policies

Results 151 - 175 of 395Sort Results By: Published Date | Title | Company Name
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise
    
Microsoft
Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies, anti spyware, email security, internet security
    
Cisco
Published By: NuCompass     Published Date: May 26, 2016
When you look at relocation options for your organization, you see that most companies — especially larger ones — manage relocations with policies. Though popular today, using policies to manage relocation may not be the best way to meet the goals of a modern relocation program.
Tags : 
employee relocation, relocation, relocation program, new hire relocation, mobility, mobility services, mobility program, employee move
    
NuCompass
Published By: Okta     Published Date: May 09, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs. Provisioning devices to users should be simply an extension of the foundational identity lifecycle management system. And, mobility management should enable IT teams to implement simple policies to enable and secure access from mobile. This eGuide provides an overview of how Okta can power BYOD programs with integrated identity and mobili
Tags : 
    
Okta
Published By: IBM     Published Date: Apr 04, 2016
When you think about mobile security and policies, do you ever think about all the places your enterprise data is going? We operate in a mobile economy, with an estimated 16M mobile devices infected by malware at any given time. There are more mobile devices connected to the Internet than human beings in the world. The question is: Are we prepared for that?
Tags : 
ibm, ciso, mobility, mobilephobia, mobile security, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The right identity governance and administration solution can help you control access risks and segregation-of-duties violations. It can help you manage user roles, access policies and risk - so you can apply and enforce appropriate levels of access across your enterprise.
Tags : 
ibm, data security, risk management, data management, network security
    
IBM
Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services
    
Cisco
Published By: IBM     Published Date: Feb 26, 2016
"71% of consumers do some digital research before buying an insurance policy, and 26% of those surveyed had purchased their policies online. Insurance companies are investing in interactive websites, mobile apps, and analytics software to help them optimize their processes, increase sales, improve customer service, and boost their financial standing. But is this enough to keep up? As technology continues to advance, leading insurance companies are already looking ahead to the next big advance that will transform the industry: cognitive computing."
Tags : 
cognitive computing, analytics software, ibm, insurance, process automation
    
IBM
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data
    
Aternity
Published By: ArborNetworks     Published Date: Feb 12, 2016
Today’s DDoS attacks are an easy way to interrupt businesses.
Tags : 
ddos protection, arbor networks, insegment, best practices, policies, data, application security, ddos
    
ArborNetworks
Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron
Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM).
Tags : 
citrix, byodm cyod, cope, security, security management, security policies
    
Citrix Systems, Inc.
Published By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : 
code42, data protection, payment data, data protection, corporate data security, security
    
Code42
Published By: Workforce Software     Published Date: Dec 16, 2015
Do you want to know how other organizations design, execute, and measure workforce management programs? Here’s your chance.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor
    
Workforce Software
Published By: Workforce Software     Published Date: Nov 23, 2015
Access this white paper to learn how WorkForce Software’s EmpCenter suite meets the needs of global employers by automating organizational policies in alignment with national and local labor laws, as well as internal policies and union rules. You’ll learn: The challenges associated with overlapping and ambiguous labor regulations WorkForce Software’s approach to meeting the needs of global companies How WorkForce Software applies regulatory updates to the EmpCenter suite Which compliance regulations are covered in EmpCenter’s preconfigured solutions
Tags : 
labor compliance, multinational organizations, global employers, automation, labor laws, union rules, compliance, labor regulations
    
Workforce Software
Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network, networking
    
Cisco
Published By: Okta     Published Date: Nov 09, 2015
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Read this whitepaper to learn how to eliminate the pitfalls that come with trying to build and manage multiple on-premises Active Directory integrations yourself.
Tags : 
okta, active directory, ldap, identity and access management, data center
    
Okta
Published By: Cloud Sherpas     Published Date: Nov 06, 2015
Watch this webinar replay to explore the principles that guide Google’s security and privacy policies in order to understand how going Google can transform your organisation without compromising security.
Tags : 
security, cloud, cloud computing, security cloud computing, security and privacy, google, google apps, application security
    
Cloud Sherpas
Published By: Okta     Published Date: Oct 30, 2015
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Read this whitepaper to learn how to eliminate the pitfalls that come with trying to build and manage multiple on-premises Active Directory integrations yourself.
Tags : 
active directory, identity & access management, eliminate pitfall, on-premises active directory
    
Okta
Published By: Concur Technologies     Published Date: Oct 09, 2015
Millions in losses, millions more in fines. Yet research shows 82% of travel and entertainment fraud is committed by just 5% of employees. This eBook explains what’s at stake and how automating expense reports can uncover fraud or head it off before it happens, and help employees make the right choices.
Tags : 
t&e, concur, compliance, financial services, fraud
    
Concur Technologies
Published By: Concur Technologies     Published Date: Oct 01, 2015
Read how Columbia College, with the help of Concur, put good internal controls over their travel and expenses, and implemented policies to help reduce spending.
Tags : 
t&e expenditures, internal controls, implement policies, reduce spending
    
Concur Technologies
Published By: Aerohive     Published Date: Sep 25, 2015
Testez par vous-même l’éventail complet des fonctionnalités d’un point d’accès Aerohive. Assistez à ce webinaire le jeudi 8 octobre 2015 à 11 h CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, network security, internet security, security management
    
Aerohive
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.