enterprise business security

Results 101 - 125 of 127Sort Results By: Published Date | Title | Company Name

Snow Secures Man-Sized Cost Savings For FTSE 250 Investment Specialist

Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, man investments, asset, softcat, it management
    
CDW

Spectrum Federal Credit Union Implements NeoScale Encryption Solution

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.

Technology Insights: The Total Software Management Guide

Published By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, it management, distributed computing, collaboration, business technology
    
CDW

The Five Myths of Payment Security

Published By: CyberSource     Published Date: Apr 25, 2018
Did you know that hackers aren’t just interested in large enterprise businesses? Or that you can operate your business without raw payment data? Learn the truth about the five most common payment security myths today in this informative e-book.
Tags : 
    
CyberSource

The Red Hat Enterprise linux Subscription Advantage

Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat is a trusted partner to enterprise customers; cloud, software, and hardware suppliers; and the global open source community. A Red Hat® Enterprise Linux® subscription provides customers with direct access to innovation and advocacy—within the open source community and within a certified and trusted network of partners. Red Hat Enterprise Linux provides you with an innovative platform that serves as the foundation for your business. It is hardened, certified, and supported by the Red Hat Product Security team, support teams, and certified engineers. Red Hat supports your timelines and advocates for your requirements so you can focus on the work of your business rather than being your own operating system vendor. We use our leadership in the open source community to do the work that brings you the best of open source. Get direct access to: Technology-driven solutions Emerging technology Experience and support Continuous security Timeline support Download the whitepaper to lea
Tags : 
    
Red Hat

The Secrets to Data Protection on Mobile Devices Revealed

Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.

The Secure Data Center: An Integrative Approach to Achieving Holistic Security

Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing, it management, business intelligence, business technology, infrastructure management
    
Digital Realty

Three Important Reasons for Privileged Access Management (and One Surprising Benefit)

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability, it management
    
Centrify Corporation

TIBCO Spotfire® Data Science

Published By: TIBCO Software     Published Date: Aug 15, 2018
TIBCO Spotfire® Data Science is an enterprise big data analytics platform that can help your organization become a digital leader. The collaborative user-interface allows data scientists, data engineers, and business users to work together on data science projects. These cross-functional teams can build machine learning workflows in an intuitive web interface with a minimum of code, while still leveraging the power of big data platforms. Spotfire Data Science provides a complete array of tools (from visual workflows to Python notebooks) for the data scientist to work with data of any magnitude, and it connects natively to most sources of data, including Apache™ Hadoop®, Spark®, Hive®, and relational databases. While providing security and governance, the advanced analytic platform allows the analytics team to share and deploy predictive analytics and machine learning insights with the rest of the organization, white providing security and governance, driving action for the business.
Tags : 
    
TIBCO Software

Top 6 Security Use Cases for Automated Asset Inventory

Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, it’s critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices, networking, security, it management, knowledge management, enterprise applications
    
Qualys

Total Economic Impact™ Of Trend Micro Enterprise Security

Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Tags : 
trend micro, enterprise security, forrester, roi, total economic impactt, web security, vendor management savings, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, internet content security, smart protection network
    
Trend Micro Inc.

Unified Hybrid Cloud Will Be Key to Successful Digital Transformation

Published By: Pure Storage     Published Date: Sep 13, 2019
"Your key to a successful hybrid cloud design Description Enterprise adoption of cloud has become mainstream, with most businesses choosing a hybrid cloud approach. A unified hybrid cloud stitches together on- and off-premises cloud resources so you can benefit from agility and scalability of public cloud while getting the performance, cost and security benefits of private cloud. This paper covers: Why businesses choose a unified hybrid cloud architecture. How you can gain the full benefit of a hybrid infrastructure. How app modernization on/off premises can position you for success. Why the data layer is critical to bridging the cloud divide. Download this 451 Research paper to learn about things to keep in mind when designing a successful cloud strategy.
Tags : 
    
Pure Storage

Unlocking the Benefits of Ethernet: An Expert Q&A Guide

Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Unlock the benefits of Ethernet – An Expert Q&A Guide provided by Spectrum Enterprise. Find out how technology experts are using reliable Ethernet solutions to boost business performance. Get actionable insights from experts and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise

Using User Identity Data to Improve Mobile Security

Published By: Okta     Published Date: Nov 09, 2015
Today, 61% of North American and European enterprise information workers are choosing their smartphones for work either on their own or from a company-approved list. According to Forrester’s Business Technographics® Global Devices And Security Workforce Survey, 2014, 53% of employees are unwilling to make any kind of sacrifice to their user experience in the interest of heightened security. Read this report to learn more about the results.
Tags : 
okta, user identity data, mobile security, forrester's business technographics, security, data management
    
Okta

UT Health Science Center at Houston Safeguards Personal Health Information with NeoScale

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.

VMware Workspace ONE and Microsoft Office 365: Enabling more Secure Collaboration

Published By: VMware     Published Date: May 10, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. Download this whitepaper to discover how VMware Workspace ONE™ brings together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware

VMware Workspace™ ONE™ and Microsoft Office 365: Enabling More Secure Collaboration

Published By: VMware AirWatch     Published Date: Mar 02, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. This is where VMware Workspace™ ONE™ comes in — we’ve brought together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware AirWatch

Webinar: Introduction to Red Hat Enterprise Virtualization for Desktops

Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security, infrastructure, enterprise software, server virtualization, windows, desktop management
    
Red Hat

Webinar: Red Hat Enterprise Linux: Your Operating System for the Cloud

Published By: Red Hat     Published Date: Jan 21, 2011
Douglas O'Flaherty - Senior Manager, Product Marketing, Red Hat Red Hat Enterprise Linux is the proven leading enterprise open source operating system. Now, with cloud computing progressing into the enterprise and public clouds emerging as a viable alternative, Red Hat Enterprise Linux is well positioned to be leveraged as the cloud guest operating system of choice. In this session, Douglas O'Flaherty will cover the technical and business elements of Red Hat Enterprise Linux that are relevant when used in cloud computing infrastructures, emphasizing the unique challenge of public cloud deployments. Session topics will include: * Cloud-relevant technologies included within Red Hat Enterprise Linux * Release models for Red Hat Enterprise Linux on public clouds * ISV certifications * Security * Deployment flexibility & planning
Tags : 
red hat virtual tradeshow, live event, enterprise linux, operating system, cloud computing, isv certification, security, deployment flexibility, security management, enterprise software, linux, linux certification
    
Red Hat

What Windows 10 Means for the Modern Enterprise

Published By: MobileIron     Published Date: Jul 31, 2015
To better understand what Windows 10 means for the modern enterprise, this white paper provides a technical overview of these and other new features in the latest OS release. It also includes a brief overview of how the enterprise architecture has evolved and how Windows 10 enables IT leaders to use this fundamental architecture shift as a catalyst for business transformation.
Tags : 
modern enterprise, enterprise architecture, business transformation, windows 10, security
    
MobileIron

Why choose NetScaler over F5

Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems

Why Communication Fails: Five Reasons the Business Doesn't Get Security's Message

Published By: IBM Corporation     Published Date: Jun 01, 2011
Gartner has identified five key failures in crucial interactions between security and risk professionals and their client.
Tags : 
ibm, gartner, communication, security message, enterprise risk management, jeffrey wheatman, chief information security officer, ciso, business leaders, security program, business continuity
    
IBM Corporation

Why Customers Choose Box Over Dropbox for Business

Published By: Box     Published Date: Nov 24, 2015
The adoption of enterprise content collaboration solutions has exploded as individuals sought ways to easily access, manage, and collaborate on content. Accordingly, businesses want to leverage those easy-to-use solutions but can’t compromise when it comes to enterprise-grade administrative control, security, and business insights.
Tags : 
box, dropbox, business, productivity, collaboration, content, enterprise, knowledge management, enterprise applications, data management, business technology
    
Box

Why Legacy Security Architectures Are Inadequate in a Multi-cloud World

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.