wi fi security

Results 426 - 450 of 790Sort Results By: Published Date | Title | Company Name

2018 Cyberthreat Defense Report Executive Summary

Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software

Dual Platform Strategies for the Modern Datacenter

Published By: Red Hat     Published Date: May 05, 2015
IT organizations are under intense pressure to improve service levels and contain expenses in today’s challenging economic climate. Forward-looking organizations are upgrading IT infrastructure and implementing virtualization and cloud computing solutions to improve business agility and drive down costs. Many enterprises are adopting a dual platform approach, retaining Microsoft Windows for office productivity and collaboration applications, and deploying Red Hat® Enterprise Linux® for infrastructure and datacenter modernization initiatives. By adopting standards-based Red Hat Enterprise Linux, businesses can enjoy high performance, reliability, and security, with a lower overall TCO.
Tags : 
red hat, platform strategies, modern datacenter, virtualization, cloud computing solutions, it management, knowledge management, data management, data center
    
Red Hat

The Consumer-Driven Digital Economy: Creating value in a digital world

Published By: SAP     Published Date: Mar 22, 2016
In the new digital economy, competition, consumer engagement, and operational effectiveness are fundamentally changing, and accelerating. New competitors are redefining the landscape at unprecedented rates. Building and keeping trust mean delivering exceptional brand experiences, every time, via agile processes that balance consumer needs with cost to serve. One size does not fit all. Engaging consumers and capitalizing on new opportunities depend on the capacity to identify, act on, and deliver high-value experiences and outcomes like joy, confidence, security, and control, all in the span of a moment, exactly where and when a consumer or business need arises. Miss the moment, miss the opportunity.
Tags : 
digital economy, value creation, sap, consumer engagement, business technology
    
SAP

Data Theft Prevention: The Key to Security, Growth & Innovation

Published By: Forcepoint     Published Date: Apr 19, 2016
In 2014, data breaches compromised over 700 million records with financial losses estimated to be at least $400 million – and security incidents grew up to 66 percent. But don’t allow fear to stifle growth. The “Data Theft Prevention” report focuses on how to stay secure while you innovate from a broader, in-scope, more intelligent in application perspective.
Tags : 
    
Forcepoint

Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and other breaches

Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices, security, business analytics, business technology
    
LogRhythm

Info-Tech Research Group 2015 SIEM Vendor Landscape Report

Published By: LogRhythm     Published Date: Aug 08, 2016
Security threats continue to be more sophisticated and advanced with each day, with the majority often going completely undetected. • Organizations are usually scrambling to keep up and implement new security controls to protect themselves, which adds a new layer of complexity. • With the rise of Advanced Persistent Threats (APTs) and insider attacks, it becomes extremely difficult for security staff to detect all the risks. • Many IT and IT Security staff are already stretched thin by keeping track of many different security technologies that already exist.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm

Gartner Market Guide for UEBA (2018)

Published By: LogRhythm     Published Date: Jun 19, 2018
Security and risk management leaders considering UEBA will find that the market has fragmented, with a few pure-play vendors and a wide set of traditional security products that embed core UEBA technologies and features to benefit from advanced analytics capabilities.
Tags : 
gartner, market, guide, ueba, vendors
    
LogRhythm

2018 Cybersecurity: Perceptions and Practices Benchmark Survey

Published By: LogRhythm     Published Date: Jun 19, 2018
As uncertainties—cybersecurity and otherwise—swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organizations in the United States, United Kingdom, and AsiaPacific regions.
Tags : 
cybersecurity, survey, security, leaders, data, industry
    
LogRhythm

Ed Tech, Learning Analytics, Digital Classrooms, Oh My!

Published By: Ciena     Published Date: Jun 12, 2017
Is your infrastructure, bandwidth, and scalability getting a top grade? How much bandwidth is enough and what are your options? We'll make sure you know.
Tags : 
network bandwidth, wan, bandwidth security, dark fiber optics, education network security, self-provisioned network, integrated access device, e-rate, setda, pinpoint, z-series, ciena 6500, ciena 5430, waveserver, wavelogic, sdn, sdh, sonet sdh, sdh network, synchronous digital hierarchy
    
Ciena

Considerations for Building a Healthcare Sector Private Optical Network.

    
Ciena

The 5 Next Big Things in Mobile Security (Japanese)

Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware

Better Decision to Grow, Protect and Optimize Your Business

Published By: FICO     Published Date: Feb 06, 2018
The FICO® Enterprise Security Score measures the likelihood that you will suffer a data breach in the coming 12 months. To deliver the FICO Enterprise Security Score, we access billions of external data points at internet scale and apply our analytics to give you an empirically derived score. You can measure the cybersecurity risk of your organization, or any organization you want to work with, to see the risk you are inheriting from your supply chain. We provide the information behind your cybersecurity score so you can see where you need to take action, and you can measure the effect of improvements on your overall cybersecurity posture.
Tags : 
grow, optimize, business, enterprise, security, data, breach
    
FICO

Fact Sheet: With Mother Infant Matching, Only 100% Is Good Enough

Published By: Zebra Technologies     Published Date: Jun 15, 2017
Infant mix-ups in hospitals are an issue that occur at a surprisingly high rate, but are preventable. With Zebra Technologies, hospitals now have the ability to seamlessly match mother / baby identification. Zebra has developed a series of mother/infant/birthing partner wristbands with matching security code features. These wristbands can be produced from identification coming from leading HCIS platforms. Other leading major HCIS vendors are actively incorporating this technology into their offerings.
Tags : 
infant, mother, hospitals, zebra, technology
    
Zebra Technologies

Security Considerations When Redesigning Your Data Center Network

Published By: Juniper Networks     Published Date: Jul 31, 2019
When considering data center security, you will need to decide which security functions need to be deployed and where you want to deploy them. These functions are expected to be implemented wherever a firewall is used. Read our eGuide to find out which security functions to deploy, and where to deploy them, including: • Next-generation firewalls • Intrusion prevention systems • Centralized security management
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks

Build Your Marketing Ecosystem and Drive Agility

Published By: Oracle     Published Date: Apr 05, 2018
Effective collaboration between marketing and IT continues to be crucially important. As we enter an era where our business agility will be defined by the flexibility of operation of our marketing tools, technology in marketing is a key focus. Read ‘The guide to building your marketing technology stack’ to learn more about how technology can enhance every area of marketing: • Rediscover the technology in marketing landscape • Explore the latest in marketing automation • See how content and social fit into your overall strategy Oracle is a global technology company who provide a range of services, including the Oracle, the ‘industry’s broadest and most integrated public cloud’ which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computing industry.
Tags : 
    
Oracle

5 ways Citrix Workspace puts user experience first

Published By: Citrix Systems     Published Date: Nov 13, 2018
Nowadays, employees expect intuitive tools that are not only easy to use but also enable them to work when, where, and how they need without constraint. Get this e-book to learn five ways Citrix Workspace prioritizes user experience and security by providing: -Easy access to all apps, desktops, and files -Reliable, high-quality 3-D graphics, videoconferencing and virtual apps from any location -File sharing across devices -Mobile productivity apps
Tags : 
    
Citrix Systems

Optimizing your network for the cloud-first world

Published By: Citrix Systems     Published Date: Nov 13, 2018
Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: -Increase IT efficiency -Reduce security risks -Free IT staff to focus on more strategic initiatives
Tags : 
    
Citrix Systems

The definitive Guide to Selecting the Right ADC for the Digital Transformation era

Published By: Citrix Systems     Published Date: Nov 13, 2018
Apps are constantly changing — and they quickly spread across your network. You need an ADC that can support hybrid cloud and application delivery in new ways with new technologies to create opportunities for innovation as your enterprise strives toward digital transformation. How do you create a strategy for your networking and app delivery strategy? This eBook identifies ADC key considerations for: -Hybrid Cloud -New generation application architecture -Emerging security threats -Infrastructure and app interdependence
Tags : 
    
Citrix Systems

Optimize your network for the cloud first world

Published By: Citrix Systems     Published Date: Feb 14, 2019
"Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: - Increase IT efficiency - Reduce security risks - Free IT staff to focus on more strategic initiatives"
Tags : 
    
Citrix Systems

Key considerations for delivering secure unparalleled remote access

Published By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems

Optimizing your network for the cloud first world

Published By: Citrix Systems     Published Date: Jun 04, 2019
Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: Increase IT efficiency Reduce security risks Free IT staff to focus on more strategic initiatives
Tags : 
    
Citrix Systems

Want Security in the Cloud? Look to Identity First

Published By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Okta’s mailing list at any time, by following this process. Additional details about Okta’s privacy practices are available in our Privacy policy.
Tags : 
    
Okta APAC

Increase Visibility to Boost Security

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd

Increase Visibility to Boost Security

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd

Gartner's "The Future of Network Security Is in the Cloud"

Published By: Menlo Security     Published Date: Nov 11, 2019
"Digital Transformation Is Changing How Enterprises Provide Secure Web Access to Users. According to Gartner, “Digital business and edge computing have inverted access requirements, with more users, devices, applications, services, and data located outside of an enterprise than inside.” A New Approach to Enterprise Security in the Cloud Is Needed. Gartner recommends, “Complexity, latency and the need to decrypt and inspect encrypted traffic once will increase demand for consolidation of networking and security-as-a-service capabilities into a cloud-delivered secure access service edge (SASE, pronounced “sassy”).” This new approach requires an Internet isolation solution that: - Provides 100 percent malware-free email and web browsing - Preserves the native email and web browsing experience - Gives users ubiquitous yet secure access wherever they work Menlo already offers the solution that delivers on Gartner’s vision of network security in the cloud. Find out more by downloading t
Tags : 
    
Menlo Security
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.