secure environment

Results 51 - 75 of 166Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be securedbut not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: how cloud adoption is reshaping the threat landscape why identity and access management must be a priority what are cybersecurity best practices in a modern IT environment which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : 
mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: Red Hat     Published Date: Sep 25, 2014
Enterprises are increasingly adopting Linux as a secure, reliable and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions. In particular, the Red Hat Enterprise Linux (RHEL) operating environment, which is based on the Linux open-source kernel, has become widely deployed by medium-sized and large businesses, by enterprises in their data centers, and in private and public cloud infrastructures. RHEL is distributed and supported by Red Hat Inc., the worlds largest provider of open-source software solutions, accounting for 74.7% of worldwide Linux operating system (OS) revenue. As a development and deployment platform, RHEL offers an efficient, scalable and robust operating environment with certified security and flexible deployment options in physical and virtualized environments.
Tags : 
enterprise solutions, open-source software, it management, storage, data center
    
Red Hat
Published By: Intel Security     Published Date: Oct 21, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : 
mcafee, intel, security, virtual, cloud, data center
    
Intel Security
Published By: DrFirst     Published Date: Mar 13, 2015
Secure, efficient communication between doctors and staff is key to reliable patient care. For Groves Community Hospice, every situation involving patients requires rapid response; this poses a particular challenge, as more than 80 percent of the hospice staff work in the field. With so many doctors and staff off-site or on-call, and considering the inherent urgency of hospice care, Groves needed to streamline staff communications and enable a better way for physicians and staff to connect and discuss critical patient issues within a secure environment.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario
    
DrFirst
Published By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
AWS
Published By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. Its every-thing and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Your business relies on a Microsoft infrastructure that stretches from your network to the cloud to endpoints located around the world. In many ways, the success of your business relies on how secure your Microsoft infrastructure is. Your users do not care where the applications and data reside; they only care about getting their job done. SharePoint, Skype for Business, or Active Directory deployed on the network, in Azure, or as part of your Office 365 subscription should have no impact on the success of your business.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: Oracle     Published Date: Mar 01, 2019
Most cloud infrastructure vendors offer companies a stable and secure environment on which to build and run their applications without having to manage a data center, invest in hardware, or install and update software. While most cloud vendors provide the same types of services, they differ in how they charge for and deliver those services.
Tags : 
    
Oracle
Published By: Datastax     Published Date: Aug 23, 2017
Enterprises today continue to differentiate themselves with cloud applications any application that needs to be always-on, distributed, scalable, real-time, and contextual. With DataStax Enterprise, DataStax delivers comprehensive data management with a unique always-on architecture that accelerates the ability of enterprises, government agencies, and systems integrators to power the exploding number of cloud applications. DataStax Enterprise (DSE) powers these cloud applications that require data distribution across data centers and clouds, by using a secure, operationally simple platform. At its core, DSE offers the industrys best distribution of Apache Cassandra. This paper provides a summary of the features and functionality of DataStax Enterprise that make it the best choice for companies that are looking to leverage the promise of Apache Cassandra for production environments.
Tags : 
cloud, adoption, application, migration, performance
    
Datastax
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In todays highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative DevOps-style delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
Welcome to Secure Hybrid Cloud For Dummies, IBM Limited Edition. The hybrid cloud is becoming the way enterprises are transforming their organizations to meet changing customer requirements. Businesses are discovering that in order to support the needs of customers, there is an imperative to leverage the highly secure IBM Z platform to support missioncritical workloads, such as transaction management applications. The Z platform has been transformed over the years. The combination of z/OS, LinuxONE, open APIs, and the inclusion of Kubernetes has made IBM Z a critical partner in the hybrid cloud world. Businesses can transform their IBM Z environments into a secure, private cloud. In addition, through IBMs public cloud, businesses may take advantage of IBM Zs security services to protect their data and applications.
Tags : 
    
Group M_IBM Q3'19
Published By: Sierra Wireless     Published Date: Jun 19, 2019
By simplifying the ability of companies to securely extract, orchestrate and act on data from when it is generated by energy assets to when it is transmitted to the cloud, Octave simplifies the development and commercialization of Energy IoT applications. With Octave, energy companies are empowered to realize the Energy IoTs tremendous potential, with new demand response, energy efficiency optimization, predictive maintenance and other applications that maximize the value created by energy assets and minimize their environmental impact. In doing so, these Energy IoT applications can reduce energy costs, improve customer engagement, lower greenhouse gas emissions and increase energy reliability. Start with Sierra to learn more about how our Octave D2C data orchestration solution can help you bring to market Energy IoT applications that reimagine the future of energy.
Tags : 
    
Sierra Wireless
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
    
uberVU via HootSuite
Published By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of todays mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any devicemobile or laptopat any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 05, 2018
Innovative data-driven strategies are enabling organizations to connect with customers and increase operational efficiency as never before. These new initiatives are built on a multitude of applications, such as big-data analytics, supply chain, and factory automation. On average, organizations are now 53% digital as they create new ways of operating and growing their businesses, according to the Computerworld 2017 Forecast Study. As part of this transformation, enterprises rely increasingly on multivendor, multicloud environments that mix on-premise, private, and public cloud services and workloads. This shift is causing enterprises to increase network capacity; 55% of enterprises in the Computerworld study expect to add network bandwidth in the next 12 months.
Tags : 
security, automation, savings, technology, cloud
    
Juniper Networks
Published By: Ahead     Published Date: Nov 15, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, theyre realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is wellintended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular--Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through common missteps and how to get it right.
Tags : 
    
Ahead
Published By: Ahead     Published Date: Nov 15, 2018
If your business is like many other organizations that are in the process of enabling a Microsoft Azure public cloud platform, then you might be struggling with the guardrails needed to secure and manage cost, while at the same time enabling flexibility for the teams consuming cloud services. While the Azure platform is already very secure, it also allows a great deal of flexibility in configuration. In order to avoid accidentally creating security holes and out-of-control spend, a Governance Framework is required. We created the AHEAD Azure Governance framework to allow enterprises to develop and maintain a fully optimized, and secure environment. The resulting framework will be tailored to your organizations specific business and compliance needs, as every enterprise is different. This guide will introduce you to the components of this necessary Azure Foundational Governance Design.
Tags : 
    
Ahead
Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast
Published By: Canopy     Published Date: Oct 29, 2014
In this essential guide, well explore the perceived barriers to a dedicated Private Cloud. Well also show the opportunities for companies to reposition the role of IT within the business in a secure and dedicated cloud environment.
Tags : 
guide to the cloud, a guide to the private cloud, moving to the cloud, barriers to the cloud, benefits of moving to the cloud, how to move to the cloud, infrastructure, mobile computing
    
Canopy
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.