secure environment

Results 151 - 166 of 166Sort Results By: Published Date | Title | Company Name
Published By: GeoTrust     Published Date: Aug 09, 2013
Learn more about typical situations where multiple domain certificates are the ideal solution. After this whitepaper, you'll know how to select the right multi-domain certificate for your needs.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, unified certificates, secure communications, multiple domains, certificates, certificate extensions, secure independence, certificate authority, vital security, business protection, uc environments, security, business activity monitoring
    
GeoTrust
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Faronics     Published Date: Sep 10, 2008
IT Managers are tasked with making the desktop environment more secure and locked down to a uniform corporate standard, yet flexible enough to handle the myriad of exceptions that arise across the enterprise. Centralized Configuration Management (CCM) tools are great, especially in environments with branch offices. But CCM tools can’t do the big job of making your environment inherently more secure or more flexible.
Tags : 
security, configuration management, faronics, cmdb, desktop security, it management, ccm
    
Faronics
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: HP and AMD     Published Date: Feb 04, 2012
This report sponsored by HP + Intel outlines a strategy for getting the benefits of the cloud quickly. Learn about the solutions that can help you save time, improve storage efficiency and maintain a secure, available environment.
Tags : 
intel, storage, 2.0, cloud, infrastructure, virtualization, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain
    
HP and AMD
Published By: Amazon Web Services, Inc     Published Date: Sep 19, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more.
Tags : 
aws exchange, microsoft exchange, micrsoft exchange server, microsoft exchange download, microsoft exchange server download, ms exchange, ms exchange server, ms exchange download, ms exchange server download, exchange server, cloud computing, web services, exchange services, web service management, platforms, server applications, it management
    
Amazon Web Services, Inc
Published By: Intel Security     Published Date: Oct 20, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : 
server security, virtual server security, cloud server security, data center server security, security, data management
    
Intel Security
Published By: VMware AirWatch     Published Date: May 19, 2016
Mobility packs the power to lift an enterprise to a competitive advantage. Not only can it make your employees more productive, enterprise mobility can help you take innovative measures to engage your customers. The emerging challenge for IT administrators is to manage mobility in the enterprise, to make sure corporate data is secure, to ensure that the existing infrastructure is compatible for todays mobile environment, and to provide a management solution that is adaptable to changing business needs.
Tags : 
competitive advantage, mobility, best practices, productivity, mobile device, mobile computing, wireless communications, business analytics, database development
    
VMware AirWatch
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arent built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro Deep Security is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arent built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro Deep Security is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM Security Guardium, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
Published By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDCs Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : 
secure devops, idc, analyst report, container security
    
Tenable
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments. Further, Gartner states, Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment. By reading 7 Questions SRM Leaders Aren't Asking OT Security Providers, youll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: Group M_IBM Q119     Published Date: Jan 17, 2019
Today, financial service companies are embracing hybrid cloud and its advantages, such as the ease of shifting production workloads and secure applications to public cloud environments. But, what is challenging is the complex regulatory landscape. 20,000 new regulatory requirements were created in 2016 alone. How can security pros ensure that controls for identity management, authentication and encryption work in both private and public clouds? Download this report for a closer look at the complexity of hybrid cloud security and 10 essential elements for compliant business operation.
Tags : 
    
Group M_IBM Q119
Start   Previous    1 2 3 4 5 6 7     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.