secure it

Results 1 - 25 of 1339Sort Results By: Published Date | Title | Company Name
By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
     MalwareBytes EMEA
By: Gigamon EMEA     Published Date: Apr 10, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon reduces false positives by 70%, decreases the cost of security personnel by 50%, eliminates redundant systems and tools and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can secure business, enable new ideas and facilitate growth. And, see why ESG believes the Gigamon Visibility Platform is a critical tool for success in today’s digital age.
Tags : 
     Gigamon EMEA
By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
     CheckMarx
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
     Group M_IBM Q2'19
By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network — balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network — balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network — balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network
Tags : 
     Forcepoint
By: Motorola Solutions     Published Date: Apr 26, 2019
Healthcare organizations have the ultimate responsibility: caring for human lives. Your teams work every day to make sure the patients in your organization receive the best care and achieve patient satisfaction in a non-stop and unpredictable environment. Your facility faces security challenges unlike any other enterprise. Patients, visitors and staff coming and going 24x7. Valuable assets like pharmaceuticals and medical equipment to be secured and monitored. Patients to be cared for and protected.
Tags : 
     Motorola Solutions
By: Motorola Solutions     Published Date: Apr 26, 2019
The Transportation and Logistics industry is the backbone of the global supply chain. But as Transportation and Logistics companies work to ensure timely delivery, they also face a variety of security risks and challenges.
Tags : 
     Motorola Solutions
By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world.  Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Feb 14, 2019
"As work moves beyond walls, you need a new security framework that enables more flexibility, productivity, and innovation, not less. Citrix offers a comprehensive security approach that delivers the secure contextual access you need to provide an enhanced user experience while you maintain control. Get this brief to explore how Citrix can help you: - Put the right controls in place to secure SaaS and Internet access - Use a single solution to deliver an integrated experience for end-users and admins alike - Consolidate multiple and disparate access solutions into one"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Feb 14, 2019
"Security threats come in a variety of different forms — from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: - Why a holistic security approach is crucial - What a new security approach looks like - How Citrix solutions provide security across your entire stack"
Tags : 
     Citrix Systems
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
     Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
     ASG Software Solutions
By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
     Good Technology
By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
     Evatronix
By: Imperial Metals     Published Date: Nov 24, 2009
Precious metals like Gold and Silver can help you secure your future and meet long-term investing goals. In the last decade, Gold prices rose by an average of 40% per year! Our free IRA guide will show you how easy it is to invest in precious metals
Tags : imperial metals, ira, gold, silver, precious metals, 401k, equities
     Imperial Metals
By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
     Entrust Datacard
By: Dell PC Lifecycle     Published Date: Aug 02, 2018
Finding a balance between providing employees with mobility and diversity, and ensuring enterprise IT remains secure and cost effective, can be difficult for businesses to achieve. With 53% of IT leaders struggling to keep up with the increasing diversity of devices, organizations need a solution that can help them overcome these challenges. This webinar discusses how Dell PC Lifecyle family of solutions can streamline the needs of the workforce and satisfy a business’ IT requirements. Learn more about Dell solutions powered by Intel®
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: Aug 02, 2018
Finding a balance between providing employees with mobility and diversity, and ensuring enterprise IT remains secure and cost effective, can be difficult for businesses to achieve. With 53% of IT leaders struggling to keep up with the increasing diversity of devices, organizations need a solution that can help them overcome these challenges. This webinar discusses how Dell PC Lifecyle family of solutions can streamline the needs of the workforce and satisfy a business’ IT requirements. Learn more about Dell solutions powered by Intel®
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: Aug 02, 2018
Finding a balance between providing employees with mobility and diversity, and ensuring enterprise IT remains secure and cost effective, can be difficult for businesses to achieve. With 53% of IT leaders struggling to keep up with the increasing diversity of devices, organizations need a solution that can help them overcome these challenges. This webinar discusses how Dell PC Lifecyle family of solutions can streamline the needs of the workforce and satisfy a business’ IT requirements. Learn more about Dell solutions powered by Intel®
Tags : 
     Dell PC Lifecycle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com