Share us:
 

business security

Results 226 - 250 of 888Sort Results By: Published Date | Title | Company Name
Published By: Jamf     Published Date: Mar 20, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Every day more businesses are using the cloud to get work done. And for good reason. With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses— just like yours—to get work done from any device, any time. Read this eye-opening e-book to find out: Why 79% of businesses trust the cloud How business-class cloud services use high-level encryption tech to protect every file and document Why 79% of IT pros say it’s people, not technology, that cause security gaps.
Tags : 
cloud, cloud security, encryption, security, mobility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses similar to yours to get work done from any device, any time. Download this e-Book to find out: What benefits 85% of businesses get from relying on the cloud How business-class cloud services use encryption to protect your data Why 79% of IT pros say it’s people, not technology, that cause security gaps
Tags : 
cloud security, data encryption, data security, mobility, efficiency
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
business mobility, efficiency, productivity, data security, employee satisfaction
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
data security, business mobility, efficiency, employee satisfaction, productivity
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
Published By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
What does high growth mean to your business? Ask your business peers that question and there will be critical elements and key priorities in common: the need for speed and efficiency, a future-proof technology strategy, and high-performance network connectivity, just to name a few. Of course, reliability, scalability, and security will also come up as indispensable aspects of any high-growth solution. This guide gives you an overview of the steps you need to build a foundation for sustainable growth -- the kinds of investments, drivers, and differentiators that are involved.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
Catskill Hudson Bank has grown from its roots as a community bank serving Sullivan County, NY to providing services to business customers across five counties by merging small-town customer service with "a big-bank technology backbone." As a result of this growth and to better respond to today's business customers, the bank needed better connectivity, reliability, and functionality than its existing network could provide. Read this case study to learn how Catskill Hudson Bank can push over 30 time more data over its network than before with better reliability, speed, and security.
Tags : 
    
Spectrum Enterprise
Published By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
    
Zingbox
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
Don't let the risk or cost of ransomware storm your organization's castle. it will wreak havoc on your valuable data and impact business continuity. Instead, employ a multi-layer security strategy that not only includes anti-malware, firewall, and hard disk and file encryption, but also data loss prevention technology and standards- based data protection. Each are critical to mitigate cyber security risks and protect vital information so you can avoid business disruption without ever paying a king's ransom.
Tags : 
ransomeware, organization, data, business optimization technology, it protection, commvault
    
Commvault ABM Oct
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The key challenge is how to “go digital” in the right ways. For most companies, it will be an incremental journey. BusinessNewsDaily.com notes that CIOs and business-minded technology leaders are moving beyond being supportive functions and into being an integrated part of overall business strategy and operations. IT is delivering added value, enhanced business performance, and greater security. This best practices paper outlines eight important ways that IT teams can make meaningful progress in their digital transformations."
Tags : 
digital, practices, professional, technology, esignature, docusign
    
DocuSign UK
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : 
cloud, aws, security, organizations, visibility, control, networks, platforms
    
Amazon Web Services
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Cloud Direct     Published Date: Jan 17, 2018
Senior leaders realise the stakes of not addressing digital transformation. PWC suggests that CEOs who aren’t prioritising digital are either changing their minds or being phased out. If you compare PWC’s 2007 Digital IQ report to 2016’s, you’ll see that the number of executives who said their CEO was a champion for digital has more than doubled from 33% to 68%. Digital transformation doesn’t have to be intimidating or complicated. If you take it in stages and work with an experienced partner, it can be a straightforward journey. At this stage, it’s all about transforming how people work.
Tags : 
cloud, business, communication, mobile, collaborating, security
    
Cloud Direct
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection, internet security, intrusion detection, intrusion prevention, security management, web service security, vulnerability management
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, web service security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, email security, internet security, intrusion detection, intrusion prevention, web service security
    
Symantec
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users, primary motivator, secondary motivator, implementing iam, security goals, regional perceptions, it management, cloud resource, enforcement, iam adoption, deploy iam, access control, application security
    
CA Technologies
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2018  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service