manage and secure

Results 1 - 25 of 248Sort Results By: Published Date | Title | Company Name
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance
    
Sangoma
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
In January 2016, the Federal Risk and Authorization Management Program released a draft of its high-impact baseline for moving federal data to the cloud. Not long after, Amazon Web Services (AWS) accepted an offer to pilot the new security threshold. AWS worked with FedRAMP to develop a set of standards under which highly sensitive government data could securely migrate into cloud environments. If ever you doubted that cloud computing was the new frontier for federal data and software management, look around. Over 2,300 government agencies worldwide have already migrated to the AWS Cloud. And in the U.S., this will only increase with the release of FedRAMP’s high baseline standards. Previously, CSPs could only become certified at a low or moderate baseline under FedRAMP, meaning agencies had no security baseline from which to spring their sensitive data into the cloud. These new standards effectively represent the fall of the final formal barrier to federal cloud computing. Terabytes o
Tags : 
    
Amazon Web Services APAC
Published By: Menlo Security     Published Date: Nov 11, 2019
"Secure Cloud Transformation: Adopt SaaS applications and Manage Large Increases in Traffic Volumes without Sacrificing Security Traditional cybersecurity solutions continue to use outdated and ineffective detect-and-respond strategies—a risky security approach for organizations moving critical business systems to the cloud. Menlo Security sees enterprises transforming their infrastructure driven by the adoption of SaaS. The adoption of SaaS is happening faster than people anticipated in the average enterprise. Secure cloud transformation is about how you can take control of this sea change and undertake the transformation on your terms. Read “Secure Cloud Transformation” to Learn: - Why security has moved to the cloud yet has failed to adapt to the changing cloud paradigm - How a cloud security platform powered by isolation fundamentally changes the way organizations protect users - The top four requirements of a cloud-based security platform It’s clear that security isn’t keeping
Tags : 
    
Menlo Security
Published By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: AWS     Published Date: Nov 04, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
    
AWS
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: May 23, 2017
The rapid growth of unstructured data poses significant challenges to store, manage, secure and protect data across virtually every industry segment. You need a way to manage your data: simply, securely and cost-effectively.
Tags : 
    
Dell EMC
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell™ One Identity Privileged Password Manager and Privileged Session Manager from Dell Software, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, privileged accounts, priviliged passwords, civilian agencies, dell, dell privileged session manager, dell security
    
Dell Security
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell One Identity Privileged Password Manager and Privileged Session Manager, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, dell, dell privileged session manager, privileged passwords, two-factor authentication
    
Dell Security
Published By: Cisco     Published Date: Jun 21, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget.
Tags : 
    
Cisco
Published By: Lenovo and Intel     Published Date: Jan 20, 2017
It’s no secret that video is the new paradigm in law enforcement; but, with video comes the need to log, manage, store, and secure thousands of hours of content—and that makes huge demands on your data center infrastructure. In this white paper, we detail infrastructure challenges faced by state and local agencies and how they are overcoming them with powerful infrastructure solutions. Download the white paper and read more.
Tags : 
lenovo, it challenges, body camera, data center
    
Lenovo and Intel
Published By: Lenovo and Intel     Published Date: Jan 19, 2017
It’s no secret that video is the new paradigm in law enforcement; but, with video comes the need to log, manage, store, and secure thousands of hours of content—and that makes huge demands on your data center infrastructure. In this white paper, we detail infrastructure challenges faced by state and local agencies and how they are overcoming them with powerful infrastructure solutions. Download the white paper and read more.
Tags : 
    
Lenovo and Intel
Published By: Adobe     Published Date: Nov 09, 2017
Robust Data Management Platforms drive intimate customer experiences. You know the importance of identifying your best customer segments and treating them right. You also know that takes a ton of work. But it’s work that we can help you accomplish with our integrated and secure Data Management Platform (DMP). By using Adobe Audience Manager, our DMP offering, you'll aggregate data from all your sources to better understand your current customer segments, while we also help you identify new audiences to target. The new Forrester Wave™: Data Management Platforms, Q2 2017 says “Adobe was a DMP Forrester Wave leader in 2013 and 2015, and continues to set the pace in this Forrester Wave.” See where we receive the highest scores and why we are named a Leader in this report.
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Every organisation already has a system of agreement. It's how written agreements get prepared, signed, enacted, and managed. But typically, it involves a messy, improvised mix of printing, signing, scanning, faxing, and overnighting paper agreements. These needlessly slow legacy processes add costs to agreements due to wasted productivity and materials. It's time for a change. The DocuSign System of Agreement Platform connects the world's No. 1 eSignature technology to every other aspect of the agreement process. Read this white paper to learn how to modernise your System of Agreement, including how to: - Prepare agreements with a high degree of automation - Sign agreements quickly and securely - Act on agreement terms after signing - Manage agreements with flexible options"
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Microsoft has teamed up with DocuSign to make our industry-leading eSignature apps available to businesses and consumers within Microsoft applications, making it easier than ever to stay productive. Robust apps for Outlook, Word, SharePoint, Dynamics CRM, Windows and Windows Phone are making it easier for organisations of every size, industry, and geography to quickly and securely transact business anytime, anywhere, on any device. Read this white paper to learn how you can use DocuSign for Office 365 to: - Go digital: Send and manage your documents work flow more efficiently - Save time: Eliminate paper-based processes like printing, scanning, and faxing - Increase productivity: With DocuSign for Office 365, transactions are done quickly and securely"
Tags : 
    
DocuSign UK
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Pursuing agility to truly impact business transformation requires embracing data center modernization as a core competency. Crucial to this is having the most up-to-date IT infrastructure to support the scale and complexity of a changing technology landscape. Companies must embrace this imperative by adopting software-defined data center principles, embracing modernization, and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with fast, secure, and reliable business technology. In December 2018, Dell Technologies commissioned Forrester Consulting to evaluate the business value of modern infrastructure in company data centers. Forrester conducted an online survey with 508 IT infrastructure technology decision makers in seven countries to explore this topic. This spotlight focuses on the 102 respondents we surveyed at midmarket businesses (MBs) with 100 to 499 employees. We found that while most midmarket fi
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Sep 03, 2019
Pursuing agility to truly impact business transformation requires embracing data center modernization as a core competency. Crucial to this is having the most up-to-date IT infrastructure to support the scale and complexity of a changing technology landscape. Companies must embrace this imperative by adopting software-defined data center principles, embracing modernization, and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with fast, secure, and reliable business technology. In December 2018, Dell Technologies commissioned Forrester Consulting to evaluate the business value of modern infrastructure in company data centers. Forrester conducted an online survey with 508 IT infrastructure technology decision makers in seven countries to explore this topic. This spotlight focuses on the 102 respondents we surveyed at midmarket businesses (MBs) with 100 to 499 employees. We found that while most midmarket f
Tags : 
    
Dell EMC Storage
Published By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : 
android, apps, vpn, work, multiple devices, emm
    
MobileIron
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: May 09, 2019
.As midmarket companies pursue business growth, they must deliver differentiated products and experiences without compromising business or customer data. Crucial to this is having the most up-to date IT infrastructure to support the scale and complexity of a changing application landscape. Midmarket businesses (MBs) must modernize their data centers refreshing server infrastructure and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with secure, fast, and reliable business technology. Download this paper, commissioned by Dell, to learn more.
Tags : 
    
Dell EMC
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: