icr

Results 251 - 275 of 1701Sort Results By: Published Date | Title | Company Name
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.
Tags : 
endpoint security, security policy, mobile devices, networking, security, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, its critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
security, software development, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : 
cloud security, virtualization security, virtualization, data center, security, it management, wireless, knowledge management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.
Tags : 
security, virtualization, cloud computing, trend micro, it management, wireless
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions cant keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter todays evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : 
user protection, security, cloud, endpoint, application, network, networking, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : 
custom defense, security threats, enterprise networks, intellectual property, networking, security, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
networking, security, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology, networking, security, it management
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Dont be that guy. The one who downloads every app he sees. You wouldnt order a dish in a restaurant without knowing whats inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : 
mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices, networking, security, wireless
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro Worry-Free Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : 
security solution, cyber attack, mobile devices, business security, user protection, networking, security, it management, wireless
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Aug 04, 2015
This is a whitepaper about enhancing your IT Security with an integrated solution.
Tags : 
threat defense, integrated solution, enterprise, attacks, defense, benefits, antivirus, signature-based
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Aug 04, 2015
This is a whitepaper about how organizations are constantly under attack from increasingly advanced cyber adversaries.
Tags : 
ecosystem, cyber attack, antivirus, security, single vendor, endpoint, digital, web, holistic, email systems, hosted service
    
CDW-Trend Micro
Published By: Central Desktop     Published Date: Aug 05, 2011
Central Desktop is the ideal collaboration software for technology companies looking for a secure, powerful solution that will reduce costs, enhance team collaboration and improve project management. It helps IT directors and teams keep documentation up-to-date, share files, manage versions, and keep internal business units from using unapproved, non secure services for sharing documents online and internally. >>>Register to learn more
Tags : 
social collaboration, online collaboration, collaboration software, team collaboration, sharepoint alternative, project collaboration, online team collaboration, online project management, it collaboration, it project management, microsoft sharepoint, internet security, network security appliance, security management, single sign on, analytical applications, business intelligence, configuration management, data integration, collaboration
    
Central Desktop
Published By: Centrify     Published Date: Sep 08, 2015
Adding Macs to a Microsoft-based corporate network can be a challenge. This paper will explore how Centrify can quickly and easily provide the necessary tools to allow Macs to be managed in the same way PCs are managed today.
Tags : 
device management, security management, mobility, application security, management solutions, anti spyware, identity management
    
Centrify
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, sox, sarbanes-oxley, hipaa, glba, pci, cross-platform, auditing, logging, security, rbac, entitlements, privilege management
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : 
centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption, encryption, internet security, security management, database security, information management
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Nov 12, 2014
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems along with 450 other versions of Linux and Unix by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
Tags : 
security, management, integration, it benefits, configuration, enterprise applications
    
Centrify Corporation
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in todays software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises cant risk security slowing this down.
Tags : 
    
CheckMarx
Published By: ChoiceStream     Published Date: Jan 08, 2009
Assure your online store not only survives but thrives in these challenging economic times.  Download “Increasing Revenue with Micro-Targeted Product Recommendations” by ChoiceStream - the premier personalization service provider.  Learn how personalized product recommendations can increase purchases, revenue and customer loyalty for your online store.
Tags : 
choicestream, ecommerce, roi, choicestream realrelevance, online shopping, emarketer
    
ChoiceStream
Published By: Cisco     Published Date: Jan 05, 2015
The discussion spotlights the innovative FlexPod for Microsoft Private Cloud. Details include: What to expect on your journey and what you shouldn't overlook How to make organizations truly agile and opportunistic in today's market What organizations fail to consider and how it will affect them even after deployment
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.