data security

Results 651 - 675 of 1853Sort Results By: Published Date | Title | Company Name
Published By: FICO     Published Date: Mar 14, 2017
Learn how technologies such as AI, self-calibrating models and self-learning analytics are being used to detect cyber attacks before they happen. Download now!
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: Okta     Published Date: Apr 17, 2017
In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.
Tags : 
    
Okta
Published By: Blue Coat     Published Date: Feb 04, 2016
What’s the best approach to cloud migration? Relying on your cloud service provider for data protection and compliance may not be enough. But, you can’t just write off cloud services due to security concerns. Get solid advice here.
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 04, 2016
As more and more organizations adopt cloud services, it’s essential to maintain a consistent level of security to protect data. There is no silver bullet. But there are some basic cloud security components. Find out now!
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 09, 2016
This Blue Coat white paper details potential issues to consider before using cloud services; and how encryption and tokenization can enable you to safely adopt the cloud while adhering to appropriate guidelines.
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 09, 2016
Lots of marketing claims are being made by Cloud Data Protection Gateway providers. It’s time for critical analysis. This Blue Coat paper reviews the key questions Security, Governance & Risk and IT should be asking vendors.
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 09, 2016
Don’t let SaaS data security concerns stop you from migrating to the cloud. Learn how encryption and tokenization satisfy legal requirements and industry mandates for protecting sensitive data in SaaS cloud applications.
Tags : 
    
Blue Coat
Published By: Pure Storage     Published Date: Jan 12, 2016
This guides provides insight into the various benefits and challenges associated with VDI implementation and ultimately culminates in an overview of the many use cases for VDI in healthcare. VDI is not the solution for all practices, but for many it is enabling higher efficiency and faster innovation.
Tags : 
virtual desktop infrastructure, vdi, healthcare, pure storage, vdi implementation, data security, mobility, it management, enterprise applications
    
Pure Storage
Published By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
    
Avi Networks
Published By: Hortonworks     Published Date: Apr 05, 2016
This white paper will help you evaluate your ability to protect your data in a Apache Hadoop ecosystem. Read on to learn ten signs that you might need to improve security and data governance in order to manage risk while getting more value out of your Apache Hadoop environment.
Tags : 
    
Hortonworks
Published By: Juniper Networks     Published Date: Aug 03, 2017
Security, network complexity and growing volumes of traffic are the top factors affecting enterprise network strategy, based on a recent IDG Research Services poll among IT leaders. Here’s what they’re planning to do about these issues
Tags : 
information technology, data security, network complexity, traffic volume, network strategy
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 03, 2017
Keeping the pace of a data-driven economy means having an infrastructure that can scale with it. Research from Nemertes explains how the transformation happens.
Tags : 
data security, network protection, infrastructure improvement, business transformation, data driven business
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Business evolution and technology advancements during the last decade have driven a sea change in the way data centers are funded, organized, and managed. Enterprises are now focusing on a profound digital transformation which is a continuous adjustment of technology management resources to deliver business results, guided by rapid review of desired outcomes related to end clients, resources, and budget constraints. These IT transitions are very much part of the competitive landscape, and executed correctly, they become competitive differentiators and enable bottom line growth. These outcomes are driving data centers to virtualization, service-oriented architectures, increased cybersecurity, “big data,” and “cloud,” to name a few of the key factors. This is completely rethinking and retooling the way enterprises handle the applications, data, security, and access that constitute their critical IT resources. In essence, cloud is the new IT.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 05, 2018
Data center requirements are shifting as the business environment evolves to leverage new technologies. Organizations are turning to multicloud environments comprising a mix of private cloud, public cloud, and on-premise infrastructure to best address their unique needs. Understandably, this shift is putting a renewed emphasis on security, automation, orchestration, and agility. IT leaders are responding by building and deploying multicloud data center networks that leverage automation and software-defined networks (SDN) as a cost effective means of providing dynamic network control. Of course, while many organizations are recognizing the need for a data center upgrade, not all have the same drivers. All, however, need to make a business case for the investment. Here are four common inflection points that can help you to justify the need for data center upgrades that support business goals.
Tags : 
network, performance, data, security, efficiency, iot
    
Juniper Networks
Published By: Alteryx, Inc.     Published Date: Sep 06, 2017
Organizations that want to apply consistent data management, governance and security practices across their organization can learn a lot from Ford Motor Company. Data-driven decision making led Ford Motor Company to perfect the vehicle assembly line in 1913. A century later, Ford had more than 4,600 data sources, and a wide range of analytical tools, methods, and processes in use throughout the company, and needed a more strategic approach to decision-making.
Tags : 
    
Alteryx, Inc.
Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.
Published By: CyberSource     Published Date: Oct 19, 2018
Did you know that hackers aren’t just interested in large enterprise businesses? Or that you can operate your business without raw payment data? Learn the truth about the five most common payment security myths today in this informative e-book.
Tags : 
    
CyberSource
Published By: Forcepoint     Published Date: Mar 08, 2018
Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. Download this whitepaper to find out how Forcepoint NGFW delivers industry leading connectivity and availability.
Tags : 
server, vpn, network, internet, technology, forcepoint
    
Forcepoint
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
"Chrome Browser provides secure, trusted access to data, apps, and cloud services, connecting employees on any device to a new generation of powerful tools for work. With proactive securitymeasures protecting them while they work, users get a consistent, customizable experience whenever and wherever they access it."
Tags : 
    
Google Chrome Enterprise
Published By: Google Apigee     Published Date: Mar 06, 2019
Inside the API Product Mindset APIs expose data or functionality for use by applications and developers, which means they allow access to a business’s valuable digital assets—and thus to the heart of the business itself. Vulnerable APIs can expose a business’s core data and services to a variety of threats. Therefore, API security should be of paramount importance to any enterprise that exposes digital assets. Google Cloud’s new eBook, Building and Managing Secure APIs, takes a deeper look at the do’s and don’ts of enterprise API security. Explore how to design secure, easy-to-use APIs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use cases ? API monetization checklist
Tags : 
    
Google Apigee
Published By: Panduit     Published Date: Aug 28, 2018
Interested in learning how the right physical and network infrastructure approach in your colocation data center facility can help you stabilize costs, provide better security, and help promote growth for you and your tenants? Download the Panduit white paper Optimizing Colocation Infrastructure Strategies to learn how to overcome the challenges of aging colocation data center infrastructure and onboard new tenants quickly.
Tags : 
panduit, colocation, data center, data center management, infrastructure, colocation provider
    
Panduit
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Start   Previous    20 21 22 23 24 25 26 27 28 29 30 31 32 33 34    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept