reach

Results 126 - 150 of 1513Sort Results By: Published Date | Title | Company Name
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors, it management, data management, data center
    
Websense
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesnt include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether its intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware, anti-virus, software, protection, solutions
    
Dell
Published By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Automation Anywhere     Published Date: Jul 16, 2019
Learn why companies arent currently embracing RPA at scale and understand how to tackle different scaling challenges, from reaching the ceiling of a small Proof of Concept to keeping your people and RPA strategies aligned. Find out how scale was successfully achieved for some of Automation Anywheres customers, including Bancolombia.
Tags : 
    
Automation Anywhere
Published By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applicationslike SAP or Oracle could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data residency; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
    
IBM APAC
Published By: Polycom     Published Date: Sep 04, 2012
Video collaboration expands the reach of education and is essential to improving student achievement and preparing them for the global economy.
Tags : 
video collaboration, videoconferencing, education, mobile video communication, video conferencing
    
Polycom
Published By: Akamai Technologies     Published Date: May 08, 2017
We are coming to expect quality video in all our digital experiences from online shopping to on the job training. However, as video technology has become more ubiquitous, it has also become more complex. To deliver a quality experience to users, regardless of their device and connectivity, you need a holistic video strategy. Weve tapped into our experience to present the top issues you must address to ensure a successful online video strategy. Download now to learn more!
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
Akamai Technologies
Published By: Oracle EMEA     Published Date: Apr 15, 2019
Oracle Autonomous Data Warehouse Cloud is more than just a new way to store and analyze data; its a whole new approach to getting more value from your data. Market leaders in every industry depend on analytics to reach new customers, streamline business processes, and gain a competitive edge. Data warehouses remain at the heart of these business intelligence (BI) initiatives, but traditional data-warehouse projects are complex undertakings that take months or even years to deliver results. Relying on a cloud provider accelerates the process of provisioning data-warehouse infrastructure, but in most cases database administrators (DBAs) still have to install and manage the database platform, then work with the line-of-business leaders to build the data model and analytics. Once the warehouse is deployedeither on premises or in the cloudthey face an endless cycle of tuning, securing, scaling, and maintaining these analytic assets. Oracle has a better way. Download this whitepaper to f
Tags : 
    
Oracle EMEA
Published By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
    
Entrust Datacard
Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications, access control, anti spam, anti spyware, anti virus, security management, security policies
    
Venafi
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institutes 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking, software development, wireless security
    
Venafi
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Unions General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, theres a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the users expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues, ad targeting, target audiences, social media audience, spend forecast, it management
    
Adobe
Published By: Cordial     Published Date: Jul 29, 2015
Along with the opportunities this new connected world brings is a challenge marketers have never faced before: five active generations that are dramatically shaping connected-consumer buying and behavior.
Tags : 
    
Cordial
Published By: VMware     Published Date: Oct 05, 2015
Unless youve already deployed a Zero Trust network, your network security is broken. Thats the bad news. The good news? New ways of implementing a previously hardware-intensive and costly concept called micro-segmentation now put Zero Trust within your organizations reach. Learn about these breakthrough developments in this Forrester Research report that is yours free, courtesy of VMware and Carahsoft. Download your free copy now.
Tags : 
vmware, zero trust, forrester research, network security, network security solution, micro segmentation, carahsoft, security, network performance, data protection, database security
    
VMware
Published By: VMware     Published Date: Oct 05, 2015
Most data center security emphasizes strong perimeter defense to keep threats on the outside. But this model is ineffective against todays new types of threats, which may be borne by east-west traffic inside your data center. Some of these intrusions may lurk for days, weeks, or months to discover and exploit vulnerabilities. An existing concept called micro-segmentation is the solution. But until now, it was hardware-intensive and costly. In this solution overview, youll learn why micro-segmentation is now within your organizations reach. Get your free copy now.
Tags : 
vmware, data center security, data center, micro segmentation, micro segmentation solution, security, data protection, database security
    
VMware
Published By: VMware     Published Date: Oct 05, 2015
To be fair, if you dont know or understand the data center architecture strategy called micro-segmentation, you arent a dummy. But it could mean you are missing a highly cost-effective opportunity to implement best-in-class data center security called the Zero Trust network. This special For Dummies edition explains micro-segmentation, how it enables Zero Trust, and why it is now within your organizations reach. Download your free copy of this book now.
Tags : 
zero trust network, micro segmentation, data architecture strategy, vmware, data center, data center security, security, data protection, database security
    
VMware
Published By: VMware     Published Date: Oct 05, 2015
Undoubtedly you are aware of network virtualization, but perhaps youve yet to hear a compelling case for it. If the extended network capabilities and simplified management enabled by network virtualization arent compelling enough reasons, data center security should be. To manage todays coordinated and persistent security threats, which often come from within, data centers need to implement Zero Trust networking. Virtualization puts it within your reach. Discover why download this free business case white paper now.
Tags : 
vmware, network virtualization, data center, data security, vmware nsx, zero trust, zero trust network, networking, security
    
VMware
Published By: VMware     Published Date: Oct 05, 2015
Security breaches targeting government and military data centers are increasing. Attackers have learned to defeat current means of physical network security, which emphasize perimeter defense. Today, organizations must protect the workloads inside the data center, utilizing a concept called micro-segmentation to build a Zero Trust network. But that has been unrealistic, requiring too great an investment in hardware, time, and manpower until now, that is. Download this use case from VMware and Carahsoft now to learn why.
Tags : 
vmware, cybersecurity, vmware nsx, security breach solutions, microsegmentation, zero trust, zero trust network, carahsoft, security
    
VMware
Published By: Akamai Technologies     Published Date: Aug 30, 2019
Security is the foundation of digital business innovation. Its a bold claim; one that hasnt always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, its that security-related incursions are inevitable. And its news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 04, 2019
Its a bold claim; one that hasnt always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, its that security-related incursions are inevitable. And its news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, theres no longer a choice. As a CIO, CISO, or other security or IT leader, you know its your job to be the central agent stressing the connections between business and digital risk. Its your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. Thats up from 40% in 2018. Whether your
Tags : 
    
Akamai Technologies
Published By: Aventri     Published Date: Apr 11, 2019
"Successful meetings management requires a wide array of skills and tools to help you meet stakeholder's expectations and reach your goals. From tools to assist with budget creation to meeting approval workflows and cost-effective venue sourcing, a great meetings management program takes a lot of effort. That's why at Aventri, we created an eBook that combines all the essential meeting management strategies into one package. Learn how to: Efficiently source the right meeting venue Use the right meeting management technology to increase success Implement money saving strategies with big budget results Measure your total meeting spend and return. In the end, you will feel confident in your abilities to implement a successful meeting management strategy at your organization."
Tags : 
    
Aventri
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no ones data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Ransomware is not going away. This makes it imperative for businesses across all industries to adopt a data management strategy of multi-layered security, easy automation, and quick recovery. To learn more about Rubrik and how it can ?t into your ransomware protection strategy while simplifying data protection across your entire datacenter, visit www.rubrik.com. As the leading next-generation data protection solution, Rubrik deploys as a plug-and-play appliance in less than an hour and has been adopted across all verticals and organization sizes including Fortune 50 companies.
Tags : 
data, backup, recovery, backups, solution, security, encryption, cyber, privacy, infrastructure
    
Rubrik EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.