dp

Results 276 - 300 of 1040Sort Results By: Published Date | Title | Company Name

Rockin’ Benefits Enrollment

Published By: ADP     Published Date: May 02, 2018
Benefits open enrollment, like music festivals, is an annual event that spans cultures, ages, gender and family size. Getting ready for this event can be challenging. You spend months preparing for annual open enrollment, because you know that benefits are strategic and vital to your organization’s success. You work hard to line up the right mix of core benefits offerings that reflect the needs of your employees.
Tags : 
    
ADP

Simplify the Human Capital Management Code

Published By: ADP     Published Date: May 02, 2018
How do you create competitive advantage and protect it to build a successful organization for the future? Smart organizations are rethinking their strategies: how to elevate the strengths and productivity of their people and identify the right approach to protect their people and data.
Tags : 
talent acquisition, talent activation, security, data protection
    
ADP

Cyber Exposure for Dummies

Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Identity Services Buyers' Guide

Published By: Centrify Corporation     Published Date: Apr 13, 2018
A Zero Trust approach to security requires a combination of Identity Services to deliver identity assurance, trusted endpoints, conditional policy and least privilege. This guide identifies the specific capabilities you need within four key areas of identity and helps you compare capabilities across major vendors with respect to Application Services, Endpoint Services, Infrastructure Services and Analytics Services.
Tags : 
    
Centrify Corporation

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

IBM’s Journey to GDPR Readiness

Published By: IBM     Published Date: Apr 13, 2018
Client-ready, globally applicable, a document setting out the IBM journey to GDPR Readiness
Tags : 
gdpr, data, cloud, governance
    
IBM

GDPR signals big data protection changes worldwide

Published By: IBM     Published Date: Apr 13, 2018
IBM Security can help your organization secure and protect personal data with a holistic GDPR-focused framework.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

GDPR: It’s coming—and sooner than you think. Are you prepared?

Published By: IBM     Published Date: Apr 13, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

The State Of GDPR Readiness

Published By: IBM     Published Date: Apr 13, 2018
This outlines the current state of compliance,trends by industry and geography, and key Forrester recommendations for moving efforts forward
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

Overcome the challenges of protecting data that is here, there and everywhere

Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

Database Security: KuppingerCole Leadership Compass

Published By: IBM     Published Date: Apr 13, 2018
Database security protects databases against compromises of their integrity, confidentiality and availability.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

Taking the pain out of regulatory compliance

Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium can help take the pain out of regulatory compliance so that compliance can be a valuable tool and not a hassle.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

The Ultimate Guide to Unified Endpoint Management

Published By: MobileIron     Published Date: Apr 11, 2018
Consumer technology trends are clearly driving the evolution of modern work. As consumers (i.e. employees) become more mobile, they want their work lives to be just as flexible and responsive to their needs. They want to be able to use their own device — instead of a company-issued device — for all their personal and business-related responsibilities. As a result, consumer choice is now the driving force behind mobile enterprise decisions, and demand for the traditional locked-down enterprise device is rapidly decreasing.
Tags : 
guide, unified, endpoint, management, consumers, business, device, enterprise
    
MobileIron

Eight Components Of A Successful BYOD Strategy

Published By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data, mobile, device
    
MobileIron

UEM Deployment Best Practices

Published By: MobileIron     Published Date: Apr 11, 2018
Although embarking on a modern work initiative can seem like exploring unchartered territory, the right unified endpoint management (UEM) solution can help you quickly move forward on your journey to becoming a modern, mobile enterprise. Deploying a UEM solution is best achieved by following the four steps outlined here.
Tags : 
uem, deployment, practices, mobile, enterprise, solutions, management
    
MobileIron

Protect Your Data eBook

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA

Proteggi i tuoi dati come le banche proteggono il tuo denaro

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuovo modello di sicurezza che vale la pena di studiare, e di imitare. La sicurezza enterprise si basa, tradizionalmente, su una strategia che blocca gli endpoint degli utenti e posiziona la rete all'interno di una sorta di perimetro fortificato. Oggi, questa strategia non è in grado di supportare né proteggere l'uso di device mobile e le funzionalità SaaS, che esistono al di fuori di quel perimetro. Di conseguenza, i Chief Information Security Officer (CISO) sono alla ricerca di soluzioni nuove, in grado di tutelare queste tecnologie e di adattarsi al modificarsi di minacce ed esigenze di business.
Tags : 
    
CA Technologies EMEA

Schützen Sie Ihre Daten so, wie Banken Ihr Geld schützen

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen ähnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich außerhalb der Festung befinden, nicht mehr unterstützen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lösungen umgesehen, die diese Technologien heute sichern können und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verändern.
Tags : 
    
CA Technologies EMEA

The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data from Mobility

Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout

Who Turned Out The Lights?: How Unintegrated HCM Systems are Becoming your Business’ Blind Spot

Published By: ADP     Published Date: Mar 22, 2018
Your global organization’s network of human capital management (HCM) platforms is the nerve center of your entire enterprise. But passing data back and forth between disparate HCM systems has never exactly been easy. So your HR, payroll, talent, benefits and time and attendance systems, often specific to regions and countries, fire futilely across data synapses that in real-world terms leave you blind to the true state of your business.
Tags : 
    
ADP

GDPR signals big data protection changes worldwide

Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
IBM Security can help your organization secure and protect personal data with a holistic GDPR-focused framework.
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.