Skip to main content
 

enterprise security

Results 901 - 925 of 1047Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat is a trusted partner to enterprise customers; cloud, software, and hardware suppliers; and the global open source community. A Red Hat® Enterprise Linux® subscription provides customers with direct access to innovation and advocacy—within the open source community and within a certified and trusted network of partners. Red Hat Enterprise Linux provides you with an innovative platform that serves as the foundation for your business. It is hardened, certified, and supported by the Red Hat Product Security team, support teams, and certified engineers. Red Hat supports your timelines and advocates for your requirements so you can focus on the work of your business rather than being your own operating system vendor. We use our leadership in the open source community to do the work that brings you the best of open source. Get direct access to: Technology-driven solutions Emerging technology Experience and support Continuous security Timeline support Download the whitepaper to lea
Tags : 
    
Red Hat
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: SilverSky     Published Date: Mar 26, 2014
In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.
Tags : 
silversky, exchange, cloud exchange, cloud, security, scalability, flexibility, hosted exchange, email security, cloud security
    
SilverSky
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
    
Cisco Umbrella EMEA
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security.
Tags : 
    
Dell PC Lifecycle
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
    
FICO
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing
    
Digital Realty
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
Intel Security
Published By: Evident.io     Published Date: Sep 13, 2017
Letting security slip for even a moment can be detrimental to your enterprise. Unfortunately, fast-moving and changing cloud environments don’t make things easier. To avoid making costly mistakes in the first place, everyone must do their part. With "The Six Essentials for DevOps Team Excellence," learn how DevOps teams can incorporate security and development and maintain agility.
Tags : 
    
Evident.io
Published By: Lookout     Published Date: Aug 28, 2017
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
mobile risk, mobile threat, mobile vulnerabilities, enterprise device, enterprise device security
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: F5 Networks Inc     Published Date: Jan 25, 2018
With digital transformation reshaping the modern enterprise, applications represent a new class of assets and an important source of differentiation. The ever-more-competitive digital economy requires that your applications be delivered with unprecedented speed, scale, and agility, which is why more and more organizations are turning to the cloud. This explosive growth of apps hosted in the cloud creates a world of opportunities—and a whole new set of challenges for organizations that must now deploy and manage a vast portfolio of applications in multi-cloud environments. Automation and orchestration systems can help streamline and standardize IT processes across traditional data centers, private clouds, and public clouds. But with rapid innovation come concerns about security and delivering a consistent experience across environments.
Tags : 
application delivery, digital transformation, cloud technology, application, multi-cloud enviornment
    
F5 Networks Inc
Published By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : 
dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
    
Dell
Published By: IBM     Published Date: Apr 04, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : 
ibm, mobile security, mobile security maturity, ismg
    
IBM
Published By: Intralinks     Published Date: Nov 23, 2015
Use this guide to clarify the process, and move toward the right solution.
Tags : 
enterprise, intralinks, collaboration, security, data
    
Intralinks
Published By: Intralinks     Published Date: Oct 14, 2015
A quick-reference guide to defining your organization’s collaboration needs – and finding the right vendor to meet them.
Tags : 
enterprise, intralinks, collaboration, security, data
    
Intralinks
Published By: MobileIron     Published Date: Feb 17, 2015
Learn the top 10 questions that CIOs should be asking about enterprise mobility and see how an effective mobile strategy will transform your business when data has no boundaries.
Tags : 
cios, enterprise mobility, mobileiron, security, mobile
    
MobileIron
Published By: Mimecast     Published Date: Oct 17, 2013
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.
Tags : 
mimecast, forrester research, unified email management, uem, economic impact, return on investment, roi, evaluate financial impact, reduce complexity, costs of managing email, email management, email infrastructure, email backup, replication cost avoidance, business continuity, legacy security solutions, productivity gains, email marketing
    
Mimecast
Start   Previous    28 29 30 31 32 33 34 35 36 37 38 39 40 41 42    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.