Skip to main content
 

enterprise security

Results 326 - 350 of 1006Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : 
arbor, ddos, protection, enterprise, data security
    
ArborNetworks
Published By: MuleSoft     Published Date: Apr 13, 2016
New Enterprise challenge has emerged. With the number of APIs growing rapidly, managing them one-off or via Excel or corporate wiki is no longer feasible. The smartest organizations have discovered a set of best practices to design powerful APIs that leverage existing services, to effectively manage those APIs throughout their lifecycle and to scale their deployment across consumers and devices. This eBook examines the relationship between APIs and services and presents the key elements of a successful API strategy in the form of 7 habits. In this eBook you will learn: - How to leverage existing services in the API economy - Where to get started with your API strategy - Key criteria for selecting an API Management solution - Strategies to overcome API security and identity challenges - How and why to apply the fundamentals of API First Design
Tags : 
service management, enterprise applications, best practices, business management, business strategy
    
MuleSoft
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, mobile, hybrid, buyer's guide, mobile applications, mobile application platforms
    
IBM
Published By: IBM     Published Date: Jul 27, 2016
IBM i2 Enterprise Insight Analysis helps analysts and investigators turn large data sets into comprehensive intelligence, in near real-time. With the help of advanced analytics and visual analysis capabilities, analysts can uncover hidden connections, patterns and trends buried in disparate data. Equip analysts and those on the front line with the tools they need to generate actionable intelligence, with mission critical speed.
Tags : 
ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence
    
IBM
Published By: IBM     Published Date: Jul 27, 2016
Learn how to counter and mitigate more attacks with cyber threat analysis.
Tags : 
ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence
    
IBM
Published By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 07, 2018
Enterprises seeking the security and performance capabilities of establishing their own private network are often turned away by the high cost and technical expertise required. AT&T NetBond® for Cloud helps establish private, dynamic connectivity from on-premises data centers to Amazon Web Services (AWS) in as little as 2-3 days. Aira, a customer focused on augmented reality, has leveraged the global connectivity capabilities of AT&T NetBond® to connect low vision or blind smart glasses users with a network of agents to guide the visually impaired through everyday tasks such as interpreting prescriptions. Download this case study with AT&T, Aira, and AWS to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
    
AWS
Published By: Genesys     Published Date: Feb 22, 2018
Move to the Cloud with Confidence If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: • The size of your contact center, and business requirements such as customer journey management • The location and quantity of contact centers being managed • The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
contact center, cloud, ebook, customer journey
    
Genesys
Published By: IBM     Published Date: May 09, 2017
This eBook takes you on a journey to outthink content chaos and discover how your industry can gain real value from your business content. Read how industry leaders are reflecting on the important challenges they face, and how they are finding innovative ways to collaborate and extract value from all forms of content to outpace those obstacles. Learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it, improving business performance and ROI.
Tags : 
enterprise management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: Jun 08, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, linux, windows, telecommunications, healthcare, oracle database
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, enterprise data, windows, linux, telecommunications, healthcare, consumer banking
    
IBM
Published By: IBM     Published Date: Sep 28, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, enterprise database, oltp, telecommunications, healthcare, consumer banking
    
IBM
Published By: CrowdStrike     Published Date: Feb 05, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries,investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence, Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security pos
Tags : 
    
CrowdStrike
Published By: Datastax     Published Date: Aug 23, 2017
Banks deal with mountains of data and complex transactions that far too often don’t capitalize on the power of an always-on, real-time data management platform to provide both financial insights and peace of mind. Today’s cloud applications require a new, far more holistic approach to data management and data protection. This eBook explains why the scalability, 100% availability, enterprise-grade security, and real-time insights of DataStax Enterprise are essential for banking in the modern world.
Tags : 
transactions, modernizing, financial insights, data management
    
Datastax
Published By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Wave: Translytical Data Platforms, Q4 2017 report reviews companies that offer “translytical data platforms”, which Forrester defines as an “emerging technology” that delivers “faster access to business data to support various workloads and use cases.” Download the report if you want to learn: -Why Forrester named DataStax a leader among 12 companies it identifies as “the most significant translytical vendors. -What constitutes a “translytical data platform” and why translytical data platforms are so critical for enterprise data strategies today. Why performance, scale, security, and use-case support are the key differentiators."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : 
hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
    
Druva
Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec
Published By: Symantec     Published Date: Dec 13, 2017
Enterprise’s are increasingly under threat from sophisticated attacks. In fact, research has found that threats dwell in a customer’s environment an average of 190 days1. These Advanced Persistent Threats use stealthy techniques to evade detection and bypass traditional security defenses. Once an advanced attack gains access to a customer environment the attacker has many tools to evade detection and begin to exploit valuable resources and data. Security teams face multiple challenges when attempting to detect and fully expose the extent of an advanced attack including manual searches through large and disparate data sources, lack of visibility into critical control points, alert fatigue from false positives, and difficulty identifying and fixing impacted endpoints.
Tags : 
investigation, exposure, attacks, endpoints, network, email, cloud, security, symantec
    
Symantec
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
Innovative Identity and Access Management That Actually Makes Life Easier Empower employees, customers and partners with secure access to cloud and company apps on any device. Transform your enterprise security and centralize control of users and apps. OneLogin’s cloud identity management platform provides secure single sign-on, multi-factor authentication, directory integration with AD, LDAP and other external directories, user provisioning, endpoint management and more.
Tags : 
    
OneLogin
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.