https

Results 1 - 23 of 23Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Sep 14, 2018
"Looking for an agile and scalable ERP system but don’t know where to start? IDC MarketScape is a comprehensive guide specifically for midsize companies. Read an excerpt from the report to learn the capabilities your midsize company should expect from cloud-enabled ERP applications. https://www.workday.com/en-us/forms/reports/idc-me-landscape.dl.html "
Tags : 
    
Workday
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: DigiCert     Published Date: Aug 01, 2018
As a leading provider of SSL certificates, DigiCert is here to help you discover the benefits of using HTTPS across your entire site, and to help you successfully implement it. HTTPS Everywhere is a best practice security measure for websites that ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS—the secure web protocol enabled by SSL/TLS—across your entire website instead of selectively. Implementing HTTPS Everywhere on your website secures the user and your organization’s data on every page— from start to finish.
Tags : 
    
DigiCert
Published By: IBM     Published Date: Jun 25, 2018
Complex and strictly regulated supply chains require trust between involved parties to function properly and maximize efficiency. Addressing a wide range of challenges, IBM Blockchain efficiently streamlines the supply chain by digitizing the process to provide a secure, trustworthy and shared record of ownership. Making relevant information available to parties involved, the blockchain addresses transparency issues and open standards. It can also simultaneously track the supply chain status for risks and triggers remediation actions before a crisis emerges. Learn more about how IBM Blockchain can transform your supply chain to get more business value out of your processes and data. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market. https://www-07.ibm.com/ibm/au/businesspartners/embed/
Tags : 
    
IBM
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. To learn more about Zebra's MP7000, go to: https://goo.gl/693u8o.
Tags : 
webinar, video, multi, plane, scanner, zebra, technologies, mp7000, next generation
    
Zebra ABM
Published By: Zebra ABM     Published Date: Dec 14, 2017
The MP7000 is loaded with features that take scanning performance and simplicity to the next level for faster checkout lanes, increased cashier productivity and POS throughput — and a better shopping experience. To learn more about the MP7000, go to: https://goo.gl/693u8o.
Tags : 
zebra technologies, mp7000, multi, plane, scanner, webinar
    
Zebra ABM
Published By: Amazon Web Services     Published Date: Aug 01, 2018
Learn more about the AWS Partner Webinar Series at - https://amzn.to/2ILG0R7. Join our webinar to hear how Lyft and other data-driven organizations benefit from uncovering hidden insights in real time with AI solutions from Amazon Web Services (AWS) and Anodot. Learn how to prevent events that can impact your revenue and brand integrity with a solution that detects anomalies quickly, allowing you to address issues in a timely manner to help ensure a consistently high-quality experience for your customers.
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Aug 06, 2018
Learn more about AWS Partner Webinars at - https://amzn.to/2I6ogPM. In this webinar, you will learn about VMware Cloud on AWS, an integrated hybrid cloud offering jointly developed by AWS and VMware delivering a highly scalable, secure and innovative service that enables organizations to seamlessly migrate and extend their on-premises VMware vSphere-based environments to AWS running on next-generation Amazon Elastic Compute Cloud (Amazon EC2) bare metal infrastructure.
Tags : 
    
Amazon Web Services
Published By: ServiceNow     Published Date: Oct 11, 2017
https://www.servicenow.com/thank-you.d06267da-bd2d-4d8c-9fa8-d1c4afbc001e.html
Tags : 
    
ServiceNow
Published By: Amazon Web Services     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
Amazon Web Services
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, security, guide, privacy, architectures, organizations, compliance, protection
    
McAfee EMEA
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks, web applications, pci dss 2.0, spear phishing, application control, drive-by download, malicious activity, network security solutions, business continuity, application security, firewalls, identity management, network security appliance
    
WatchGuard Technologies
Published By: EMA Analyst Research     Published Date: Jun 07, 2016
By viewing this on-demand webinar, you will also discover: • How organizations view their big data initiatives and how they compare with their actual implementation maturity. • Are data lakes becoming a brackish data swamp or a reliable location for data management practices? • How organizations are continuing the trend of implementing the EMA Hybrid Data Ecosystem in association with their big data initiatives.
Tags : 
    
EMA Analyst Research
Published By: IBM Software     Published Date: Jul 06, 2011
Learn why you should keep your software subscription up to date.
Tags : 
ibm, tivoli, software subscription and support, renewal, bill kribbs, laura sanders, risk compliance, search, storage, service, compliance
    
IBM Software
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: CradlePoint     Published Date: May 17, 2016
This global corporation of quick service restaurants has about 17,500 locations serving millions of customers each day with concepts including popular pizza, chicken, and Tex-Mex chains. Most of the restaurants are on a wired network with Cisco routers, the main function of which is to process credit card purchases. With so many transactions taking place every day, the corporation decided to invest in a wireless failover system to guarantee uninterrupted connection. After careful consideration, the corporation chose Cradlepoint to provide “four-nines” (99.99% or better) connectivity via 3G/4G/LTE or wireless backup. - See more at: https://cradlepoint.com/success_stories/quick-service-restaurant-chain#sthash.ODr3J5uT.dpuf
Tags : 
    
CradlePoint
Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.
Tags : 
verisign, symantec, ssl, firesheep, sidejacking attacks, wifi, http connections, https, tls/ssl, vulnerability management, sensitive information, hackers, access control, authentication, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance
    
VeriSign, Inc.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: Altiscale     Published Date: Aug 25, 2015
Weren't able to attend Hadoop Summit 2015? No sweat. Learn more about the latest Big Data technologies in these technical presentations at this recent leading industry event. The Big Data experts at Altiscale - the leader in Big Data as a Service - have been busy at conferences. To see all four presentations (in slides and youtube video), click here. https://www.altiscale.com/educational-slide-kit-2015-big-data-conferences-nf/ • Managing Growth in Production Hadoop Deployments • Running Spark & MapReduce Together in Production • YARN and the Docker Ecosystem • 5 Tips for Building a Data Science Platform
Tags : 
hadoop, hadoop technologies, hadoop information
    
Altiscale
Published By: Symantec     Published Date: Oct 01, 2015
To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.
Tags : 
https-secured sites, seo, google ranking, security
    
Symantec
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.