systems security

Results 101 - 125 of 321Sort Results By: Published Date | Title | Company Name

Move from IBM to Oracle and Accelerate Your Business

Published By: Oracle     Published Date: Oct 20, 2017
Oracle is making significant engineering investments to ensure that Oracle systems coupled with Oracle software deliver the best possible business results. Integrated hardware, accelerated virtualization, and encryption ensure that cloud deployments benefit from the utmost agility and security without suffering performance losses. It’s never been easier to upgrade your legacy systems and take advantage of Oracle's cutting-edge infrastructure systems. Advanced data security, extreme efficiency with Software in Silicon and dramatic gains in performance make Oracle systems the best choice for your Oracle software deployments.
Tags : 
    
Oracle

Secure and Efficient Infrastructure for Scale-Out and Cloud

Published By: Oracle CX     Published Date: Oct 20, 2017
Oracle’s new cloud platform, included a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
    
Oracle CX

New SPARC S7 Servers for Cloud & Scale-Out

Published By: Oracle CX     Published Date: Oct 20, 2017
On Thursday June 30th, we announced Oracle’s new cloud platform, including a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in
Tags : 
    
Oracle CX

Top 5 Reasons To Choose Oracle SPARC Over IBM Power

Published By: Oracle CX     Published Date: Oct 20, 2017
For the past several years IBM has been divesting its hardware business. At the same time, Oracle has continued to invest in IT infrastructure and cloud innovation. Oracle SPARC servers offer you greater performance and efficiency compared to IBM Power systems, with additional security and lower costs, along with the flexibility to run your applications on-premises or in the Oracle Cloud.
Tags : 
    
Oracle CX

Move from IBM to Oracle and Accelerate Your Business

Published By: Oracle CX     Published Date: Oct 20, 2017
Oracle is making significant engineering investments to ensure that Oracle systems coupled with Oracle software deliver the best possible business results. Integrated hardware, accelerated virtualization, and encryption ensure that cloud deployments benefit from the utmost agility and security without suffering performance losses.
Tags : 
    
Oracle CX

SecureWorks Threat Intelligence Executive Report

Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks

Gartner 4 Mobile Security Insights for CISOs

Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout

IBM QRadar Vulnerability Manager

Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC

Security for the future-ready workforce

Published By: Dell     Published Date: Aug 17, 2017
Today, technology is all about enabling business. Organizations of many types and sizes are developing, upgrading or replacing mobile applications to reflect changes in the workplace. Across industries, employees are working more while mobile, using multiple devices. When they return to the office, they are capitalizing on more flexible work environments and approaches to work. Many organizations are facilitating this anytime, anywhere work with mobility initiatives that provide mobile devices or allow employees to use their own. They are also modifying workspace designs, creating mobile workstations and mobile “hot spots” to enable workers to easily connect to enterprise systems when they return to the office. Enabling employees to work better can help organizations boost productivity and improve customer service. The real challenge is to continue supporting new ways of working, now and in the future, without compromising security.
Tags : 
security, workforce productivity, flexible work environments, secure employee systems, advanced
    
Dell

Evolve Your Website Security

Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec

Mimecast Catches Threats Missed By Symantec Email Security

Published By: Mimecast     Published Date: Aug 14, 2017
Not all email security systems perform the same. Lots of false negatives get let through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of incumbent email security systems to uncover the number, type and severity of threats getting into organizations. Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss. Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems like Symantec miss.
Tags : 
mimecast, symantec email security, esra, message labs
    
Mimecast

Building a Software-Defined Secure Network for Financial Services

Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

Engineered for the Cloud

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Oracle SPARC systems are engineered from the cloud and provide customers with effortless security, breakthrough efficiency, and straightforward simplicity. “Cloud is the way to go and we try to deliver that in the form of a platform that you can rely upon, that can scale, scale massively, scale reliably. The thing about SPARC in contract to other chips is the software that runs on it is highly reliable. You can heat it, you can beat it, you can give it a lot of load, but it doesn’t break, it just keeps running.”
Tags : 
    
Oracle PaaS/IaaS/Hardware

Wikibon Report: Encrypting Oracle Workloads becomes Cost-effective and Mandatory

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
This Wikibon Report offers detailed insight into how Oracle SPARC M7-based servers, and systems, use advanced offload technologies for encryption of systems; have very low encryption overheads; and are an important prerequisite for implementing best-of-breed security without impacting business productivity.
Tags : 
    
Oracle PaaS/IaaS/Hardware

Fulfilling the Promise of the Digital Workspace

Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware

Fulfilling the Promise of the Digital Workspace

Published By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch

Windows 10 Security and VMware AirWatch

Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch

The Impact of Device Selection on the Success, Benefits and TCO of Your Mobility Solution

Published By: Zebra Technologies     Published Date: Jul 19, 2017
Whether you’re in retail, manufacturing, warehouse management, transportation or healthcare, a mobility solution is a great way to empower your employees to do more. But maximizing the value and success of your mobility solution hinges on one critical decision: choosing the right mobile devices. This white paper takes a look at how choosing the TC51/TC56 for a mobility solution can have a significant impact on the overall success of your initiative.
Tags : 
device selection, staff collaboration, loyal shopper, delivery driver, mobility solution, device function, operating systems, os security services
    
Zebra Technologies

Creating the Network for the Future Digital Financial Institution

Published By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : 
account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

Connecting Physical and Virtual Networks with VMware NSX and Juniper Platforms

Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

Understanding the Role of Stolen Credentials in Data Breaches

Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks

Addressing NIST And DOD Requirements for Mobile Device Management (MDM)

Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM

Forrester Study: Closing the Cloud Email Security Gap

Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast

NPMD Solutions Support PCI DSS Compliance

Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.