security center

Results 1 - 25 of 181Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
With the rate of cloud spending predicted to outpace overall IT spending six to one over the next few years, organizations are rightly concerned about ensuring that applications in the cloud enjoy the same level of security as apps deployed in data centers. Using the public cloud does alter your attack surface area—and leveraging multiple public and private clouds (aka multi-cloud) does so even more. Some threats get bigger, some get smaller. Some even go away, or at least drift out of your control, while new threats should move front and center in your security thinking.
Tags : 
cloud, landscape, navigation, security, technology, applications
    
F5 Networks Inc
Published By: Genesys     Published Date: Feb 22, 2018
Move to the Cloud with Confidence If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: • The size of your contact center, and business requirements such as customer journey management • The location and quantity of contact centers being managed • The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
contact center, cloud, ebook, customer journey
    
Genesys
Published By: Genesys     Published Date: Feb 26, 2018
A cloud contact center can offer many advantages in performance, scalability and security, compared to an on-premise contact center infrastructure. To maximize these advantages, it’s important to determine how best to leverage the cloud to meet your business’s specific needs.
Tags : 
cloud, contact center, infrastructure, cloud contact center
    
Genesys
Published By: Genesys     Published Date: Feb 27, 2018
Everyone says they’re “in the cloud,” but most technology leaders would agree that not all clouds are created equal. When evaluating a cloud contact center solution for your business, it’s important to understand the difference between a true Cloud 2.0 application and traditional software, including which features to look for and why those features are important. Download this eBook and learn: • How a true Cloud 2.0 model is built to provide levels of reliability, scalability, flexibility and security that far exceed those of previous generations • The benefits of utilizing a platform built on microservices architecture • How to take your business to the next level with a built to scale cloud contact center platform
Tags : 
cloud contact center, ebook, cloud 2.0 model, microservices architecture
    
Genesys
Published By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs, security
    
QTS
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.
Tags : 
centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
    
Cisco EMEA Tier 3 ABM
Published By: Cisco     Published Date: Jun 22, 2015
Read this paper to find out how the Cisco and Microsoft data center solutions provide your IT infrastructure with the flexibility and agility needed to address your changing business needs and achieve your business goals.
Tags : 
cisco and microsoft data center, it infrastructure, security risks, data center, data center solutions, security management, virtualization, cloud computing, infrastructure, design and facilities
    
Cisco
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 08, 2016
Your data center struggles with competing requirements from your lines of business and the finance, security and IT departments. While some executives want to lower cost and increase efficiency, others want business growth and responsiveness. But today, most data center teams are just trying to keep up with application service levels, complex workflows, and sprawling infrastructure and support costs.
Tags : 
data, converged infrastructure, integration, vmware, private clouds, business application
    
Dell EMC
Published By: Cisco     Published Date: Jul 08, 2016
So what do end-users—companies in the process of building or upgrading their data centers today—think of the security problems they face? We conducted this survey to answer key questions about buyers’ plans for security in their data centers.
Tags : 
    
Cisco
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.
Tags : 
owasp, web application safety, data breaches, firewalls
    
F5 Networks Inc
Published By: Oracle CX     Published Date: Oct 20, 2017
Replacing your aging infrastructure with a modern Oracle SPARC and Solaris architecture boosts the security, efficiency and performance of your data center. But, what about ongoing business growth and expansion? With the same architecture on-premises and in the Oracle Cloud, SPARC provides the easiest, most cost effective approach to modernizing your business infrastructure.
Tags : 
    
Oracle CX
Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing
    
Digital Realty
Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware, anti virus, application security, encryption, internet security, intrusion detection, intrusion prevention, security management
    
Kaspersky Lab Australia and New Zealand
Published By: Dell     Published Date: Oct 24, 2014
The end of support for Windows Server 2003/R2 could signal the beginning of a new stage in your organization’s evolution, and taking advantage of the Microsoft datacenter transformation vision can help you reach that next stage.
Tags : 
infrastructure security, migration process, datacenter transformation, server support
    
Dell
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to transition enterprise customers safely to the cloud and see how this will enable service providers to deliver scalable and on-demand, cloud-based deployments with simplicity and agility.
Tags : 
cloud, pulse secure, security, wireless, mobile access, data center
    
PulseSecure
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: Akamai Technologies     Published Date: Aug 17, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture. We also share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, buyer's guide, data safety, cybersecurity
    
Akamai Technologies
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
    
Red Hat
Published By: VMware     Published Date: Oct 05, 2015
Most data center security emphasizes strong perimeter defense to keep threats on the outside. But this model is ineffective against today’s new types of threats, which may be borne by east-west traffic inside your data center. Some of these intrusions may lurk for days, weeks, or months to discover and exploit vulnerabilities. An existing concept called micro-segmentation is the solution. But until now, it was hardware-intensive and costly. In this solution overview, you’ll learn why micro-segmentation is now within your organization’s reach. Get your free copy now.
Tags : 
vmware, data center security, data center, micro segmentation, micro segmentation solution, security
    
VMware
Published By: VMware     Published Date: Oct 05, 2015
Undoubtedly you are aware of network virtualization, but perhaps you’ve yet to hear a compelling case for it. If the extended network capabilities and simplified management enabled by network virtualization aren’t compelling enough reasons, data center security should be. To manage today’s coordinated and persistent security threats, which often come from within, data centers need to implement “Zero Trust” networking. Virtualization puts it within your reach. Discover why — download this free business case white paper now.
Tags : 
vmware, network virtualization, data center, data security, vmware nsx, zero trust, zero trust network, networking, security
    
VMware
Published By: VMware     Published Date: Oct 05, 2015
Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a “Zero Trust” network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower — until now, that is. Download this use case from VMware and Carahsoft® now to learn why.
Tags : 
vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft, security
    
VMware
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, security, data center
    
Red Hat
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.