policies

Results 76 - 100 of 356Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Nov 09, 2016
You're moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. With Okta's lightweight agent, you can minimize your on-prem footprint as you move to the cloud. Zero servers and on-prem software to deploy, update and manage means lower TCO. Download this white paper to learn more!
Tags : 
    
Okta
Published By: Rackspace     Published Date: Apr 17, 2018
Read this blog to see how larger enterprises are modernizing their infrastructure. Specifically, three tips to reduce risk and complexity that accompanies such efforts: Adopt tooling and prioritize automation Make sure operations has a seat at the table Adapt and update IT policies While those might sound obvious, it’s remarkable how many organizations attempt short cuts that almost inevitably lead to early failure. Read this blog to learn more!
Tags : 
    
Rackspace
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
Published By: Lookout     Published Date: Sep 25, 2017
A report from CERT-UK and Lookout Mobile Security Mobile malware is increasingly sophisticated and as such presents a growing threat to organisations as well as consumers. The volume of malware targeting mobile devices in the UK quadrupled in 2015, with Q1 2016 already reaching 50% of 2015 numbers. Read the whitepaper to learn what factors must be accounted for to make effective mobile security policies.
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Using CA Live API Creator, you can execute business policies using Reactive Logic. You write simple declarative rules defining relationships across data fields, and they’re automatically enforced when changes occur—just like formulas in a spreadsheet. Reactive Logic should cover most of your application requirements, but you also have the ability to configure event processing or external callouts using server-side JavaScript or imported Java® libraries if you so desire.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: Carbon Black     Published Date: Nov 26, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Aerohive     Published Date: Sep 25, 2015
Testez par vous-même l’éventail complet des fonctionnalités d’un point d’accès Aerohive. Assistez à ce webinaire le jeudi 8 octobre 2015 à 11 h CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, network security, internet security, security management, cloud computing
    
Aerohive
Published By: Aerohive     Published Date: Sep 25, 2015
Experience first-hand the full feature set of an Aerohive Access Point. Attend this webinar on Thursday 8 October 2015 at 11:00 CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, infrastructure, network security, internet security, security management, cloud computing
    
Aerohive
Published By: Aerohive     Published Date: Sep 18, 2015
SIMPLI-FI ENTERPRISE NETWORKING THURSDAY 8 OCTOBER 2015 AT 11:00 AEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, infrastructure, network security, internet security, security management, cloud computing
    
Aerohive
Published By: NAVEX Global     Published Date: Jul 17, 2017
Screening your third party vendors and business partners for risk can be a challenging process. With so many different factors to consider, where do you even begin? We've developed our Anti-Bribery and Corruption Risk Assessment Checklist so you can streamline your compliance risk assessment processes and ensure each potential risk is addressed. Keep up with changing European laws and regulations with this checklist.
Tags : 
training, communication, culture, controls, oversight, policies, risk assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 17, 2017
Download your Definitive Guide to Policy Management for real-world examples of companies avoiding litigation and penalties by having a well thought out compliance programme. Organisations that approach policy management strategically and exercise ruthless discipline with respect to their policies yield massive returns in organisational alignment, corporate culture, and ultimately their bottom-line results. And when incidents occur or regulators come knocking, you'll be prepared.
Tags : 
policies, enforcement, perception, culture, templates, meta-policy, properties, links
    
NAVEX Global
Published By: Concur ENT     Published Date: Nov 07, 2017
T&E solutions need to drive measurable improvements to the bottom line. With the right tools, anyone can become a T&E leader with increased visibility, compliance, and cost savings. An integrated, end-to-end T&E solution, which eliminates disparate systems, offers significant benefits for businesses and their travellers. Aberdeen recommends following the Leaders in their adoption of T&E technologies.
Tags : 
enterprise, compliance, corporate travel policies, trip cost, corporate budgets, concur
    
Concur ENT
Published By: Concur     Published Date: Aug 15, 2017
As travel and expense (T&E) management solutions have improved, the expectations of the end user are higher than ever before. Business travellers want a seamless experience and you want better visibility, increased compliance, and reduced spend. Our research identified two types of people – Leaders and Followers. Leaders have most of their spending under management, have increased compliance to company policies and approve expense reports more quickly. Followers are lagging behind.
Tags : 
platform, travel, payment, expense management, mobile app, corporate budgets, trip cost visibility, enterprise
    
Concur
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Tags : 
fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam, anti spyware, anti virus, internet security, phishing, web service security, content management
    
Fortinet, Inc.
Published By: Teradata     Published Date: Jul 30, 2013
This paper examines the obstacles that make interactive customer management a challenge for many insurance carriers. It describes how they can create a more customer-centric business by using a sophisticated analytics platform to uncover valuable insights into their business and provides concrete examples of specific areas where insurers gain value. The adoption of a customer-centric approach need not be accomplished all at once. Rather, it can be managed and self-funded by following a roadmap that delivers incremental capabilities and revenue.
Tags : 
insurance policies, integrated data warehousing, interactive customer management, customer management, insurance carriers
    
Teradata
Published By: Oracle     Published Date: Jan 15, 2014
The latest IT tools and techniques can bring benefit to policy implementation in Government, as well as to administration and operations. This new role for IT can not only speed up the implementation of policy changes, but enable more effective targeting of those policies. This paper explains how. Oracle provides standard COTS software that can do this, and how such solutions have already been proven in Government Ministries.
Tags : 
oracle, government, cots software, smarter policy implementation, government ministries
    
Oracle
Published By: ServiceNow     Published Date: Mar 24, 2015
Your enterprise needs the ability to identify all duplicative or outmoded IT and business applications, services and other resources, and then to consolidate those worth keeping, migrate those worth updating, and retiring the rest. And that consolidation delivers multiple business benefits. Key among these: a single interface to multiple tools and resources, and more agile global operations. With the right practices, policies and technology platform, your enterprise can accomplish these goals in ways that accelerate growth, cut costs and complexities, and enhance competitiveness.
Tags : 
consolidation, business transformation, single interface, business applications, business benefits
    
ServiceNow
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: ArborNetworks     Published Date: Feb 12, 2016
Today’s DDoS attacks are an easy way to interrupt businesses.
Tags : 
ddos protection, arbor networks, insegment, best practices, policies, data, application security, ddos, internet security, intrusion prevention, security policies, vulnerability management
    
ArborNetworks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.