mid market security

Results 1 - 21 of 21Sort Results By: Published Date | Title | Company Name
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
    
Fortinet EMEA
Published By: KeyBank Commercial Banking     Published Date: May 10, 2017
When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. We believe that the more we know, the better we can serve you. Check out what leaders are saying about the economy, future growth and cybersecurity when you download our latest quarterly report. Member FDIC. © 2017, KeyCorp. CFMA 20170424- 224928
Tags : 
middle market, us economy, economic outlook, customized solutions, cybersecurity, business success, business goals, business expansion, financial outlook, fraud, business growth, m&a
    
KeyBank Commercial Banking
Published By: Symantec.cloud     Published Date: Mar 02, 2011
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
Tags : 
symantec.cloud, messagelabs, midmarket, wireless device, remote workers, pda, smart phones, tablet pc, workforce mobile, saas, security management
    
Symantec.cloud
Published By: Avaya     Published Date: Feb 06, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : 
midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, network security, remote access, remote network management
    
Avaya
Published By: Avaya     Published Date: Jan 20, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : 
midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, infrastructure, network security, remote access, remote network management
    
Avaya
Published By: Avaya     Published Date: Jan 23, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : 
midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, network security, remote access, remote network management
    
Avaya
Published By: Avaya     Published Date: Jan 28, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : 
midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, infrastructure, network security, remote network management
    
Avaya
Published By: IBM APAC     Published Date: Mar 19, 2018
We know that flash storage can provide significant benefits and deliver needed agility for large businesses, but what about medium-sized businesses (MMB = 500 to 999 employees)? IBM asked Forrester Consulting to look into adoption and use of flash storage technologies by mid-market organizations. A snapshot survey of 106 IT professionals found the following: › MMBs are actively adopting flash storage › Flash is exceeding expectations regarding cloud management, flexibility and security › A majority of respondents expect to continue their investments, with almost half aspiring to an all-flash storage environment. To learn more download this report.
Tags : 
    
IBM APAC
Published By: Box     Published Date: Jun 11, 2014
Midsize construction company uses Box to collaborate with partners, but uses SharePoint internally. They used SkySync to sync partner portals in Box with SharePoint -- while matching SharePoint's existing security settings and folder structures. Construction company, midsize company, midmarket, SharePoint, SkySync, partner portal, NA, security.
Tags : 
box, dynamic systems, sharepoint, sync partner, skysync, midsize companies, midmarket, networking
    
Box
Published By: EVault Inc.     Published Date: Aug 22, 2012
How will you prepare your company for cloud adoption? Cloud services are especially attractive to midmarket companies hit with the high cost of meeting compliance requirements. Author and information security expert Felix Santos discusses: . Information security and data protection in the cloud . Recent cloud standards and audit initiatives . Evaluation criteria for selecting a cloud provider that offers trusted data assurance
Tags : 
evault, ebook, trusted, data, assurance, cloud, services, compliance, security, data, protection, audit, standards, evaluation, criteria, provider, assurance, storage, cloud computing, data center
    
EVault Inc.
Published By: EMC Corporation     Published Date: Jun 14, 2013
In this paper, the SMB Group examines different cloud computing models, discusses the types of requirements that each can best address, and consider what midmarket businesses should look for in a cloud solutions provider.
Tags : 
cloud computing, midmarket, solutions provider, technology, business success, performance, security, networking, storage
    
EMC Corporation
Published By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : 
security challenges, mid-market security, cyber-extortion, cyberthreat, security
    
ThreatTrack Security
Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security, anti spam, anti spyware, ddos, encryption, hacker detection, identity management
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.
Tags : 
mcafee, security, pci, hipaa, epolicy orchestrator, the eu directive, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security, access control, application security, high availability, policy based management, security management
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.
Tags : 
mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security, anti spam, application security, authentication, ddos, disaster recovery
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, security center, total security, dlp, midmarket, compliance, availability, email security, anti spam, anti spyware, anti virus
    
McAfee Inc
Published By: Telx     Published Date: Mar 15, 2016
The cloud isn't just for startups and enterprises. Typically, businesses with 20-1,000 employees do not have huge IT teams or budgets. As result, understanding the potential of the Cloud hasn’t been easy and figuring out the benefits of the Cloud can be a huge challenge. The FierceCIO Midmarket and SMB Guide to Cloud Computing sponsored by Digital Realty | Telx and accompanying webinar shows how you can benefit from the Cloud, too.
Tags : 
cloud, telx, smb, midmarket, security, provider, digital, networking, data center
    
Telx
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
ibm, fiberlink, app security, mobile application, app development, data security, networking, security
    
IBM MaaS360
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Hosted security is an efficient and cost-effective solution for many midmarket organizations. Learn how to evaluate hosted security services, and make a business case for reliable security with predictable costs.
Tags : 
messagelabs, symantec hosted services, hosted security provider, total cost of ownership, tco, application security, business continuity, security management
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will examine the information security needs of midmarket organizations, and how SaaS security services can help address those needs specific to a distributed workforce.
Tags : 
messagelabs symantec hosted services, saas, distributed workforce, information security, software-as-a-service, messaging
    
Symantec.cloud
Published By: IBM     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
    
IBM
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.