security

Results 7476 - 7500 of 7526Sort Results By: Published Date | Title | Company Name
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Your guide to security. Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Sep 27, 2019
Your patients demand excellent quality care. With single patient ID, medical grade hygiene and robust data security from Lenovo, you can offer them the very best outcomes.
Tags : 
    
Lenovo - APAC
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
The average company uses more than 50 security vendors. Firewalls, Web proxies, SIEM, Appliances & Third-party intelligence. The list goes on — and sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control. Check out these 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Not all cloud security solutions are created equal. You’ll want to look for a solution that meets the needs of today’s mobile, cloud-connected workforce, and is easy to manage on a day-to-day basis.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common security pitfalls that put your users, their devices, and your data at risk.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Some solutions promise to check all the boxes on network security. But it turns out, they’re checking all the wrong ones. Experiencing these frustrations? Cisco Umbrella can help.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isn’t efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common security pitfalls that put your users, their devices, and your data at risk.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. To find out more on how Cisco can help with these challenges download this white paper today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Lenovo UK     Published Date: Oct 15, 2018
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Lenovo UK
Published By: Oracle Linux     Published Date: Oct 24, 2018
Learn how customers are improving security, reducing downtime, simplifying operations, and saving money by switching to Oracle Linux support.
Tags : 
    
Oracle Linux
Published By: Zscaler     Published Date: Jun 19, 2019
Zscaler enables you to shift from a hub-and-spoke architecture to an agile, direct-to-internet architecture by delivering the entire gateway security stack as a service. Take the first step in your transformation journey with Zscaler.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
The purpose of this document is to provide security guidance for routing traffic locally from your branch office locations to enable direct access to the internet and cloud applications. We will outline the five requirements for architecting the ideal solution. But first, let’s discuss why secure local internet breakouts have become necessary.
Tags : 
    
Zscaler
Published By: Group M_IBM Q119     Published Date: Jan 17, 2019
Today, financial service companies are embracing hybrid cloud and its advantages, such as the ease of shifting production workloads and secure applications to public cloud environments. But, what is challenging is the complex regulatory landscape. 20,000 new regulatory requirements were created in 2016 alone. How can security pros ensure that controls for identity management, authentication and encryption work in both private and public clouds? Download this report for a closer look at the complexity of hybrid cloud security and 10 essential elements for compliant business operation.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Jan 22, 2019
In an age of constant cyber threat, security for financial services firms must go beyond playing defense. Experts from IBM and the Federal Reserve explain what a culture of Digital Trust looks like and how to build it.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q3'19     Published Date: Aug 26, 2019
Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company’s critical data and information and communicating data risk to senior business executives. Read this report to gain a better understanding of: ? Who is most accountable to external parties following a data breach ? The importance for business executives to have visibility into data security metrics ? How to overcome challenges to equip business executives with data security information ? When executive level security tools can improve business executives ability to proactively manage data risk
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper ""Six Steps for Building a Robust Incident Response Function"" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. The Securosis report on “The Future of Security Operations” explains how security orchestration and automation can help security teams address the skills shortage, alert overload, and increasingly sophisticated cyberattacks.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
The “Future of Identity” infographic provides highlights and surprising statistics from the "Future of Identity" study that revealed global and generational preferences and concerns on emergent sign-on methods. 3,997 respondents from the United States, European Union, and Asia Pacific regions weighed in.
Tags : 
    
Group M_IBM Q4'19
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: UPS Capital     Published Date: Feb 13, 2019
Transportation risk comes in many forms and can be very hard, if not impossible, to predict. These include extreme weather, theft, hijacked trailers, global crises, cargo lost at sea, catastrophic truck or rail accidents, truck fires and a whole lot more. In 2014, the University of Tennessee Global Supply Chain Institute published a white paper titled Managing Risk in the Global Supply Chain. The most surprising finding in the research was that even though 100% of supply chain executives acknowledged insurance as a highly effective risk mitigation tool, it was simply not on their radar screen, nor in their purview. Yet, the National Cargo Security Council estimates that there is an annual global financial impact from cargo loss of $50 billion.
Tags : 
    
UPS Capital
Published By: Gigamon     Published Date: May 23, 2019
A new report from Gigamon ATR helps security practitioners understand how Emotet, LokiBot and TrickBot traversed enterprise networks without detection in 2018. It particularly focuses on the malwares’ command and control (C2) and lateral movement, as these behaviors expose opportunities to observe network traffic, discover these threats and reduce risk. The goal: shorter mean time to detection and response, a more mature security program and a balanced approach to mitigating risk.
Tags : 
    
Gigamon
Start   Previous    288 289 290 291 292 293 294 295 296 297 298 299 300 301 302    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.