency and performance of your data center. But, what about ongoing business growth and expansion? With the same architecture on-premises and in the Oracle Cloud, SPARC provides the easiest, most cost effective approach to modernizing your business infrastructure.
Tags : 
    
Oracle CX
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.