truste

Results 151 - 175 of 319Sort Results By: Published Date | Title | Company Name

Entrust IdentityGuard Cloud Services SSL: Centralized Management of Digital Certificates

Published By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
Entrust Datacard

ADP Customer Case Study

Published By: EMC Corporation     Published Date: Aug 05, 2014
Roland Cloutier, CISO of ADP, describes how the largest single payer in the US tax system leverages RSA Security Analytics as the foundation of their Trusted Platform Security Initiative.
Tags : 
case study, adp, best practices, security analytics, rsa, trusted platform security initiative, security, security management
    
EMC Corporation

EVault Ebook: Trusted Data Assurance in the Cloud

Published By: EVault Inc.     Published Date: Aug 22, 2012
How will you prepare your company for cloud adoption? Cloud services are especially attractive to midmarket companies hit with the high cost of meeting compliance requirements. Author and information security expert Felix Santos discusses: . Information security and data protection in the cloud . Recent cloud standards and audit initiatives . Evaluation criteria for selecting a cloud provider that offers trusted data assurance
Tags : 
evault, ebook, trusted, data, assurance, cloud, services, compliance
    
EVault Inc.

Stop Stealth Attacks with Endpoint Security Beyond the OS

Published By: McAfee     Published Date: Feb 06, 2013
Learn how McAfee Deep Defender version 1.0 targets the more dangerous kernel mode rootkits.
Tags : 
rootkit, deep defender, application control, change control, black listing, white listing, security compliance, trusted memory services layer
    
McAfee

Choosing a Cloud Hosting Provider with Confidence

Published By: Symantec Corporation     Published Date: Mar 21, 2014
Symantec SSL certificates provide a secure bridge to trusted cloud hosting providers
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation

The Hidden Costs of Self-Signed SSL Certificates

Published By: Symantec Corporation     Published Date: Mar 21, 2014
Why self-signed certificates are much costlier—and riskier—than working with a trusted security vendor.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, it professionals, security
    
Symantec Corporation

HP Haven: See the big picture in Big Data

Published By: HP     Published Date: Jan 20, 2015
HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the capability to handle 100 percent of your enterprise data—structured, unstructured, and semi-structured—and securely derive actionable intelligence from that data in real-time.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

Public Key Infrastructure: A Trusted Security Solution for Connected Medical Devices

Published By: DigiCert     Published Date: Mar 16, 2017
Learn Why this Scalable Solution Works. Download now!
Tags : 
security, medical, medical devices, security solution
    
DigiCert

Social Engineering - Fraud is evolving — are you?

Published By: FICO     Published Date: Feb 06, 2018
Interpol reports social engineering as the “broad term that refers to the scams used by criminals to trick, deceive and manipulate their victims into giving out confidential information and funds.” Scammers use sophisticated psychological manipulation techniques to build a level of trust with their victim, having them divulge confidential information or authenticate the fraudulent activity as genuine. They will typically claim to be from the bank or well known and trusted consumer brands.
Tags : 
social, engineering, fraud, cyber, security, scams
    
FICO

Unlocking the Business Value of Blockchain Technology

Published By: Infosys     Published Date: Jun 14, 2019
The basic promise of blockchain is that it works as a global distributed ledger or database of things we value - everything from money, to creative work and votes - so these can then be managed and transacted in a trusted and secure manner. Yes, blockchain is a young technology, but well past its infancy. Today, the somewhat inflated expectations around the technology have been brought to a more realistic level and we are beginning to see practical applications across the enterprise. Although these are typically in the realm of reducing cost and/or time for transactions, improving product and system security, finding and preventing fraud and counterfeiting and increasing transparency, there are also instances of businesses relying on blockchain to create new revenue streams. Infosys recently commissioned an independent survey of senior executives worldwide. Download the report to read about their findings.
Tags : 
    
Infosys

Faster Mainframes for Speed Trading

Published By: Infosys     Published Date: Jun 12, 2018
While mainframes have dominated computing across industries for several decades, the need for speed and However, modernizing these systems is every enterprise’s nightmare, considering the complexities and high costs involved, besides the fear of business disruption. The need for a trusted partner has never been more. A leading global brokerage firm was looking to simplify and speed up the mainframe systems powering their trading platforms that supported billions of transactions each day. See how Infosys helped and the five key takeaways from the project.
Tags : 
mainframes, speed, trading, system, modernize
    
Infosys

Building Trust in a Cloud Sky

Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services
    
McAfee EMEA

Website Security For Dummies

Published By: Symantec     Published Date: Sep 29, 2015
From building the business case for Website Security and explaining the science of SSL, to top tips and best security practices, this easy-to-read Dummies Guide will demystify the world of Website Security. Download now for yourself or share with a colleague. Learn to: • Make the business case for website security • Explain how SSL forms the foundation of great website security • Choose and implement the right SSL certificates for your website • Follow best practice for maintaining a healthy and trusted website
Tags : 
    
Symantec

Provide Trusted Data to the Business and Modernize Analytics

Published By: AWS     Published Date: Oct 07, 2019
Hear from speakers: Danielle Greshock, Sr. Manager, Amazon Web Services, Inc. (AWS) Vincent Lam, Head of Cloud Product Marketing, Talend Andy McPhee, Data & Analytics Engineering Director, AstraZeneca
Tags : 
    
AWS

Online Advertising Data Compliance Matters - Forrester Report

Published By: TRUSTe     Published Date: Jan 19, 2012
Forrester believes that marketers should take charge of self-regulation implementation today to protext their brand reputation as well as data collection in the long run. Read to find out more.
Tags : 
truste, forrester, marketing, advertising, digital advertising, privacy, compliance
    
TRUSTe

Enabling Right-Time Insight For Performance Management

Published By: IBM     Published Date: Feb 02, 2009
Learn how IBM’s change data capture technology can be used in conjunction with IBM’s performance management solutions from Cognos to provide access to the trusted information that systems and employees need to make informed decisions at the speed of business.
Tags : 
ibm, information management software, performance management, business intelligence, ibm cognos, bi-ready data, departmental reporting with ibm cognos, in-memory data store
    
IBM

The empowered customer: Productivity enhancements in a digital era

Published By: Microsoft Dynamics CRM     Published Date: Mar 30, 2010
As global employment prospects lag behind a slow economic recovery, customers in many parts of the world are more cautious and better informed than ever. They have access to a wealth of information about the products and services they seek, much of it obtained from trusted sources almost immediately. Yet businesses have moved slowly to exploit emerging technologies and information sources like Twitter, Facebook and YouTube. As a result, customers often seem better informed about the products and services they buy than companies are about their customers. This imbalance presents a big challenge to companies struggling to avoid commoditisation and it could grow into a competitive disadvantage as customers demand more personalized service.
Tags : 
microsoft dynamic crm, productivity enhancement, customer service productivity, customer interaction service, customer relationship management, customer satisfaction, customer service, productivity
    
Microsoft Dynamics CRM

Protect the Integrity of the Procurement Function

Published By: SAS     Published Date: Oct 18, 2017
Procurement fraud affects nearly one-third of organizations, and it is often perpetrated by the most trusted, longtime employees, the ones you’d least suspect. Learn from three white-collar crime specialists about common flavors of procurement fraud, striking examples from recent headlines, four fundamental ways to get better at detecting and preventing fraud, and how to take procurement integrity to the next level.
Tags : 
    
SAS

Adobe Acrobat DC CLP Packs

Published By: CDW     Published Date: Jun 25, 2015
Receive additional savings of up to 17% on top of your current discount level, and get a trusted, hassle-free PDF solution for your organization. Overview of Adobe Acrobat CLP Program.
Tags : 
adobe, cdw, clp pack, content management, collaboration, content management system, cloud computing, data center design and management
    
CDW

Top Reasons Why VNX Unified Hybrid Flash

Published By: CDW     Published Date: Apr 04, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, data management, network management
    
CDW

Mobility Services: Do More By Doing Less

Published By: CDW     Published Date: Jun 14, 2016
Mobile devices and apps have transformed the way enterprises operate in recent years, improving productivity, communication and collaboration, and in many cases completely changing how work gets done. To help optimize mobility initiatives, many organizations turn to trusted IT partners that can help maintain mobile deployments and free up staff to focus on innovation.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity, mobile computing
    
CDW

Don't Let Trusted Vendors Become Cyber-Breach Enablers

Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications
    
BitSight Technologies

Instant-On Cloud Security for Microsoft Azure

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security
    
CDW-Trend Micro

ESG: EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together

Published By: Dell EMC     Published Date: May 29, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
cloud service, applications, workload, big data, software, hardware, portal, business intelligence
    
Dell EMC

ESG: EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together

Published By: Dell EMC     Published Date: Jul 27, 2015
EMC Enterprise Hybrid Cloud Solution Brings Private and Public Cloud Together - This Analyst Report addresses the challenge of managing and administering both on-premises private cloud and off-premises public cloud models together. The EMC Enterprise Hybrid Cloud solution simplifies deployment of a hybrid cloud operating model, enabling IT to become a broker of trusted cloud services sourced from on-prem private clouds and off-prem public clouds, enabling IT to support the ever-expanding set of workloads their business requires.
Tags : 
enterprise hybrid cloud, cloud solutions, it solutions, private cloud, hybrid cloud operating model, cloud services
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.