business security

Results 451 - 475 of 1109Sort Results By: Published Date | Title | Company Name
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
business mobility, efficiency, productivity, data security, employee satisfaction
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
data security, business mobility, efficiency, employee satisfaction, productivity
    
Citrix ShareFile
Published By: Extreme Networks     Published Date: Sep 17, 2014
In this eBook, we will demonstrate specific use cases for how a business intelligence solution can be used effectively by IT operations.
Tags : 
extreme networks, purview, application analytics, wifi/wireless, network solutions, business intelligence solutions, business intelligence, it operations, it management, data mining, networking, network technology, network optimization, business analytics, application, application security
    
Extreme Networks
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS
Published By: HP - Enterprise     Published Date: Nov 19, 2008
With an extensive background in police, military, government, and industry security, Howard Schmidt explains how to respond to the changing landscape of cyber threats and how business leaders are helping set the standards for application security. He then profiles industry role models who are setting the standard for application security.
Tags : 
howard schmidt, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks, rto, rpo, recovery time objective, recovery point objective, tape, lan, san, das, direct attached storage, rdx, d2d, disk to disk
    
HP
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : 
soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr, network storage, file sharing, cloud file sharing, hybrid cloud, mobile file sharing, efss, it management, hybrid it, sync and share, vpn access
    
Soonr
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
In this era of digital disruption, businesses must be more agile to capture opportunities. Many viewed cloud computing technology as the way to do this, promising to address agility, scalability, and cost. But in moving to the cloud, many found that its security, compliance, and performance did not fully meet their needs. Additionally, previous common thought was public cloud is less expensive than private cloud. We now know that is not true in all cases. Savvy businesses realise hybrid IT, which includes both offpremises and on-premises services, enables better agility. After initial experience with public cloud offerings, businesses learned that many workloads are best hosted onpremises, primarily due to security, compliance, performance, control, and cost issues.
Tags : 
    
Hewlett Packard Enterprise
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand how HCI can • Provide the resilience, scalability and performance to
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. When it takes 23 days on average to recover from a ransomware attack1, find out why I.T. security is the most important thing, period. Download our solutions guide > 1 IBM: 2017 Global CODB Report Final (
Tags : 
    
Lenovo UK
Published By: ProfitBricks     Published Date: Apr 01, 2013
The value of conventional on-premises servers is eroding. As with all decay, it starts slowly and declines steadily. Bits and pieces of the physical server market are peeling off as businesses turn away from conventional data center and IT closet deployments in favor of cloud-based infrastructure-as-a-service (IaaS). And there’s no shortage of IaaS; hosting and service-provider companies are flooding the market with low-cost access to hosted servers. The challenge for adopting businesses is leveraging hosted assets that guarantee data security and integrity with fine-grained levels of adjustable capacity, high performance and price predictability.
Tags : 
iaas, solution, cloud-based
    
ProfitBricks
Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance
    
IBM
Published By: IBM Corporation     Published Date: Jun 30, 2011
This menu interface provides a high-level overview, product demonstrations, expert interviews, and resource links for the IBM Data Center Automation solution.
Tags : 
automation, launchpad, ibm, isms, ibm data center, data recovery, wireless internet, business intelligence, 802.11, wi-fi, authentication, vulnerability, san, nas, crm, erp, wireless security, wireless lan, communications software, converged networks
    
IBM Corporation
Published By: IBM     Published Date: Jun 16, 2015
This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.
Tags : 
data center, mobility, software defined environment, service optimization, business solutions, data center security, compliance, automating protective measures, virtualization
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : 
identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security, threats, vulnerabilities, silo data, business processes, business users, security, swg
    
IBM
Published By: IBM     Published Date: Jul 05, 2018
IBM® Information Governance Catalog helps you understand your information and foster collaboration between business and IT by establishing a common business vocabulary on the front end, and managing data lineage on the back end. By leveraging the comprehensive capabilities in Information Governance Catalog, you are better able to align IT with your business goals. Information Governance Catalog helps organizations build and maintain a strong data governance and stewardship program that can turn data into trusted information. This trusted information can be leveraged in various information integration and governance projects, including big data integration, master data management (MDM), lifecycle management, and security and privacy initiatives. In addition, Information Governance Catalog allows business users to play an active role in information-centric projects and to collaborate with their IT teams without the need for technical training. This level of governance and collaboration c
Tags : 
    
IBM
Published By: Group M_IBM Q3'19     Published Date: Sep 04, 2019
In the last few years we have seen a rapid evolution of data. The need to embrace the growing volume, velocity and variety of data from new technologies such as Artificial Intelligence (AI) and Internet of Things (IoT) has been accelerated. The ability to explore, store, and manage your data and therefore drive new levels of analytics and decision-making can make the difference between being an industry leader and being left behind by the competition. The solution you choose must be able to: • Harness exponential data growth as well as semistructured and unstructured data • Aggregate disparate data across your organization, whether on-premises or in the cloud • Support the analytics needs of your data scientists, line of business owners and developers • Minimize difficulties in developing and deploying even the most advanced analytics workloads • Provide the flexibility and elasticity of a cloud option but be housed in your data center for optimal security and compliance
Tags : 
    
Group M_IBM Q3'19
Published By: IBM     Published Date: Oct 10, 2013
IBM MobileFirst is designed to enable organizations turn their interactions into an opportunity to drive return on engagement and investment. IBM combines deep industry expertise with mobile, analytics, cloud, social and security technologies. This can help enterprises capture new markets, efficiently extend their businesses to mobile employees, customers and business partners and maintain the integrity of their assets.
Tags : 
ibm, mobilefirst, business in motion, mobile enterprise, user interactions, return on engagement, return on investment, roi, capture new markets, security technologies, mobile employees, customers, business partners, mobility importance, maintaining relationships, business integrity, employee integrity
    
IBM
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.