business security

Results 301 - 325 of 1023Sort Results By: Published Date | Title | Company Name
Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: May 14, 2019
If anything is certain about the future, it’s that there will be more complexity, more data to manage and greater pressure to deliver instantly. The hardware you buy should meet today’s expectations and prepare you for whatever comes next. Power Systems are built for the most demanding, data-intensive, computing on earth. Our cloudready servers help you unleash insight from your data pipeline — from managing mission-critical data, to managing your operational data stores and data lakes, to delivering the best server for cognitive computing. With industry leading reliability and security, our infrastructure is designed to crush the most data-intensive workloads imaginable, while keeping your business protected. - Simplified Multicloud - Built-in end-to-end security - Proven Reliability - Industry-leading value and performance
Tags : 
    
IBM APAC
Published By: Juniper Networks     Published Date: Oct 02, 2018
Exploring four commonalities that drive organziations toward hybrid IT can help you make a business case for expanding and automating your data center. • Cloud’s role in providing your high-performance computing requirements • Evolving asset refresh cycle and expansion needs in the face of security threats • Strategic innovation investments to gain competitive market advantage
Tags : 
    
Juniper Networks
Published By: Cisco     Published Date: Sep 27, 2018
Blockchain, called the “tech breakthrough megatrend” by PWC¹, is rapidly gaining broad acceptance. According to IDC, global spending on this innovative technology is expected to reach $2.1 billion in 2018.² Across the globe, industries are investigating ways to use blockchain to increase trust across their business value chains and address primary challenges around complexity, transparency, and security.
Tags : 
    
Cisco
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : 
cloud, aws, security, organizations, visibility, control, networks, platforms
    
Amazon Web Services
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Cloud Direct     Published Date: Jan 17, 2018
Senior leaders realise the stakes of not addressing digital transformation. PWC suggests that CEOs who aren’t prioritising digital are either changing their minds or being phased out. If you compare PWC’s 2007 Digital IQ report to 2016’s, you’ll see that the number of executives who said their CEO was a champion for digital has more than doubled from 33% to 68%. Digital transformation doesn’t have to be intimidating or complicated. If you take it in stages and work with an experienced partner, it can be a straightforward journey. At this stage, it’s all about transforming how people work.
Tags : 
cloud, business, communication, mobile, collaborating, security
    
Cloud Direct
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: Oracle     Published Date: Mar 01, 2019
The transition to autonomous is all around. Its capability for problem-solving has never been seen before. Its potential for creating business value from algorithms and data makes it the next big frontier for business leaders. Two industry experts have discussed Oracle Autonomous Data Warehouse Cloud and what it can help organisations achieve. Talking about innovation,security and efficiency, they put the case for an autonomous future. Watch the webinar.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Dec 30, 2018
Marketers know innovation is business power and many report that cloud security delivers more than any other innovation technologies. But when it comes to inspiration, IoT comes top, with AI and blockchain not far behind. Read our paper to discover the data behind the innovation technology hype
Tags : 
    
Oracle
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection, internet security, intrusion detection, intrusion prevention, security management, web service security, vulnerability management
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, web service security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, email security, internet security, intrusion detection, intrusion prevention, web service security
    
Symantec
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users, primary motivator, secondary motivator, implementing iam, security goals, regional perceptions, it management, cloud resource, enforcement, iam adoption, deploy iam, access control, application security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : 
mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information, steal information, secure data, secure passwords, security breaches, broken privacy, reputational damage, cyber-security, business closures, business security, insider rights, threat environment, security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.