shadow it

Results 1 - 25 of 54Sort Results By: Published Date | Title | Company Name

Value Network: The next step in the evolution of enterprises

Published By: Dassault Systèmes     Published Date: Nov 11, 2019
"The term Value Network describes enterprises that truly connect into a network of partners that collaborate and communicate with lightning speed and agility. The supply chain is now overshadowed by interconnected Value Networks. One example for Value networks applications is the digital twin, where the physical environment is replicated in a virtual model to harmonize new product design, process design and manufacturing design with planning, logistics, service and execution. When the virtual world and real world truly work together, we are able to speed up decision-making, reduce risk and cost, deliver great customer experiences, and minimize waste to make businesses more sustainable. Dassault Systèmes DELMIA,powered by the 3DEXPERIENCE platform, delivers the solutions to industries and service providers to transform their operations and orchestrate their entire Value Network."
Tags : 
    
Dassault Systèmes

DigitalOcean continues its rise as an ‘alternative’ cloud for developers and SMBs

Published By: DigitalOcean, LLC     Published Date: Nov 04, 2019
Over the last several years, DigitalOcean has built out its feature set in a way that has taken it from a provider of cheap and simple virtual machines (VMs) to a legitimate public cloud alternative, most recently adding support for Redis and MySQL to its managed database services. As its services evolve, it continues to experience healthy growth and maintain popularity among the independent developer audience. Over the past two years, DigitalOcean has accelerated the velocity of its feature development, looking to better meet the needs of a business audience. By emphasizing a simplified feature set, pricing structure and user experience, even as it expands its competitive footprint in the shadow of public cloud vendors such as Amazon Web Service (AWS), Microsoft Azure and Google Cloud Platform (GCP), Digital Ocean continues to help define what it means to be an alternative public cloud in a market dominated and largely defined by hyperscalers.
Tags : 
    
DigitalOcean, LLC

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

How CIOs Can Empower the Digital Workplace

Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh

How CIOs Can Empower the Digital Workplace

Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh

How CIOs Can Empower the Digital Workplace

Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh

How CIOs Can Empower the Digital Workplace

Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh

How CIOs Can Empower the Digital Workplace

Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh

How CIOs Can Empower the Digital Workplace

Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh

How CIOs Can Empower the Digital Workplace

Published By: Ricoh     Published Date: Sep 17, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success. • Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh

How CIOs Can Empower the Digital Workplace

Published By: Ricoh     Published Date: Sep 16, 2019
Discover how other Canadian IT leaders are changing the way their organizations connect, communicate, and collaborate while reducing their risks and boosting their chances of success.• Stay ahead of your competitors • Reduce operating costs and drive revenue • Get your team on board with digital transformation • Reduce the need for shadow IT GET THE GUIDE NOW
Tags : 
    
Ricoh

3 Steps to Managing Shadow IT

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Gain visibility of cloud services in use and block risky apps to improve security with three easy steps.
Tags : 
    
Cisco Umbrella EMEA

Miners in the Shadows: Extracting Treasure with Stolen Resources

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA

The Truth About Shadow IT

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Employees in every industry are expected to work quickly, but they’re often frustrated by company-issued apps. As a result, they’re downloading personal apps to get the job done instead of using secure, enterprise-approved tools. It’s called shadow IT, and it’s gaining traction fast.
Tags : 
    
Cisco Umbrella EMEA

Stepping Up as a Transformational CIO

Published By: Workday     Published Date: Jul 30, 2019
Does digital disruption foreshadow the end for the CIO? With the role of chief digital officer gaining momentum, today’s CIOs are being forced to consider their place in the enterprise. Read this paper to see how CIOs are redefining their value, focusing on innovation, transformation, and enterprise leadership.
Tags : 
    
Workday

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

ESG Lab Validation: Forcepoint CASB

Published By: Forcepoint     Published Date: Jun 06, 2019
Office 365, Salesforce, and other cloud apps deliver a boost in employee productivity, but this benefit comes at a price. Once data moves outside an enterprise, security teams lose visibility and control into how it’s accessed and used. There is also the risk of unsanctioned apps or Shadow IT – the cloud apps setup and managed outside of IT that they have no visibility of; all this leaves an organization having to manage up to 1,000 cloud apps*.  Deploying a CASB solution can help you discover and assess risk from unsanctioned cloud apps and control sanctioned cloud app use. Through a hands-on evaluation, ESG discovered that Forcepoint CASB: Reduces threat response times Grants visibility and context into user activity Controls user access to cloud apps from different locations/devices Read the ESG evaluation for rare insight into Forcepoint CASB by a respected third-party analyst.
Tags : 
    
Forcepoint

3 Steps to Managing Shadow IT

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Gain visibility of cloud services in use and block risky apps to improve security with three easy steps.
Tags : 
    
Cisco Umbrella EMEA

Exposing Shadow IT in the Enterprise

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Uncover and block unsanctioned apps across your enterprise with App Discovery and blocking by Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA

Unlock the potential of your workforce with employee-centric IT

Published By: Citrix Systems     Published Date: Feb 14, 2019
"Read this white paper to learn how a secure digital workspace can help you put people at the center of IT. Create a happier, more engaged workforce - Deliver the tools that fuel productivity - Remove the temptation for shadow IT - Boost security and simplify management"
Tags : 
    
Citrix Systems

Ransomware Prevention Is Possible: Fighting Today’s Extortive Threats

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance

IAM without Compromise

Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin

5 Unique Cloud Capabilities

Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s workforce is more mobile than ever before, routinely working whenever and wherever necessary, using a variety of mobile devices and productivity apps. They expect their tools to deliver the capabilities they need to stay productive and efficient. But what if they don’t? When a business doesn’t support its workforce with suitable, properly vetted apps, employees will often download and install the tools they like. This trend, called “Shadow IT,” is almost always a recipe for trouble. One-off, standalone apps don’t conform to business strategy and growth plans, but instead create difficulties — security, compatibility, compliance and technical support — that draw resources away from strategic work.
Tags : 
    
Microsoft Office 365

Symantec Data Loss Prevention—Now with CASB

Published By: Symantec     Published Date: Jul 31, 2017
Uncover shadow data lurking in the cloud with the industry’s first integrated cloud security solution that combines the best-in-class data loss prevention (DLP) and cloud access security broker (CASB) technologies from Symantec.
Tags : 
cloud, cloud security, dlp, casb
    
Symantec

Ensuring safe cloud app adoption with Symantec CloudSOC™

Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.