secure computing

Results 1 - 25 of 45Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Aug 18, 2016
This infographic shows how to deliver secure cloud computing with Oracle Solaris and SPARC M7 software in Silicon technology.
Tags : 
    
Oracle
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing
    
Secure Computing
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication, encryption, data integrity, extended validation
    
VeriSign, Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Read this white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
best, practices, applications, tls, ssl, secure, business computing, transport layer security, secure sockets layer
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Symantec     Published Date: Jan 04, 2012
Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Tags : 
verisign, cloud hosting provider, ssl certificates, secure sockets layer, cloud computing, data recovery, business continuity, data access, authentication, encryption
    
VeriSign, Inc.
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Lenovo and Microsoft     Published Date: Aug 13, 2013
The end of support date for Windows XP–April 8, 2014 is rapidly approaching, after which the potential for security vulnerabilities will dramatically increase. Companies with lots of Windows XP machines still in use need help upgrading in this compressed timeframe. Lenovo has an answer, as its Image Technology Center (ITC) services along with the Lenovo In-Place Migration (IPM) product can help internal IT staff quickly and successfully migrate from Windows XP to Windows 7 or Windows 8 with a minimum of disruption to users and the organization.
Tags : 
security, windows 8, windows xp, secure platform, enterprise computing, mdm, client virtualization software
    
Lenovo and Microsoft
Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance, california sb-1386, california state bill 1386, authentication, secure computing, securecomputing
    
Secure Computing
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing
    
Intralinks
Published By: Citrix Systems     Published Date: Jul 25, 2016
NetScaler MobileStream™ technology from Citrix enables enterprises to do more than simply get by when it comes to the performance and security of mobile workspaces. Building on the gains derived from the core set of NetScaler functionality, NetScaler MobileStream combines a suite of multi-layer optimizations purpose-built to accelerate mobile service delivery with an essential collection of secure access and threat protection capabilities for mobile computing. The result is a unified solution that not only provides the peace of mind IT needs but also delivers the exceptional mobile experience your employees, customers and partners deserve. Put another way, the result with NetScaler MobileStream is a dramatic improvement in mobile service performance and protection that makes Citrix NetScaler® the world’s fastest and most secure delivery platform for mobile workspaces.
Tags : 
    
Citrix Systems
Published By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : 
security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security, network security, secure computing, securecomputing
    
Secure Computing
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing
    
Secure Computing
Published By: Intel     Published Date: Aug 10, 2012
McAfee and Intel multilayer security solutions bring fresh innovation to endpoint protection to secure the future of computing and the Internet.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization
    
Intel
Published By: Sponsored by HP and Intel®     Published Date: Feb 02, 2012
This white paper sponsored by HP and Intel (circle R) separates fact from fiction, reality from myth, and, in doing so, will aide senior IT executives as they make decisions around cloud computing. While dispelling cloud computing myths, we will answer tough questions: How hard is it to adopt a private or hybrid cloud? How difficult is it to maintain and secure a cloud? How will the cloud transform my business? Do I have the right skill sets in place? What are some of my cost considerations? HP and Intel are committing extensive resources to helping customers with all of their questions and concerns around cloud computing.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends
    
Sponsored by HP and Intel®
Published By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware, secure computing, securecomputing
    
Secure Computing
Published By: CA Technologies     Published Date: Sep 13, 2017
"As the EU General Data Protection Regulation (GDPR) looms overhead, finding specific answers to these obvious questions, How do I best want to secure my data, and which kind of data? Which milestones along the development journey are most at risk?, you might also begin to ask the right questions about how to solve them, and with that, begin ticking the GDPR box for each and every task at hand. View this Computing Research report to understand why GDPR is a state of mind, not just a technology solution."
Tags : 
    
CA Technologies
Published By: HP     Published Date: Aug 26, 2014
SMBs need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT program for SMBs, HP Networking solutions are purpose-built for growing businesses. Learn what to look for in networking technology, and how HP can help you create a network that will keep pace with your business growth.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, robust, scalable, byod
    
HP
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security
    
Absolute Software
Published By: AWS     Published Date: Sep 05, 2018
Big data alone does not guarantee better business decisions. Often that data needs to be moved and transformed so Insight Platforms can discern useful business intelligence. To deliver those results faster than traditional Extract, Transform, and Load (ETL) technologies, use Matillion ETL for Amazon Redshift. This cloud- native ETL/ELT offering, built specifically for Amazon Redshift, simplifies the process of loading and transforming data and can help reduce your development time. This white paper will focus on approaches that can help you maximize your investment in Amazon Redshift. Learn how the scalable, cloud- native architecture and fast, secure integrations can benefit your organization, and discover ways this cost- effective solution is designed with cloud computing in mind. In addition, we will explore how Matillion ETL and Amazon Redshift make it possible for you to automate data transformation directly in the data warehouse to deliver analytics and business intelligence (BI
Tags : 
    
AWS
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Big data alone does not guarantee better business decisions. Often that data needs to be moved and transformed so Insight Platforms can discern useful business intelligence. To deliver those results faster than traditional Extract, Transform, and Load (ETL) technologies, use Matillion ETL for Amazon Redshift. This cloud- native ETL/ELT offering, built specifically for Amazon Redshift, simplifies the process of loading and transforming data and can help reduce your development time. This white paper will focus on approaches that can help you maximize your investment in Amazon Redshift. Learn how the scalable, cloud- native architecture and fast, secure integrations can benefit your organization, and discover ways this cost- effective solution is designed with cloud computing in mind. In addition, we will explore how Matillion ETL and Amazon Redshift make it possible for you to automate data transformation directly in the data warehouse to deliver analytics and business intelligence (BI
Tags : 
    
Amazon Web Services
Published By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : 
security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention, it management, phishing, secure computing, securecomputing
    
Secure Computing
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: