secure environment

Results 151 - 175 of 177Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Sep 18, 2013
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment. Key findings include: • 8 in10 companies experienced web-borne attacks in 2012 • The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities • Secure web gateways are a critical component of an effective defense against web-borne threats
Tags : 
web threats, data loss, security, web gateway, web attacks, security breach
    
Webroot
Published By: GeoTrust     Published Date: Aug 09, 2013
Learn more about typical situations where multiple domain certificates are the ideal solution. After this whitepaper, you'll know how to select the right multi-domain certificate for your needs.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: Prophix     Published Date: Jul 10, 2013
Prophix Interactive Demo
Tags : 
prophix, interactive demo, easy-to-use interface, secure environment
    
Prophix
Published By: Tribold.com     Published Date: May 09, 2013
Enterprise Product Management is essential for CSPs seeking to secure and enhance their market positions. The complexity of CSP product offerings creates a business environment that is slow and ill-equipped to meet ever-growing customer demands.
Tags : 
tribold, tribold epm, plm, product lifecycle management, enterprise product management
    
Tribold.com
Published By: Message Systems     Published Date: Apr 29, 2013
Technology Principles for Architecting a Secure Messaging Environment
Tags : 
message systems, secure messaging environment, esps, solution engineering, mike hillyer, safe messaging environment
    
Message Systems
Published By: McAfee     Published Date: Feb 06, 2013
Insight and control to secure your dynamic cloud environment at every infrastructure layer
Tags : 
cloud security, cloud computing, public cloud security, private cloud security, cloud security policy enforcement, application security, data security, security compliance
    
McAfee
Published By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : 
byod, policy, guide, mobile, security, cloud, apps, administration
    
Absolute Software
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : 
cloud, recovery-as-a-service, raas, infrastructure, platforms, heterogeneous, networking, storage
    
SunGard
Published By: Intel     Published Date: Aug 10, 2012
What is Intel® CoreT vProT technology? Learn about the security and manageability features that deliver a secure and efficient IT environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security
    
Dell Software
Published By: IBM Corporation     Published Date: May 22, 2012
The SUSE Enterprise Linux Server, now on the IBM PureFlex System, provides an open, reliable and secure IT environment with faster deployment,better business agility, lower power consumption, better hardware utilization and lower total cost of owners
Tags : 
suse linux enterprise server, ibm pureflex system, mission-critical computing, cloud computing, integrated systems strategy, open virtualization format, ovf
    
IBM Corporation
Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This report sponsored by HP + Intel outlines a strategy for getting the benefits of the cloud quickly. Learn about the solutions that can help you save time, improve storage efficiency and maintain a secure, available environment.
Tags : 
intel, storage, 2.0, cloud, infrastructure, virtualization, infrastructure, trends
    
HP and Intel® Xeon® processor
Published By: HP and AMD     Published Date: Feb 04, 2012
This report sponsored by HP + Intel outlines a strategy for getting the benefits of the cloud quickly. Learn about the solutions that can help you save time, improve storage efficiency and maintain a secure, available environment.
Tags : 
intel, storage, 2.0, cloud, infrastructure, virtualization, infrastructure, trends
    
HP and AMD
Published By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
    
Q1 Labs
Published By: SAP     Published Date: Feb 10, 2011
The recession notwithstanding, mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Tags : 
sap, mobility, competitive edge, mobile workers, enterprise mobility, mobile, applications, iphone
    
SAP
Published By: SafeNet     Published Date: Sep 08, 2010
This paper will provide insight into the top five threats to the online banking in the financial services industry and SafeNet's recommended solutions for a defense that not only provides a secure transaction environment for customers but also satisfies stringent government and industry compliance regulations.
Tags : 
safenet financial services, online banking threats, cyber attack, compliance, financial services providers, authentication, phising, application security
    
SafeNet
Published By: Microsoft Windows Phone     Published Date: Feb 08, 2010
How Windows Phones Combine Email, Messaging, Voice, and Presence in a Secure, Collaborative Environment. This paper explains why unified communications is essential and why Windows® Phones are ideally suited to serve as the "mobile connection" in a unified communication environment.
Tags : 
microsoft windows phones, unified communications, security, mobile worker, smartphone, business intelligence, corporate social network, mobile workers
    
Microsoft Windows Phone
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
    
Tripwire
Published By: Dell Windows Server     Published Date: Jan 16, 2009
The Windows Server 2008 OS promises to supercharge enterprise computing by providing a solid foundation to support critical workloads and deliver rich Web-based experiences—all in an exceptionally secure, industry-standard operating environment. Dell smoothes the way by providing business-ready platforms optimized for Windows Server 2008 together with Structured Solution Designs to make the migration flexible, simple, and green.
Tags : 
dell, microsoft windows server 2008, structured solution designs, windows migration, platforms, windows, windows server
    
Dell Windows Server
Published By: Dell     Published Date: Oct 20, 2008
Dell can help corporations to properly dispose of old PCs in a secure and cost-effective manner that is also environmentally friendly.
Tags : 
dell, hardware asset recovery, safe hardware disposal, asset recovery, environmental liability, dell asset recovery services, security, platforms
    
Dell
Published By: Faronics     Published Date: Sep 10, 2008
IT Managers are tasked with making the desktop environment more secure and locked down to a uniform corporate standard, yet flexible enough to handle the myriad of exceptions that arise across the enterprise. Centralized Configuration Management (CCM) tools are great, especially in environments with branch offices. But CCM tools can’t do the big job of making your environment inherently more secure or more flexible.
Tags : 
security, configuration management, faronics, cmdb, desktop security, it management, ccm
    
Faronics
Published By: Tripwire     Published Date: Feb 25, 2008
Find out how to maintain the same level of stability and security across both virtual and physical environments, using the same software and approach.
Tags : 
virtual machine, virtual, virtualize, virtualized, virtualization, virtual server, configuration, configuration management
    
Tripwire
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.