securing

Results 101 - 125 of 476Sort Results By: Published Date | Title | Company Name

DTM: Assurance You Won’t Get Left in the Digital Dust

Published By: DocuSign     Published Date: Aug 09, 2016
This white paper highlights securing business-critical transactions with digital transaction management.
Tags : 
docusign, digital, digital transaction management, papeless, paper cost
    
DocuSign

E-commerce 101: A Guide to Successful Selling on the Web

Published By: Thawte     Published Date: Oct 25, 2011
This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.
Tags : 
ssl, online business, ecommerce site, ecommerce business, ssl certificate, ssl certificates, ssl security, geotrust
    
Thawte

E-commerce 101: A Guide to Successful Selling on the Web

Published By: GeoTrust     Published Date: Oct 06, 2014
For many business owners, launching an online shopping site makes perfect sense. However, there are some important things you should know before diving into the e-commerce marketplace. The online economy is ripe with opportunity, but it's also rife with pitfalls that can trip up even the savviest business person. This guide reviews the basics of setting up, securing, and promoting your e-commerce site. With a little knowledge, you'll be well on your way to success in the online economy.
Tags : 
e-commerce, online shopping, marketplace, setup, security, promotion, online economy, ssl
    
GeoTrust

Ebook: Secure your entire mobile workforce. Say 'yes' to BYOD.

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, data management, business technology
    
Good Technology Corporation

Educating Decision Makers About the Need for Encryption

Published By: DataMotion     Published Date: Jan 06, 2011
Get a better understanding of the value to your organization of securing email with encryption. Read Educating Decision Makers About the Need for Encryption, a whitepaper by Osterman Research
Tags : 
secure email, encryption, private email, compliance, email security, pci compliance
    
DataMotion

Effectively Securing Small Businesses from Online Threats

Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms
    
MessageLabs

Eight Things to Know About a Secure Web Gateway

Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec

Eliminating Your SSL Blind Spot: The Solution to Managing and Securing HTTPS Traffic

Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security
    
Secure Computing

Email archiving and storage management solution for compliance, retention and electronic discovery

Published By: DocuLex     Published Date: Jan 01, 2001
Simply the most cost efficient option for securing your organizations email awaiting data discovery and fulfilling regulatory compliance.
Tags : 
storage management, compliance, retention management, electronic discovery, regulatory compliance, retention, backup and recovery, ip storage
    
DocuLex

Empowering and Securing Digital Workspaces in Financial Services

Published By: VMware AirWatch     Published Date: Sep 21, 2016
Digital transformation (DX) is the driving force behind new worldwide initiatives in financial services. However, a recent IDC survey discovered that fewer than 5% of institutions have started or completed a digital transformation strategy. Historically, financial institutions focused on the use of mobility to directly drive improved customer experiences to their customers' devices. However, as consumer sophistication with mobility increases — particularly among younger generations —so too does the need to enable mobility for the enterprise worker. This Market Spotlight explores these issues in the larger DX context.
Tags : 
    
VMware AirWatch

Ensuring secure and compliant cloud app use with Symantec

Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec

Enterprise Authentication: Securing Identities in an Evolving Environment

Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard

Enterprise Authentication: Securing Identities in an evolving environment

Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices, security
    
Entrust Datacard

Enterprise Mobile Security 101: Understanding the Basics

Published By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
enterprise, mobile security, basics, ebook, lookout, emm, mdm
    
Lookout

Entrust Datacard 2016 SSL/TLS Certificates

Published By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
    
Entrust Datacard

Entrust IdentityGuard Cloud Services Device Certificates

Published By: Entrust Datacard     Published Date: May 15, 2014
Securing Mobile Identities & Devices
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard

Entrust IdentityGuard Cloud Services Device Certificates Securing Mobile Identities & Devices

Published By: Entrust Datacard     Published Date: Jul 21, 2014
The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency.
Tags : 
identity guard, cloud services, secure, mobile devices, business efficiency, corporate networks, secure email, security
    
Entrust Datacard

Entrust IdentityGuard Cloud Services PKI Securing Mobile Identities & Devices

Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s cloud-based PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard

Entrust IdentityGuard Cloud Services PKI Securing Mobile Identities & Devices

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI).
Tags : 
identity guard, cloud services, pki, secure, mobile identities, devices, security
    
Entrust Datacard

Entrust IdentityGuard for Enterprise: Securing IDs for Enterprise Users, Devices & Applications

Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
identity guard, enterprise, securing identities, corporate network, mobile platforms, security
    
Entrust Datacard

European Businesses: You have a BYOD programme whether you like it or not

Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout

Executive ViewPoint - Successfully Securing Applications in a Mobility-Focused World

Published By: F5 Networks Inc     Published Date: Feb 18, 2015
In this article, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve when it comes to securing apps in a mobility-focused world.
Tags : 
application security, mobility-focused world, application solutions, it management, knowledge management, enterprise applications, business intelligence
    
F5 Networks Inc

Extend your access management regime to Office 365

Published By: IBM     Published Date: Sep 30, 2016
See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise’s data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more
Tags : 
ibm, security, office 365, access management deployment, access management, enterprise data, cloud, security measures
    
IBM

Face the Future

Published By: Juniper Networks     Published Date: May 17, 2017
Securing the road map to your future-ready netowork. Download now to learn more!
Tags : 
    
Juniper Networks

Face the Future: Securing the Roadmap to your future-ready network

Published By: Juniper Networks     Published Date: Aug 21, 2017
IHRE ROADMAP FÜR EIN ZUKUNFTSSICHERES NETZWERK
Tags : 
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.