cloud users

Results 176 - 200 of 256Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Jun 06, 2019
Learn how Forcepoint Solutions can help you successfully adopt Office 365 and protect your entire cloud environment Driving Office 365 adoption is an important goal—87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance, and poor user experience caused by network architecture limitations and constraints. Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite. Enhance Microsoft's integrated cloud security and regain visibility and protection against advanced attacks and data loss Extend compliance consistently into the Microsoft ecosystem and beyond Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to t
Tags : 
    
Forcepoint
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
    
OneLogin
Published By: Cisco     Published Date: Dec 08, 2015
Driven by budget pressures and the growth of cloud-hosted applications, mobility, and bandwidth-hogging applications such as video, many IT organizations are actively considering direct Internet access (DIA) at their branches. DIA offers two compelling benefits: (1) it can substantially reduce operating costs by freeing up costly WAN bandwidth for mission-critical applications, and (2) it offers a better experience for users accessing applications hosted in the public cloud.
Tags : 
direct internet access, cisco, canada, dia, wan, wide area network
    
Cisco
Published By: Equinix APAC     Published Date: Feb 25, 2019
Security and Resilience in Cloud, Hybrid and Multicloud Deployments This white paper describes the challenges and motivations facing cloud, hybrid and multicloud users as they consider how to deliver traditional levels of security and robustness, while maintaining the API-enabled virtues of flexibility and short lead-times of cloud-enabled IT. Key Highlights: • Critical considerations associated with cryptographic key management for multicloud users • Implement solutions that are capable of maintaining an always-on service
Tags : 
    
Equinix APAC
Published By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : 
security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution
    
K2
Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Cloud adoption promises the benefit of increased flexibility and significant cost savings. Hence, migrating business-critical applications to the cloud is becoming a growing priority for companies of all sizes. A recent survey of more than 250,000 information security professionals revealed that more than 77 percent of organizations have already adopted cloud services and 10 percent of those companies using cloud services describe themselves as heavy users.
Tags : 
    
Oracle Security Solutions
Published By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : 
mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive, medium-size business, esg, storage
    
Mimecast
Published By: AWS     Published Date: Nov 28, 2018
Financial institutions run on data: collecting it, analyzing it, delivering meaningful insights, and taking action in real time. As data volumes increase, organizations demand a scalable analytics platform that can meet the needs of data scientists and business users alike. However, managing an on-premises analytics environment for a large and diverse user base can become time-consuming, costly, and unwieldy. Tableau Server on Amazon Web Services (AWS) is helping major Financial Services organizations shift data visualization and analytics workloads to the cloud. The result is fewer hours spent on manual work and more time to ask deeper questions and launch new data analyses, with easily-scalable support for large numbers of users. In this webinar, you’ll hear how one major asset management company made the shift to cloud data visualization with Tableau Server on AWS. Discover lessons learned, best practices tailored to Financial Services organizations, and starting tactics for scalable analytics on the cloud.
Tags : 
    
AWS
Published By: MicroStrategy     Published Date: Aug 29, 2019
Dresner Advisory Services’ eighth annual Cloud Computing and Business Intelligence Market Study in 2019 shows user confidence at an all-time high, with cloud offerings outnumbering traditional on-premises offerings. Sentiment toward cloud and cloud BI turned sharply positive in 2018, with current and future user plans both trending up. Results from our 2019 Dresner Advisory Services New Year User Survey reinforced those findings with ongoing momentum. Sentiment is at an all-time high, and the majority of organizations—51 percent—use cloud BI in 2019. Cloud-based BI vendor products and services are now more plentiful than traditional onpremises products. Still, vendors support any deployment option the customer chooses: public, private, or hybrid, at multiple levels of scale and price. Customers benefit from these choices, which reduce the chance for vendor lock-in. Users have not settled on deployment models but are migrating toward subscription and the adoption of managed services. Ou
Tags : 
    
MicroStrategy
Published By: Stratus Technologies     Published Date: Jun 04, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Tags : 
demand, stratus, cloud computing, virtualized, on demand, storage management, shared applications, cloud, x86, virtualization, server, disaster recovery, business agility, business continuity, it administration, failure, scalability, smp, symmetric multiprocessing, data integrity
    
Stratus Technologies
Published By: Aerohive     Published Date: Sep 25, 2015
Testez par vous-même l’éventail complet des fonctionnalités d’un point d’accès Aerohive. Assistez à ce webinaire le jeudi 8 octobre 2015 à 11 h CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
As a secure internet gateway, Cisco Umbrella helps you tackle the challenges of mobility, SaaS, and branch transformation by offering a single platform that secures access to and use of the cloud, SaaS applications, branch offices, and endpoints. It's your first line of defense against threats -- anytime and anywhere your users access the internet, traffic goes through Umbrella first. To understand how a secure internet gateway provides 360-degree security for access to and use of the cloud, read the ebook.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
As a secure internet gateway, Cisco Umbrella helps you tackle the challenges of mobility, SaaS, and branch transformation by offering a single platform that secures access to and use of the cloud, SaaS applications, branch offices, and endpoints. It's your first line of defense against threats -- anytime and anywhere your users access the internet, traffic goes through Umbrella first. To understand how a secure internet gateway provides 360-degree security for access to and use of the cloud, read the ebook.
Tags : 
    
Cisco Umbrella EMEA
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : 
user protection, security, cloud, endpoint, application, network
    
CDW-Trend Micro
Published By: Splunk     Published Date: Oct 15, 2012
Learn how CloudShare allows users to efficiently create multi-VM environments, collaborate with others and deploy projects into production, with no background in IT-infrastructure required.
Tags : 
splunk, vmware, cloud computing, virtualization, it infrastructure, collaboration, it efficiency
    
Splunk
Published By: BMC Software     Published Date: Jun 26, 2013
Cloud is not simply a new technology platform, it’s a new way of running your IT processes. Success changes relationships with users, with services and with operations. Learn what to anticipate as you embark on cloud – and how to ensure success not just in your datacenter, but in your business.
Tags : 
cloud management, hybrid cloud, cloud planning, cloud operations, cloud users, cloud process
    
BMC Software
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Oracle Analytics     Published Date: Oct 06, 2017
Business decision making is undergoing a data-infused renaissance. Organizations are tired of the limitations of spreadsheets and dealing with long IT business intelligence (BI) development cycles just to gain access to the data they need now. Fortunately, with the advent of visual analytics and discovery tools (many offered in the cloud), the journey to data insight is getting simpler and faster. Rather than trying to divine meaning from a group of predefined reports or simple static dashboards, visual analytics helps users gain insights from data more quickly using intuitive data visualization. Increasingly, visual analytics tools provide easy-touse data preparation features for better data access. They support collaboration, mashups, and storytelling. TDWI Research sees growing interest in applying more modern, up-to-date tools for working with data.
Tags : 
    
Oracle Analytics
Published By: Medius     Published Date: Oct 01, 2019
Only a best-of-breed AP automation solution can offer the high levels of fully automated, touchless, invoice processing that your organization needs to scale your business operations.MediusFlow is the leading cloudbased solution for Dynamics users that automates the entire accounts payable process, enabling increased efficiency, touchless invoice processing as well as better financial visibility and control. This guide will help you understand... • What AP automation is • The different options available • What to consider when selecting a solution • How to evaluate solutions
Tags : 
ap automation, invoice processing, invoice automation, accounts payable automation, accounting software, accounting automation, microsoft dynamics automation
    
Medius
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: Webroot UK     Published Date: Mar 22, 2010
By using a service based in the cloud, protection against threats is brought nearer to where those threats are located, making it easier and more effective to protect users against security threats such as malware.
Tags : 
webroot, cloud-based service, web security, malware, security threat
    
Webroot UK
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.