security needs

Results 51 - 75 of 161Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile
Published By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
In the face of all the challenges presented by the accelerating pace of application development and everexpanding options for deployment, IT organizations are changing how they deliver services. Traditional manual approaches are simply too slow to keep up. Yet, when application teams attempt to circumvent IT in order to speed up deployment, security, performance, and longterm manageability suffer. To get the most out of your multi-cloud deployments, you need to fundamentally rethink how you deliver the right application services that meet current and future needs, consistently across every cloud. Standardization is key. If too much is changing too quickly, start with standardization. As your organization evolves, you will be better positioned to take the next step in making those standardized services accessible to developers through the automation toolchains they rely on.
Tags : 
multi cloud, organizations, application, security, deployment, performance
    
F5 Networks Inc
Published By: Citrix Systems     Published Date: Jul 25, 2016
NetScaler MobileStream™ technology from Citrix enables enterprises to do more than simply get by when it comes to the performance and security of mobile workspaces. Building on the gains derived from the core set of NetScaler functionality, NetScaler MobileStream combines a suite of multi-layer optimizations purpose-built to accelerate mobile service delivery with an essential collection of secure access and threat protection capabilities for mobile computing. The result is a unified solution that not only provides the peace of mind IT needs but also delivers the exceptional mobile experience your employees, customers and partners deserve. Put another way, the result with NetScaler MobileStream is a dramatic improvement in mobile service performance and protection that makes Citrix NetScaler® the world’s fastest and most secure delivery platform for mobile workspaces.
Tags : 
    
Citrix Systems
Published By: MobileIron     Published Date: May 07, 2018
The global BYOD and enterprise mobility market continues to experience impressive growth. Preparing for this transformation is more than just a matter of security. It’s a matter of leveraging the people, processes and tools needed to become a Mobile First organization that’s ready to explore a whole new opportunity landscape. This BYOD guide is a great first step toward achieving your mobile transformation by implementing a successful BYOD program. By following the recommendations in this guide, you can deliver a program that meets the needs and preferences of mobile workers, while upholding corporate security and budget requirements. But the true success of any BYOD program depends on its long-term sustainability, which means you must ensure the security of your corporate data, drive user adoption by supporting employees’ device preferences and maintain a flexible technology portfolio that enables business innovation.
Tags : 
guide, byod, mobility, landscape, organization, program, mobile
    
MobileIron
Published By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
    
AWS
Published By: Genesys     Published Date: Feb 26, 2018
A cloud contact center can offer many advantages in performance, scalability and security, compared to an on-premise contact center infrastructure. To maximize these advantages, it’s important to determine how best to leverage the cloud to meet your business’s specific needs.
Tags : 
cloud, contact center, infrastructure, cloud contact center
    
Genesys
Published By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: IBM     Published Date: Mar 29, 2018
This white paper explores how you can support cloud platform security and DevOps needs by building a hardware-rooted chain of trust.
Tags : 
container platform, devops, cloud platform
    
IBM
Published By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Akamai Technologies
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : 
mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
    
Good Technology Corporation
Published By: AlienVault     Published Date: Aug 13, 2015
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 05, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: Juniper Networks     Published Date: Feb 05, 2018
The role of IT is changing from a traditional focus on cost-efficient enablement to a more strategic contribution. Total Cost of Ownership (TCO), while important, is being surpassed by a growing focus on automation and orchestration that is needed to fulfill enterprise demands for security, agility, and innovation. The cloud-grade enterprise network – spanning the campus, data center, and branch – must be able to respond to rapid changes in business, growing reliance on hybrid cloud architectures, and the needs of users and customers. This IP Networking Comparison Guide examines the four key areas driving enterprise network priorities and looks at key factors within each. This document will give you a clear perspective on how the various options stack up on the most important features and capabilities necessary to meet your transformation needs.
Tags : 
network, transformation, enterprise, optimization, juniper
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 05, 2018
The role of IT is fundamentally changing from a cost-efficient enablement technology to a more strategic element of the enterprise. For companies born before the digital era, IT is a key player on their path to digital transformation; for more recent businesses designed with technology at their core, IT represents a foundational pillar on top of which everything else is built. With this shifting role, IT’s decades-long emphasis on TCO is being eclipsed by a new-found focus on security and automation. Whether it’s the continuous risks posed by a dynamic threat landscape, the threat of digital disruption, or an inability to keep pace with the latest trends, virtually every enterprise needs to be more agile. And, with the continued evolution of compute, storage, and applications, networks have been exposed as a bottleneck to change.
Tags : 
enterprise, cloud, data, center, networking, juniper
    
Juniper Networks
Published By: Spectrum Enterprise     Published Date: Jun 05, 2017
Download this case study to learn how Spectrum Enterprises has provided the scalability, reliability and security to support Hagadone Corporation’s ongoing drive for excellence including: - Productivity driven by the network’s ability to handle day-to-day work flow quickly and with little latency, especially during spikes in usage - Reliable connectivity for sharing large files for electronic publishing Flexibility to innovate and create an interactive hospitality guest experience - Ability to scale bandwidth to support diverse business needs and expand Hagadone’s influence as a media company
Tags : 
    
Spectrum Enterprise
Published By: Ahead     Published Date: Nov 15, 2018
If your business is like many other organizations that are in the process of enabling a Microsoft Azure public cloud platform, then you might be struggling with the guardrails needed to secure and manage cost, while at the same time enabling flexibility for the teams consuming cloud services. While the Azure platform is already very secure, it also allows a great deal of flexibility in configuration. In order to avoid accidentally creating security holes and out-of-control spend, a Governance Framework is required. We created the AHEAD Azure Governance framework to allow enterprises to develop and maintain a fully optimized, and secure environment. The resulting framework will be tailored to your organization’s specific business and compliance needs, as every enterprise is different. This guide will introduce you to the components of this necessary Azure Foundational Governance Design.
Tags : 
    
Ahead
Published By: Mimecast     Published Date: Feb 07, 2018
Is your healthcare organization part of the 90% that conducts annual cybersecurity assessments?* Do you wonder where your IT peers are headed with their cybersecurity plans and how they prioritize their initiatives? Recent HIMSS survey results reveal these insights and more, plus the 5 steps to improve your email security’s prognosis. This E-book contains startling facts and important cybersecurity insights every healthcare IT security leader needs to know. *HIMSS Analytics survey conducted on behalf of Mimecast, December 2017
Tags : 
himss, email security, email, healthcare, cybersecurity
    
Mimecast
Published By: HP - Enterprise     Published Date: Jan 24, 2013
Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world that’s evolving faster than ever before. Read this dossier to find out more.
Tags : 
consumerization, byod, risk management, security
    
HP - Enterprise
Published By: CareCloud     Published Date: Jan 21, 2015
In this on-demand webinar, presenters will go in depth to explain and examine the ROI of EHR.
Tags : 
carecloud, maximize ehr profitability, physicians and new ehrs, beware of workflows, security needs, mu workflow, mu reports, patient engagement, patient portal, webinar
    
CareCloud
Published By: Tripp Lite     Published Date: Jun 28, 2018
When you’re designing a data center, server room or network closet, deciding which racks to deploy and how to configure them should be at the top of your list. Just like building a house, the surface details may steal the spotlight, but it’s the quality of the underlying foundation that makes the difference between success and frustration. Racks organize IT equipment, such as servers and network switches, into standardized assemblies that make efficient use of space and other resources. Depending on the options you choose, they can also improve power protection, cooling, cable management, device management, physical security, mobility, ease of installation and protection from harsh environmental conditions. Choosing the right racks and configuring them to match your needs will ensure that your IT equipment operates reliably and efficiently, saving your organization from costly downtime and other needless expenses.
Tags : 
    
Tripp Lite
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn how IT pros should be able to leverage essential cloud services while meeting enterprise security requirements by taking into consideration a number of fundamental security principles and best practices, by understanding the specific security needs of an enterprise and evaluating different cloud environments and models, and by asking vendors the right questions
Tags : 
enterprise it, cloud deployments, cloud platorms, public cloud, private cloud, hybrid cloud, saas, iaas, security
    
AT&T
Published By: VMware     Published Date: Sep 06, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
vmware, vmware horizon, mobile, cloud
    
VMware
Published By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : 
security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber, ciso, experts, ebook
    
Tenable
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: