security solution

Results 1 - 25 of 1018Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Construction BUSINESS CHALLENGE Proactively prevent business disruption as a result of cyberattacks IT ENVIRONMENT Kaspersky antivirus, layered enterprise security SOLUTION Malwarebytes Endpoint Protection RESULTS Detected and eliminated thousands of threats that other solutions missed Delivered visibility into entire installed base of endpoints, regardless of location Saved time and accelerated response via the cloud console Prevented PUPs and exploits from gaining entry
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
    
MalwareBytes EMEA
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking, email marketing services/software
    
StrongMail
Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring
    
Astaro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.