Skip to main content
 

enterprise security

Results 326 - 350 of 947Sort Results By: Published Date | Title | Company Name
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
The incredible reach of social media can be used to nurture business relationships and nourish invaluable customer relationships. But without an enterprise-wide security strategy, your organization is susceptible to a variety of internal and external threats, including account hijackings, malware and employee errors that can lead to brand and communication crises.
Tags : 
social media, social media management, enterprise, global, security, threats, permissions, hootsuite
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Download this simple, five-step guide now, to help your brand avoid security pitfalls. Ensure that your team takes the right steps to safely unleash the power of social media.
Tags : 
social media, social media management, enterprise, social media security, security, threats
    
uberVU via HootSuite
Published By: Symantec     Published Date: Oct 25, 2012
Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention and more.
Tags : 
symantec, security, threat detection, fud, malware
    
Symantec
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
The consumerization of IT is coming. It's a given that employees will bring their own devices to work or will want to work on devices away from the office. The adoption of smart devices has set expectations, causing the "I want my iPad" phenomena
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, it implementation
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Read this whitepaper—Give All the People What They Want (Safely)—to learn how you can give employees the freedom to choose their own mobile devices, while still providing rock-solid enterprise security.
Tags : 
bring your own device, byod security, byod management, byod challenges, byod strategy, emm, enterprise mobility
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobility—but they’re also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation
Published By: NetIQ     Published Date: Nov 05, 2012
The broad adoption of SIEM technology is driven by security and compliance needs. Targeted attack discovery requires effective user activity, data access and application activity monitoring. Vendors are testing demand for broader-scope solutions.
Tags : 
siem technology, threat management, security management, enterprise security, compliance
    
NetIQ
Published By: McAfee     Published Date: Sep 04, 2014
El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.
Tags : 
siem, almacenamiento de datos, análisis de datos, ataques, análisis forense, seguridad
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
De acordo com o SANS Institute, a maioria das organizações está usando dados sobre eventos de segurança para detectar e monitorar comportamentos suspeitos, auxiliar em análises periciais, bem como cumprir os requisitos regulamentares e comprovar essa conformidade. Porém, fica difícil atingir essas metas de segurança com o número cada vez maior e a natureza sofisticada dos ataques. À medida que a disputa entre a segurança e os hackers continua, a McAfee conta com os recursos de que as empresas precisam para manter seus dados seguros e identificar ataques e vulnerabilidades. De acordo com o SANS, a força do McAfee ESM vem da sua facilidade de uso, da velocidade e da flexibilidade na definição de regras e correlações.
Tags : 
siem, armazenamento de dados, análise de eventos, ataques, análise pericial, segurança
    
McAfee
Published By: Sonus     Published Date: Jun 07, 2013
SBCs for Increased Enterprise Voice Security and Resiliency
Tags : 
sonus, voice services, microsoft lync, voice security, secure voice service, ip networks, data network
    
Sonus
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Epicor     Published Date: Mar 05, 2018
If you’re a manufacturer and have questions about deploying your enterprise resource planning (ERP) system in the cloud, here’s your answer—it’s time to move. Cloud ERP solutions provide a number of benefits for manufacturers, and those who make the switch are seeing how simple, economic, and reliable this type of deployment can be. In this eBook, you’ll discover the top 10 reasons why Epicor customers are choosing to deploy their ERP in the cloud rather than on premises, including: • Economic benefits • Better use of IT resources • Greater security • Easier updates • Improved mobility and collaboration • Faster time to value Download the eBook to learn more about how cloud ERP from Epicor can help your manufacturing business.
Tags : 
    
Epicor
Published By: Epicor     Published Date: Aug 15, 2018
If you’re a manufacturer and have questions about deploying your enterprise resource planning (ERP) system in the cloud, here’s your answer—it’s time to move. Cloud ERP solutions provide a number of benefits for manufacturers, and those who make the switch are seeing how simple, economic, and reliable this type of deployment can be. In this eBook, you’ll discover the top 10 reasons why Epicor customers are choosing to deploy their ERP in the cloud rather than on premises, including: • Economic benefits • Better use of IT resources • Greater security • Easier updates • Improved mobility and collaboration • Faster time to value Download the eBook to learn more about how cloud ERP from Epicor can help your manufacturing business.
Tags : 
erp software, enterprise resource planning software, saas, cloud erp, epicor erp
    
Epicor
Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: MobileIron     Published Date: Feb 14, 2019
Google’s Android enterprise is fast tracking a more connected workforce, with multiple layers of security along with new innovative features, and comprehensive management. Despite the growing popularity of Android, few enterprises are leveraging the full benefits of Android mobility in their organization. In this webinar, we discuss simple best-practices for how Google’s Android enterprise can be securely leveraged in the enterprise with UEM.
Tags : 
    
MobileIron
Published By: Forrester Research     Published Date: Apr 27, 2015
Report | Recommendations for Enterprise Security in 2015
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Forrester Research
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Okta     Published Date: Feb 22, 2017
This white paper offers an overview of Okta’s solutions. Read it now and take one step closer to true enterprise security.
Tags : 
    
Okta
Published By: Okta     Published Date: Apr 17, 2017
In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.
Tags : 
    
Okta
Published By: Resilient Systems, Inc.     Published Date: Nov 25, 2015
How does your business’s cyber resilience compare to other European organisations?
Tags : 
resilient, incident response, enterprise, security, enterprise applications
    
Resilient Systems, Inc.
Published By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
    
Avi Networks
Published By: Staples Business Advantage     Published Date: May 24, 2016
Today, many enterprises are struggling to manage their printing environments to ensure efficiency, security, and control. This problem has created one of the fastest-growing trends in printing today: managed print services (MPS). While keeping data safe is a growing concern for all companies, MPS software has no access to the content being printed, faxed, or scanned. Read this white paper to learn how MPS helps to protect and control printed assets and can play a big role in ensuring sensitive documents don't end up in the wrong hands.
Tags : 
it security, managed print services, outsourced print services, print management, print costs
    
Staples Business Advantage
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.