security services

Results 301 - 325 of 443Sort Results By: Published Date | Title | Company Name

Global Insights on Document Security

Published By: Adobe     Published Date: Apr 13, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, cloud services, it research, global insights, security management, business intelligence, productivity, project management, cloud computing
    
Adobe

Building a Cloud Enabled Network with MPLS IP-VPN

Published By: XO Communications     Published Date: Apr 13, 2015
One of the leading ways that today’s organizations are providing secure, reliable and scalable answers for their networking needs is through MPLS IP-VPN network usage. However, businesses are also looking to create Intelligent WAN that integrates security, application performance management, and cloud services in order to create more intelligent wide area networks. This paper examines how to use the attributes of MPLS-based VPNs to enable enterprises to create a truly intelligent WAN, discussing key planning, implementation and management considerations to pave the way for a more intelligent and cloud-enabled WAN.
Tags : 
    
XO Communications

Intralinks VIA for Financial Services

Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis, financial institutions are faced with increasing scrutiny from government regulators. The Dodd-Frank act was passed in response to the disaster, creating the Consumer Financial Protection Bureau and mandating 398 new rulemakings, many of which remain to be finalized. In light of these events financial services organizations are increasingly relying on Intralinks® as the most secure way to control sensitive information when collaborating within and outside their organizations. Intralinks meets the strictest security, auditability, and compliance requirements of regulated entities around the world – regardless of business complexities. Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection
    
Intralinks

IDC MarketScape Evaluates Global Managed Security Services Providers

Published By: IBM     Published Date: Apr 09, 2015
IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based on the following criteria: Service capability across the MSS life cycle; Revenue and Geographic presence.
Tags : 
mssp, idc, idc marketscape, global managed security services, ibm, security, it management, knowledge management, data management
    
IBM

The Cloud Architect's Guide to Load Balancing on AWS

Published By: Appcito     Published Date: Apr 09, 2015
Elastic Load Balancing automatically distributes incoming web tra?c across multiple EC2 instances. With Elastic Load Balancing, you can add and remove EC2 instances as your needs change without disrupting the overall ?ow of information. If an EC2 instance fails, Elastic Load Balancing automatically reroutes the tra?c to the remaining running EC2 instances. If a failed EC2 instance is restored, Elastic Load Balancing restores the tra?c to that instance.
Tags : 
cloud architect, web traffic, elastic load balancing, information flow, load balancer, application security, amazon web services, aws, visibility, networking, business technology
    
Appcito

BDA White Paper - for social

Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco

BDA White Paper - for search only

Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco

Analyzing the Neverquest Malware Threat

Published By: F5 Networks     Published Date: Mar 18, 2015
Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works and how to mitigate Neverquest.
Tags : 
f5 networks, malware, security, network security, anti spam, anti spyware, anti virus, email security, hacker detection, internet security, intrusion prevention, wireless security, data protection
    
F5 Networks

Breaking the Cloud Security Barrier with Amazon Web Services

Published By: Crownpeak     Published Date: Mar 05, 2015
The cloud market is moving forward as reflected in both the evolving perspectives voiced by IT decision-makers and by the business success of cloud service providers. On perspectives, Stratecast’s recurring annual surveys reveal that public cloud adoption has now reached a much-awaited tipping point with a percentage of the 2014 survey respondents stating that they currently use public cloud Infrastructure as a Service (IaaS), and another percentage stating they will too within the next months. On cloud service providers, the business results of Amazon Web Services (AWS), now in its eighth year and still rapidly growing, make a similar statement. This report describes how AWS is breaking the “cloud not secure enough” adoption barrier and, in the process, injecting innovation into the competitive dynamics of the security market.
Tags : 
cloud security, crownpeak, security market, competitive dynamics, security, it management, data center
    
Crownpeak

The State of App Delivery in 2015 Report

Published By: F5 Networks Inc     Published Date: Feb 18, 2015
Organizations in every industry rely on applications to drive customer engagement, employee productivity and revenue. Deployed between users and the applications are a wide variety of “application services” designed to enhance security, improve performance and ensure reliability. F5 set out to evaluate the state of these services by asking IT professionals about their current and planned use of application services. Read the report to learn which strategic initiatives are driving application deployments including the most important trend for the next 2-5 years.
Tags : 
application services, customer engagement, employee productivity, application deployment, it management, knowledge management, enterprise applications, data management
    
F5 Networks Inc

MobileIron Content Security Service Datasheet

Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron

Why a Server Infrastructure Refresh Now & Why Dell?

Published By: Dell     Published Date: Feb 04, 2015
In the last few years there have been radical changes in the ways organizations operate and people work. Explosion of data, increased mobile demands, and the globalization of business in general are making 24/7 access to people and information the norm. Sophisticated cyber attacks are requiring robust systems security designed to counter new threats. And velocity is now essential when delivering new IT services.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell

5 Best Practices for Defending the Enterprise

Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, wireless security
    
Entrust Datacard

Best Practice Security in a Cloud-Enabled World

Published By: IBM     Published Date: Jan 09, 2015
This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Tags : 
best practices, it security, cloud infrastructure services, it business solutions, knowledge management, enterprise applications, data management, data center
    
IBM

Data Center Build vs Buy Tool

Published By: CenturyLink     Published Date: Jan 02, 2015
With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your IT infrastructure into a more efficient virtual environment. You manage your own hardware, software, and applications to maintain complete control while gaining the cost and growth benefits of colocation.
Tags : 
data center build, facility management, carrier access, global colocation services, it management, knowledge management, enterprise applications, data management, data center
    
CenturyLink

Enhancing Database Environments with NetApp Storage

Published By: NetApp     Published Date: Dec 15, 2014
Organizations of all kinds rely on their relational databases for both transaction processing and analytics, but many still have challenges in meeting their goals of high availability, security, and performance. Whether planning for a major upgrade of existing databases or considering a net new project, enterprise solution architects should realize that the storage capabilities will matter. NetApp’s systems, software, and services offer a number of advantages as a foundation for better operational results.
Tags : 
database, transaction processing, analytics, enterprise solution architects, storage capabilities, storage
    
NetApp

Independent Research Firm releases new Wave Leader Report for MSSP : North America, Q4 2014

Published By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : 
mssps, managed security service, security challenges, security professionals, security, it management, knowledge management, enterprise applications
    
SilverSky

Close the Window on Three Window Server Threat Scenarios

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation

File Transfers in Financial Services – A Compliance Guide

Published By: Ipswitch     Published Date: Dec 01, 2014
You’ve seen it in the news. The fines levied against financial institutions for non-compliance with governmental regulations can be staggering. We’re no longer talking about millions of dollars—but billions of dollars. Needless to say, the stakes are high. And at no point in the life of your IT department has it ever been more important to ensure compliance with international, federal and state mandates. File transfers are a perfect case in point.
Tags : 
ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution, audit trail, transfer security, automation, financial services, business process automation, change management, productivity
    
Ipswitch

Protect Against Targeted Attacks with Security Intelligence

Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection, internet security, intrusion detection, intrusion prevention, security management, web service security, vulnerability management, mobile device management
    
Symantec

Protect Against Targeted Attacks with Security Intelligence

Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, web service security
    
Symantec

Protect Against Targeted Attacks with Security Intelligence

Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, email security, internet security, intrusion detection, intrusion prevention, web service security
    
Symantec

3 Must-Haves for Rugged Devices

Published By: Dell     Published Date: Nov 20, 2014
A rugged device is just one piece of a mobile solution for highly demanding environmental work environments. Support, security, and manageability will keep employees in the field, on the road, and in the harshest conditions. Download this whitepaper to learn more about how to find the right combination of rugged mobile notebooks and services to meet the demands of your end users.
Tags : 
durable devices, instantgo2, it protection, encryption
    
Dell

Protect Against Targeted Attacks with Security Intelligence

Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, business continuity, email security, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, security management, web service security, vulnerability management, mobile device management
    
Symantec
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.