security

Results 426 - 450 of 7242Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Feb 02, 2015
Many enterprises, educational institutions, and government agencies find themselves still managing both legacy end-user hardware and an antiquated OS. The time has come to move to modern Windows options and given the gamut of robust computing hardware, upgrading both at once simply makes good sense. Download this paper to discover how your organization can benefit from the combination of reduced staff costs, fewer operational problems, lower operational costs and improved productivity, the organization realizes significant cost savings.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft, business, management, budget, training, windows 7, windows 8, mobility, security, compatibility, support, training, byod
    
Dell
Published By: Dell     Published Date: Feb 04, 2016
When considering an upgrade of client PCs, it’s important to consider more than just the initial cost of new systems. User needs are ever-evolving and you want to make client hardware choices today that will meet the mobility, productivity, and security needs of today’s on-the-go work environments. Read this paper to learn about the factors that contribute to total cost of ownership so you can build a business case for upgrading that moves beyond budget constraints to focus on value.
Tags : 
dell, windows, productivity, refreshment, benefits, economic, barriers, security, productivity
    
Dell
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware, anti-virus, software, protection, solutions
    
Dell
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: HP     Published Date: Dec 05, 2014
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud, storage, data, speed, software
    
HP
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: HPE     Published Date: Feb 11, 2015
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
    
HPE
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to implement a unified solution for mobile device, app, and data security and see what this means for security and risk professionals embracing and securing mobility in their enterprise.
Tags : 
junos pulse, vpn, pulse secure, security, risk, mobility, networking
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : 
byod, pulse secure, vpn, mobile device management, network security, productivity, networking, security
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to transition enterprise customers safely to the cloud and see how this will enable service providers to deliver scalable and on-demand, cloud-based deployments with simplicity and agility.
Tags : 
cloud, pulse secure, security, wireless, mobile access, data center
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to properly empower your organization for mobile productivity and see how you can deploy and provision for this device-based access with improved security and management policies.
Tags : 
mobile productivity, mobile access, security, connectivity, byod, corporate network, networking
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve an app centric approach to enterprise mobility and see how this will enable workers to stay connected to corporate systems through a vast array of device types and wireless connectivity options while simultaneously increasing productivity and becoming more customer-centric.
Tags : 
enterprise mobility, applications, byod, mobile strategy, security
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.
Tags : 
mobile connectivity, byod, device security, policy compliance, enduser, pulse secure, mobile worker, networking, security
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 06, 2015
Learn about the 2015 mobile threat landscape and see how you can prepare your organization for 2015 and beyond with this market report.
Tags : 
mobile threats, pulsesecure, mobile security, mobile threat landscape, market report, security
    
PulseSecure
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Targeted threats are increasing at an alarming rate. Malicious actors are evolving their methodologies and are increasingly exploiting the domain name system (DNS) to launch cyberattacks. Learn more about how to proactively protect your company with an additional layer of cloud-based security.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Découvrez dans ce livre blanc une technologie unique de gestion des caractéristiques de sécurité, de performances, de conformité et de support de tout type de périphérique, d’application, de contenu ou de courriel, qui préserve la qualité de l’expérience utilisateur mobile.
Tags : 
mobile user experience, security features, security in the cloud, the mobile user experience, optimising the user experience, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Les activités IT et métier sont concernées par de nombreuses tendances : l’adoption du Cloud, l’accroissement de la mobilité, l’essor des médias sociaux et l’augmentation des flux d’informations circulant au sein de toute l’entreprise. Le concept de périmètre réseau n’a plus de sens. En effet, l’IT doit aujourd’hui composer avec des identités hautement distribuées sur l’ensemble de l’environnement métier et provenant de nombreuses sources, telles que des applications, des systèmes, des médias sociaux, etc. Les employés et les clients mobiles sont, par ailleurs, en train de changer profondément l’activité et de redéfinir le défi consistant à fournir rapidement des applications sécurisées à une population d’utilisateurs en constante évolution. À chaque défi son opportunité. L’identité remplace désormais le périmètre réseau, et seules les entreprises qui ont compris cette évolution sont en mesure de dynamiser et de protéger leur activité.
Tags : 
business trends, cloud adoption, sociial media, social mobility, security in the cloud, business security, application security, business continuity, network security appliance, web service security, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.
Tags : 
mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, access control, application security, web service security, cloud computing
    
CA Technologies
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.