data security

Results 276 - 300 of 1819Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
     Proofpoint
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: Gigamon EMEA     Published Date: Feb 20, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
     Gigamon EMEA
By: Gigamon EMEA     Published Date: Feb 20, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
     Gigamon EMEA
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall, business technology
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Oct 19, 2012
Because of its location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both function and finance. This paper explores elements to evaluate, like network performance, and security.
Tags : application delivery controller, load balancer, load balancing, adc, application delivery, application availability, application security, application scalability, application access, data management, business technology, data center
     F5 Networks Inc
By: Macquarie Telecom     Published Date: Jan 11, 2011
How a web hosting provider can help relieve the pressure of managing your online presence.
Tags : macquarie telecom, website hosting provider, outsourcing services, data centre, dedicated server, bandwidth performance, security, telecommunication
     Macquarie Telecom
By: TriNet     Published Date: Jul 28, 2015
The future of HR lies in technological advances and implementation for businesses of all sizes.
Tags : hr technology, hr data, technology providers, hr trends, mobility, cloud data security, hr terminology, business performance management, hr cloud, single-source outsourcing, in-house customization, licensing, multiple vendors
     TriNet
By: LogLogic     Published Date: Mar 15, 2012
"Big Data" is the latest buzzword, yet over 70% of companies don't know what Big Data means and how to solve the data management challenges, finds LogLogic survey.
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
     LogLogic
By: LogLogic     Published Date: Mar 15, 2012
IANS CUSTOM RESEARCH AND INFORMATION SECURITY INVESTMENT ANALYSIS (ISIA) REPORT on Log data management and compliance products
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
     LogLogic
By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
     LogLogic
By: Teradata     Published Date: Jan 30, 2015
It is hard for data and IT architects to understand what workloads should move, how to coordinate data movement and processing between systems, and how to integrate those systems to provide a broader and more flexible data platform. To better understand these topics, it is helpful to first understand what Hadoop and data warehouses were designed for and what uses were not originally intended as part of the design.
Tags : teradata, data, big, data, analytics. insights, solutions, business opportunities, challenges, technology, framework, apache, hadoop, architecture, warehouse, optimization, security, scalability, consistency, flexibility, data management
     Teradata
By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security, knowledge management, data management, business technology, data center
     Symantec
By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring, security threats
     Viavi Solutions
By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
     Viavi Solutions
By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
     MobileIron
By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
     MobileIron
By: NetApp     Published Date: Nov 13, 2017
Your MS Office 365 data might not be as safe as think. Read the ebook and learn about the 4 steps to improve the security of your MS Office 365 data.
Tags : 
     NetApp
By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
     MobileIron
By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
     MobileIron
By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
     MobileIron
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com