online security

Results 51 - 75 of 171Sort Results By: Published Date | Title | Company Name
Published By: Symantec Corporation     Published Date: Mar 21, 2014
This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Web-based systems are essential tools for running business processes and delivering services to customers. However, phishing and online fraud undermine customer confidence. In addition, Web security remains a top concern because of constantly evolving threats. Learn more about mitigating these web security risks with SSL Certificates in this IDC Technology Spotlight white paper
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, it management
    
Symantec Corporation
Published By: hightail     Published Date: Jan 17, 2014
Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.
Tags : 
enterprise applications, data management, secure content management, content management
    
hightail
Published By: hightail     Published Date: Jan 17, 2014
Learn 3 essential values for securing the cloud and see how you can better prioritize security and improve your organization’s productivity.
Tags : 
knowledge management, data management, mobile computing, mobile data systems, application integration, application performance management, best practices, business integration, business intelligence
    
hightail
Published By: hightail     Published Date: Jan 17, 2014
Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.
Tags : 
data management, security management, mobile computing, mobile data systems, application integration, application performance management, best practices, business analytics, business intelligence, business management, collaboration, content management, cloud computing
    
hightail
Published By: Sift     Published Date: Jul 12, 2019
"As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach "
Tags : 
    
Sift
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : 
ssl, ssl solutions, networking, privacy, security, network security, enterprise applications
    
F5 Networks Inc
Published By: SafeNet     Published Date: Sep 08, 2010
Don't let one of your customers become the next statistic. Give your customers an easy, safe and secure online banking experience.
Tags : 
safenet financial services, online banking, security, man-in-the-browser attacks, auditing, internet security, intrusion detection, intrusion prevention, security management, web service security
    
SafeNet
Published By: SafeNet     Published Date: Sep 08, 2010
Combat Man-in-the-Browser (MiTB) Attacks with an Integrated Solution that Combines Strong Certificate-Based Authentication from SafeNet with an On-board Portable Browser.
Tags : 
safenet financial services, online banking, security, identity protection, etoken ng-flash, password, man-in-the-browser attacks, mitb, auditing, authentication, identity management, internet security, intrusion detection, intrusion prevention, password management, data protection
    
SafeNet
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security, security, anti spam, anti spyware, anti virus
    
Panda Security
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper looks at the technology required to stop cyber-bullying and the steps school administrators can take to ensure students are protected. Learn the facts about cyber-bullying today!
Tags : 
watchguard xcs, cyber-bullying, digital epidemic, online harassment, network security appliance, content control, intelligent monitoring, digital playground monitor, application security, web service security, content management system, messaging, secure content management
    
WatchGuard Technologies
Published By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : 
certifiedmail technology, email security, message security, encryption, security
    
DataMotion
Published By: Citrix Online HiDef     Published Date: Aug 01, 2011
This Forrester infographic illustrates intriguing meeting and business communication behaviors around the globe.
Tags : 
hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery, remote access, disaster recovery
    
Citrix Online HiDef
Published By: Citrix Online HiDef     Published Date: Aug 01, 2011
This Forrester white paper examines three surprising findings from a recent study of working behaviors that impact how businesses communicate and collaborate with an increasingly distributed workforce.
Tags : 
hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery, remote access, disaster recovery
    
Citrix Online HiDef
Published By: Citrix Online HiDef     Published Date: Aug 01, 2011
This new case study explores how HiDef CorporateT from Citrix Online Audio enables the American Cancer Society to cut audio conferencing costs by nearly 50% - savings that bolster the organization's core mission.
Tags : 
hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery, remote access, disaster recovery
    
Citrix Online HiDef
Published By: Citrix Online HiDef     Published Date: Aug 01, 2011
In this IDC Analyst Connection, Robert Mahowald, IDC research director, explores the value of Web-based audio conferencing and how it enables organizations to better manage users and costs.
Tags : 
hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery, remote access, disaster recovery
    
Citrix Online HiDef
Published By: Citrix Online HiDef     Published Date: Aug 01, 2011
This new Frost & Sullivan executive brief explores today's trends in audio conferencing, the impact of a diverse user base and how pricing models are evolving to match use.
Tags : 
hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery, remote access, disaster recovery
    
Citrix Online HiDef
Published By: Symantec     Published Date: Jun 24, 2015
This white paper illustrates how there’s a better way to inspire consumer confidence and satisfaction, all while increasing conversions, order value, and repeat buyers on your site.
Tags : 
online security, online shopping, customer trust, sales, online purchases
    
Symantec
Published By: Symantec     Published Date: Jun 24, 2015
This infographic illustrates how there’s a better way to inspire consumer confidence and satisfaction, all while increasing conversions, order value, and repeat buyers on your site.
Tags : 
online shopping, customer confidence, security, repeat buyers, conversion rate
    
Symantec
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Users Beware: 10 Security Tips to Share with Your Users - ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, network security, small business networks
    
ThreatTrack Security
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional data processing infrastructures—especially those that support applications—weren’t designed for our mobile, streaming, and online world. However, some organizations today are building real-time data pipelines and using machine learning to improve active operations. Learn how to make sense of every format of log data, from security to infrastructure and application monitoring, with IT Operational Analytics--enabling you to reduce operational risks and quickly adapt to changing business conditions.
Tags : 
    
AWS - ROI DNA
Published By: Webroot UK     Published Date: Sep 06, 2013
In today's world of employees spending hours online everyday with multiple devices, Webroot offers a unique portfolio of solutions for protecting endpoints. This consists of three offerings that can be deployed independently or in any combination. When implemented together, they provide far-reaching benefits. Read this whitepaper and learn how to get manageable endpoint, mobile device and web security together.
Tags : 
closing the circle, manageable endpoint solutions, webroot, security, webroot security suite, protecting endpoints
    
Webroot UK
Published By: GoToMeeting     Published Date: Jul 29, 2011
Watch this on-demand Webinar to hear Terrence Gargiulo, president of MakingStories.net, share stories of how companies use virtual collaboration technology to address these challenges and effectively manage projects.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This Wainhouse Research brief explores how web conferencing is transforming the way teams get work done.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This new SandHill Group white paper explores recent study findings to better understand the powerful advantages of SaaS technologies in addressing the training challenges of a global market, virtual teams and an ever-changing business climate.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.