secure network

Results 1 - 25 of 230Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
    
Cisco Umbrella EMEA
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Juniper Networks     Published Date: Oct 02, 2018
How do you connect to public clouds and drive hybrid IT while prioritizing legacy needs? This detailed eBook on cloud integration provides our most in-depth report. • Build a secure, agile, modern network • Integrate cloud without leaving legacy software behind • What are the common barriers to adopting cloud solutions—and how do we solve them?
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA Tier 3 ABM
Published By: Cisco     Published Date: Jul 30, 2015
Transformation by securely extending the network.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco® Unified Access establishes a framework that securely, reliably, and seamlessly connects anyone, anywhere, anytime, using any device to any resource. This framework empowers all employees with advanced services, taking advantage of an intelligent, enterprise-wide network to increase revenue, productivity, and customer satisfaction while reducing operational inefficiencies across the business. Cisco Unified Access includes services-rich network edge systems and combines a core network infrastructure embedded with integration of productivity-enhancing advanced technologies, including IP communications, mobility, security, video, and collaboration services.
Tags : 
framework, network infrastructure, communications, optimization, network management
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment effectiveness (OEE), reduced downtime, and manufacturing flexibility can be achieved with a factory that is digitized and connected. By providing visibility to machines and processes, manufacturers can anticipate issues that create unplanned downtime. By putting in place a secure, converged and wireless-ready network, manufacturers can have a platform that enables the agility to quickly start up new machines, cells, and lines, and rapidly deliver new products.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Carbonite     Published Date: Jul 18, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : 
content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : 
byod, pulse secure, vpn, mobile device management, network security, productivity, networking, security
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.
Tags : 
mobile connectivity, byod, device security, policy compliance, enduser, pulse secure, mobile worker, networking, security
    
PulseSecure
Published By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, access control, anti spam, anti spyware, anti virus, application security, authentication, security management, security policies, ssl, vulnerability management
    
Venafi
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking
    
Venafi
Published By: Juniper Networks     Published Date: Oct 25, 2017
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: IBM APAC     Published Date: Apr 26, 2017
Find out how you can take advantage of hybrid cloud by extending or migrating workloads using secure and seamless networking capabilities offered by VMware. All of this is available on secure, single-tenant IBM Bluemix bare metal servers on IBM Cloud, giving you the utmost control.
Tags : 
cloud, ibm, hybrid cloud, vmware, agility
    
IBM APAC
Published By: IBM APAC     Published Date: Apr 26, 2017
Find out how you can take advantage of hybrid cloud by extending or migrating workloads using secure and seamless networking capabilities offered by VMware. All of this is available on secure, single-tenant IBM Bluemix bare metal servers on IBM Cloud, giving you the utmost control.
Tags : 
virtualisation, cloud, vmware, ibm, ibm cloud, hybrid cloud, secure environment
    
IBM APAC
Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC
Published By: Juniper Networks     Published Date: Sep 10, 2014
To learn how to improve business agility and your network architecture, download the Whitepaper on building a business case for virtualization. Find out how your network can deliver new levels of performance and resiliency.
Tags : 
network architecture, virtualization, secure network, juniper, best practices
    
Juniper Networks
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Kuoni Travel teamed up with HP and used their TippingPoint to help customers handle threat landscape effectively, protecting both agents and customers
Tags : 
kuoni travel, hp tippingpoint, threat landscape, threats, travel, application security, internet security, intrusion prevention, network security appliance, security management, vulnerability management
    
HP - Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.