Skip to main content
 

safe

Results 926 - 950 of 969Sort Results By: Published Date | Title | Company Name
Published By: HireRight     Published Date: May 01, 2013
Volunteer organizations are in the business of helping--never harming. It is important to ensure your ambassadors are worthy of your trust, for your reputation and the safety of your communities could be at stake. Background screening is a key component in protecting your organization and community members. This industry brief outlines the risks that can result by not screening volunteers.
Tags : 
hireright, human resources, hr department, volunteers, organization
    
HireRight
Published By: HP and Intel ®     Published Date: May 06, 2013
This paper examines historical concerns about Linux virtualization, and assesses why, when, and how enterprises can safely virtualize their critical Linux workloads. We also review a Linux virtualization solution that meets enterprise needs -- the powerful combination of Red Hat Enterprise Virtualization and HP ProLiant Servers.
Tags : 
linux, virtualization, data center, research, enterprise
    
HP and Intel ®
Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands
    
IBM
Published By: Thawte     Published Date: Dec 29, 2015
Promote safer websites and help create a more secure web.
Tags : 
    
Thawte
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks
    
IBM
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Symantec     Published Date: Dec 04, 2014
With 93% of people doing at least some of their holiday-season shopping with online merchants, e-tailers of every kind need to get their websites in gear and ensure their customers feel confident shopping on their site. Whether it’s shopping online, in store pick-up, or even browsing and wish lists, customers are offering you an unprecedented amount of data and sales this season. But fail to keep your customers safe with good website security, and all you’ll get is a lump of coal in your stocking.
Tags : 
online merchants, e-tailers, holiday, holiday season, website security, shopping
    
Symantec
Published By: FireEye     Published Date: Feb 28, 2014
Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.
Tags : 
fireeye, gartner research, cyber attacks, security posture, system exploitation, advanced attacks, malware download, control established, data exfiltration, lateral movement, file shares, business monitoring, security monitoring, organizational safety
    
FireEye
Published By: HP     Published Date: May 14, 2014
In today’s world of explosive data volumes, midmarket companies face a growing number of challenges when it comes to safeguarding data, and today's approaches to backup and data protection are falling short. The Brief outlines HP solutions to meet IT needs for backup appliances that tightly integrate deduplication, data protection and recovery.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication
    
HP
Published By: Adobe     Published Date: Mar 03, 2017
Today, customer identity is the only constant in digital marketing. But as consumers switch from desktop to mobile, they are more and more difficult to recognize. But it’s not impossible. The Adobe white paper, Managing Anonymous and Authenticated Experiences Across the Customer Lifecycle, explains best practices to identify your anonymous and authenticated customers while complying with regulations, contracts, and industry standards. Read the paper to learn: • The benefits of well executed personalization • How to navigate the landscape between anonymous and authenticated data • Safe and effective uses of consumer information • The technological building blocks to put these new methods to work
Tags : 
personalization, authenticated data, anonymous data, consumer information, customer life cycle, customer experience
    
Adobe
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
McAfee
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360
Published By: Tyco Integrated Security     Published Date: May 05, 2015
Download this white paper to discover why many pharmaceutical companies are turning to proactive strategies to assess and respond to threats.
Tags : 
global supply chain, medication, security threats, product tampering, security goals
    
Tyco Integrated Security
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
This report provides details on the most common attack methods used by cyber-criminals, how they operate, and the technologies you need to stay safe.
Tags : 
mcafee, intel, security, cyber, criminal
    
Intel Security
Published By: Haws     Published Date: Apr 07, 2017
When a victim is in need of an eyewash or shower, a facility must already be prepared with a complete safety response environment. ANSI eyewash and shower compliance are standard measures to abide by, but is it enough for your employees? There are several best practices that can and should be implemented to exceed the standard expectations and guarantee a reliable safety response. This area that must exceed expectations by factoring for ease of use and victim comfort before, during, and after safety equipment usage.
Tags : 
    
Haws
Published By: Haws     Published Date: Apr 11, 2017
Laboratories of AgroFresh, a subsidiary of DOW AgroSciences and DOW Chemical, produces and applies organic compound products designed to control and lengthen the storage life of fruit, vegetables, flowers and plants. Exposure to potentially hazardous chemicals and gasses is an everyday part of the job. When the AgroFresh laboratory in Yakima, Washington, was in need of a new emergency eyewash, lab manager Robert A. Wolff began searching for a product that was economical in size, efficient and innovative – a leading product in safety with science driving its design. The faucet-mounted AXION® eyePOD® quickly stood out for its compact size, unobtrusive installation and science behind its outward-flushing technology.
Tags : 
    
Haws
Published By: Microsoft Office 365     Published Date: Mar 04, 2016
Discover how easy it is to mobilize, improve, and do more for your business when you download the free eBook: Anytime, anywhere – Learn more about how a mobile employee’s working style lead to less stress and increased productivity. Safety first – Learn about moving to cloud storage and how it can lift the burden of securing your data from your shoulders. Teamwork makes the dream work – Read more about syncing your information so your teams’ devices can enable them to stay agile and responsive.
Tags : 
    
Microsoft Office 365
Published By: Cloudroute     Published Date: Jun 01, 2016
Cloud computing has changed the way businesses and people think about using technology to serve their needs. Too many, cloud computing is nothing but hype and overblown as the new direction for Information Technology. But to many more, cloud computing represents the future of how every business should plan, operate and execute applications, systems and processes. Goldman Sachs forecasts spending on cloud computing infrastructure and platforms will grow at a 30% compound annual growth rate (CAGR) from 2013 through 2018 compared with 5 percent growth for overall enterprise IT. Moreover, Forrester recently revised its 2011 forecast of the public cloud market size upward by 20 percent. Regardless, it is important to know what cloud computing is.
Tags : 
    
Cloudroute
Published By: Panaya     Published Date: May 17, 2017
Avoid the top counterproductive UAT practices and gain user adoption. Read the eBook to simplify UAT and execute testing cycles faster and safer.
Tags : 
acceptance testing, uat testing, user acceptance testing, uat environment
    
Panaya
Published By: Citrix ShareFile     Published Date: Apr 12, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: 8x8 Inc.     Published Date: Nov 17, 2016
Effective quality management lets you improve the performance of contact center agents—and deliver the customer experience your business expects. The ICMI Tool Kit: Quality Management in the Contact Center provides valuable tips you can apply to start improving your contact center operations today. Developed by International Customer Management Institute (ICMI), a leader in contact center training and consulting, the tool kit lays out the foundations of an effective quality management program and offers a step-by-step approach to creating an effective program. Then it provides details to help you: • Perform effective coaching using the SAFE coaching framework • Calculate the ROI of your training and coaching investments • Developing a peer mentor program
Tags : 
    
8x8 Inc.
Published By: Cox Business     Published Date: Dec 19, 2016
Exposing data or suffering downtime not only creates risks to patient safety, supports identity theft and damages the hospital's reputation, but can also result in signi?cant HIPAA penalties. The costs include the time your staff spends responding to the attack and lost productivity when systems are unavailable or work needs to be redone. Investing in computer and network security is a smart ?nancial decision for hospitals.
Tags : 
    
Cox Business
Published By: Datastax     Published Date: Aug 03, 2018
When you think enterprise ecommerce in the Right-Now Economy, you need to know that it all starts with a distributed cloud database built for hybrid cloud. From Safeway to eBay to Macy’s to Sony, leading companies across industries use DataStax to power their ecommerce initiatives. Read this ebook for a look into exactly how they use us and the results they’ve achieved.
Tags : 
    
Datastax
Start   Previous    25 26 27 28 29 30 31 32 33 34 35 36 37 38 39    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.