pos security

Results 1 - 25 of 396Sort Results By: Published Date | Title | Company Name

Magic Quadrant for Digital Commerce

Published By: Adobe     Published Date: Oct 08, 2019
Gartner evaluates eighteen digital commerce platforms and for the second year in a row, Gartner has identified Magento Commerce as an Industry Leader (top 3). According to Gartner, Leaders execute well against their current vision and are well-positioned for tomorrow. Magento Commerce, part of Adobe Experience Cloud, is innovating on platform functionality to help businesses like yours with the performance, scalability, and security required to deliver full-lifecycle customer experiences. Digital commerce platform choice has grown in complexity due to increased vendor choice and breadth of offerings, pricing model complexity and emerging managed service offerings. This report evaluates 18 vendors of digital commerce platforms to assist application leaders supporting digital commerce.
Tags : 
    
Adobe

Video Beyond the Conference Room: Innovative Solutions for Public Safety, Crisis Management and Nat

Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management, application integration
    
Polycom

"IDC Technology Spotlight: Leveraging the Cloud to Achieve Comprehensive Asset Visibility, Tracking,

Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : 
firewall, palo alto, security, network security, safe applications, cyber threats, application security, firewalls
    
Palo Alto Networks

12 Recommendations for Industrial Cybersecurity

Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability
    
Schneider Electric

2015 Gartner Magic Quadrant for Intrusion Prevention Systems (IPS)

Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems, ips, gartner, networking
    
IBM

2016 Gartner Magic Quadrant for SIEM

Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant, siem, networking, knowledge management
    
IBM

2017 Gartner Magic Quadrant for Application Security Testing

Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM retained its position as a "Leader" in the 2017 Gartner Magic Quadrant for Application Security Testing. Read our complimentary version of the Gartner report to learn: Critical trends in the Application Security Testing market. Why IBM maintained a Leadership position in a report that spanned 18 Application Security vendors. Detailed criteria that determine how all of the vendors are positioned in the Magic Quadrant.
Tags : 
ibm, application security, gartner, application security testing
    
Group M_IBM Q1'18

2018 Cloud Security Report

Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9

2018 Outlook: Customer Experience and Security Strike a Balance

Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone Ė from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiservís Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: ēGlobal payment initiatives ēOpen Banking standards ēArtificial intelligence and machine learning ēConsumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv

2019 Cyberthreat Defense Report - Executive Summary

Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Groupís sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organizationís overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Securityís mos
Tags : 
    
Gigamon

5 Best Practices for Application Security: A How-To Guide

Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organizationís application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable

5 New Laws of Anti-Malware

Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants werenít enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isnít whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks
    
Cisco

5 Simple Solutions for Developing a Collaborative Endpoint Security

Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs
    
KACE

5 Steps to Improve Your Cyber Security Incident Response Plan

Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
Itís practically impossible to be completely prepared for a security incident Ė invariably something happens that best laid plans donít address. But that doesnít mean organizations shouldnít try.
Tags : 
resilient systems, cyber security, incident response, plan, guide, security, data management, business technology
    
Resilient Systems, Inc.

6 Benefits of Upgrading to Windows 10

Published By: Dell     Published Date: Feb 04, 2016
Not only do outdated systems pose security risks, they also prevent the organization from accessing the benefits of a modern operating system. Download this whitepaper to learn six of the most noteworthy.
Tags : 
    
Dell

6 Steps to Overcoming PCI DSS Compliance Challenges in Mult-Cloud and Hybrid Environments

Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic

7 Critical Considerations for Choosing a Cloud Security Provider

Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors donít want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies

7 Critical Considerations for Choosing a Cloud Security Provider

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors donít want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies

7 Critical Considerations for Choosing a Cloud Security Provider

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors donít want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies

7 Critical Considerations for Choosing a Cloud Security Provider

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors donít want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies

7 Critical Considerations for Choosing a Cloud Security Provider

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors donít want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies

8 Tools to Help Grow Your Retail Business

Published By: Epicor     Published Date: Jul 27, 2018
Selecting the right software is an investment of time and money that can pay off with increased customer loyalty, more productive employees, and simpler business management. The Epicorģ Eagle N Seriesģ business management solution enables retailers to grow and thrive with powerful analysis tools that tell you ow your business is doing and why. Here is a sneak peek into 8 powerful analysis tools to consider that will help your retail business grow and thrive: 1. Store vs. Store 2. Your Top 100 Items 3. The Market Basket 4. Big Investment, Big Opportunity 5. Excess Limits Success 6. Beware the Hidden Dangers 7. A lot Can Happen in a Year 8. When Costs Change But Pricing Doesnít View this infographic to get more insight into these 8 powerful analysis tools that will help grow your retail business.
Tags : 
ecommerce, retail pos, point of sale, epicor eagle, data security, retail inventory
    
Epicor

9 Considerations For Securing Securing Web Apps In the Cloud

Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities ó and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service providerís security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS

9 Considerations for Securing Web Apps in the Cloud

Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities ó and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.