saas security

Results 126 - 143 of 143Sort Results By: Published Date | Title | Company Name
By: MessageLabs     Published Date: Jul 02, 2009
Get to grips with hosted security: Hosted security? Managed security? Cloud security? SaaS? The latest hype, or the secret to hassle free IT Security? Understand how Hosted Security can save you time & money whilst delivering highly accurate threat protection. Download today!
Tags : messagelabs, security, it management, email security, web security, email archive, continuity, ‘software as a service’, data centers
     MessageLabs
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
     Ping Identity
By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security
     Symantec.cloud
By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will examine the information security needs of midmarket organizations, and how SaaS security services can help address those needs specific to a distributed workforce.
Tags : messagelabs symantec hosted services, saas, distributed workforce, information security, software-as-a-service, messaging
     Symantec.cloud
By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 28, 2011
This white paper discusses how SaaS can simplify IT management.
Tags : symantec.cloud, it security management, saas, risk prevention, security, software as a service
     Symantec.cloud
By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security
     Webroot
By: McAfee     Published Date: Apr 10, 2013
This report details Forrester's findings about how well each vendor fulfills the 47-criteria evaluation and where each vendor stands in relation to each other to help security and risk professionals select the right partner for their email content security solution.
Tags : email content security, email encryption, forrester wave, on premises, saas, email security management, mcafee email gateway, security, business technology
     McAfee
By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management, business technology
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks, business technology
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution thats incomplete, unsecure and requires manual intervention when what the business really needs is a complete, secure and automated solution?
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks, it management, knowledge management
     NETIQ
By: Globalscape     Published Date: Mar 21, 2014
Find out the answer and as well as the other deployment options.
Tags : globalscape, saas, managed file transfer, mft, deployment, deployment model, security, automation, mft solutions, file sharing, software development, it management, data management
     Globalscape
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
     VMware SD-WAN by VeloCloud
By: Palo Alto Networks     Published Date: Sep 30, 2016
The rapid adoption of SaaS-based applications in organizations today continues at a breakneck pace. These applications provide critical functionality and enable greater productivity, but at the same time introduce potential new security and data theft risks if not properly controlled.
Tags : palo alto, saas, security, shadow it, applications
     Palo Alto Networks
By: Workday Italy     Published Date: Sep 19, 2018
In todays IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: What real SaaS is and is not. How to distinguish between real SaaS vendors and imposters. The question of SaaS security. Potential cost savings your company could gain from SaaS solutions. If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
     Workday Italy
By: Workday Spain     Published Date: Sep 19, 2018
In todays IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: What real SaaS is and is not. How to distinguish between real SaaS vendors and imposters. The question of SaaS security. Potential cost savings your company could gain from SaaS solutions. If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
     Workday Spain
By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isnt efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
     Cisco Umbrella EMEA
Start   Previous    1 2 3 4 5 6     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com