customer security

Results 151 - 175 of 378Sort Results By: Published Date | Title | Company Name
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Sep 25, 2019
Looking for a new Application Security Testing vendor? See what customers have to say about Checkmarx and why we were named a June 2019 Customers’ Choice for Application Security Testing on Gartner Peer Insights!
Tags : 
    
CheckMarx
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
Welcome to Secure Hybrid Cloud For Dummies, IBM Limited Edition. The hybrid cloud is becoming the way enterprises are transforming their organizations to meet changing customer requirements. Businesses are discovering that in order to support the needs of customers, there is an imperative to leverage the highly secure IBM Z platform to support missioncritical workloads, such as transaction management applications. The Z platform has been transformed over the years. The combination of z/OS, LinuxONE, open APIs, and the inclusion of Kubernetes has made IBM Z a critical partner in the hybrid cloud world. Businesses can transform their IBM Z environments into a secure, private cloud. In addition, through IBM’s public cloud, businesses may take advantage of IBM Z’s security services to protect their data and applications.
Tags : 
    
Group M_IBM Q3'19
Published By: ShieldX     Published Date: Apr 17, 2019
ShieldX customers Alaska Air and IDT are moving aggressively toward 100 percent cloud adoption for all IT operations. Discover how they have identified and resolved the security issues associated with going all in on the cloud.
Tags : 
    
ShieldX
Published By: Alert Logic     Published Date: May 23, 2019
Securing web applications in the AWS cloud environment relies on the cloud service provider and the customer working together in a shared responsibility model. Effective security for web applications on AWS requires full visibility into the environment in which the apps live, while also proactively monitoring for attacks without causing delays in application development and delivery. For some customers this may be a challenge due to limited personnel resources or expertise. This is where Alert Logic can help. We will automatically show you why, where, and how to respond to vulnerability findings and provide you with short- and long-term recommendations to stop active attacks. To help guide the way, following are key considerations for providing sound web application security running on the AWS cloud.
Tags : 
    
Alert Logic
Published By: Amazon Web Services     Published Date: Apr 16, 2018
New and existing SAP customers can confidently deploy their mission-critical workloads on AWS knowing that AWS and SAP have worked closely to test and certify that the AWS Cloud meets the stringent performance and availability needs of SAP workloads. Hundreds of enterprise SAP customers run SAP solutions on AWS and are achieving increased flexibility, performance, and security, while simultaneously cutting their costs by migrating to AWS. Download our whitepaper: Leveraging the Cloud for Speed, Agility and ROI.
Tags : 
    
Amazon Web Services
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: GoCardless     Published Date: Oct 08, 2019
With Strong Customer Authentication (SCA) coming into force on 14 September 2019 as the final part of PSD2, many online businesses are required to add additional security measures to large parts of their online payment experience. Key goals of SCA include reducing payment fraud and creating a safer payment experience for the customer.
Tags : 
    
GoCardless
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
The incredible reach of social media can be used to nurture business relationships and nourish invaluable customer relationships. But without an enterprise-wide security strategy, your organization is susceptible to a variety of internal and external threats, including account hijackings, malware and employee errors that can lead to brand and communication crises.
Tags : 
social media, social media management, enterprise, global, security, threats, permissions, hootsuite
    
uberVU via HootSuite
Published By: Epicor     Published Date: Mar 05, 2018
If you’re a manufacturer and have questions about deploying your enterprise resource planning (ERP) system in the cloud, here’s your answer—it’s time to move. Cloud ERP solutions provide a number of benefits for manufacturers, and those who make the switch are seeing how simple, economic, and reliable this type of deployment can be. In this eBook, you’ll discover the top 10 reasons why Epicor customers are choosing to deploy their ERP in the cloud rather than on premises, including: • Economic benefits • Better use of IT resources • Greater security • Easier updates • Improved mobility and collaboration • Faster time to value Download the eBook to learn more about how cloud ERP from Epicor can help your manufacturing business.
Tags : 
    
Epicor
Published By: Epicor     Published Date: Aug 15, 2018
If you’re a manufacturer and have questions about deploying your enterprise resource planning (ERP) system in the cloud, here’s your answer—it’s time to move. Cloud ERP solutions provide a number of benefits for manufacturers, and those who make the switch are seeing how simple, economic, and reliable this type of deployment can be. In this eBook, you’ll discover the top 10 reasons why Epicor customers are choosing to deploy their ERP in the cloud rather than on premises, including: • Economic benefits • Better use of IT resources • Greater security • Easier updates • Improved mobility and collaboration • Faster time to value Download the eBook to learn more about how cloud ERP from Epicor can help your manufacturing business.
Tags : 
erp software, enterprise resource planning software, saas, cloud erp, epicor erp
    
Epicor
Published By: Staples     Published Date: Jan 26, 2018
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this white paper, you’ll learn how to evaluate your current state and how to reach your goal, from security and infrastructure to staffing and budget.
Tags : 
infrastructure, staffing, budget
    
Staples
Published By: Staples     Published Date: Oct 24, 2018
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this webinar, security expert, Ron Chestang of HP, and Michael Mayberry of Staples Business Advantage, discuss the rise of IoT, how to mitigate risk and the hidden costs of securing your network.
Tags : 
iot, security, security challenges, governance, network security
    
Staples
Published By: Staples     Published Date: Dec 17, 2018
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this white paper, you’ll learn how to evaluate your current state and how to reach your goal, from security and infrastructure to staffing and budget.
Tags : 
    
Staples
Published By: Staples     Published Date: Feb 07, 2019
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this webinar, security expert, Ron Chestang of HP, and Michael Mayberry of Staples Business Advantage, discuss the rise of IoT, how to mitigate risk and the hidden costs of securing your network.
Tags : 
    
Staples
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
In this January 2019 report from Forrester, you’ll learn how leading technology companies must engage their customers consistently while learning from their changing needs. To make this happen, IT leaders must offer technical platforms that enable agility and end-to-end integration. This report will show you: • Why tech leaders must embrace technology that engages and adapts with customers • The importance of building tech platforms that deliver speed and flexibility • How to automate and scale Zero Trust security throughout your environments
Tags : 
    
Citrix ShareFile
Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Jul 03, 2019
The Cybersecurity landscape is constantly changing and expanding. Businesses are increasingly having to confront cyberattacks that threaten their information—and their customers’ private data. This guide is designed to help those small and medium-sized businesses with limited IT resources to strengthen their cybersecurity today, with little to no cost.
Tags : 
    
HP Inc.
Published By: Google Cloud     Published Date: May 09, 2018
As companies seek to innovate and engage customers through digital channels, they need superstar security leaders — business executives who know how to protect, support, and drive performance. This report looks at the biggest changes in firms’ expectations of their chief information security officers (CISOs) and provides specific examples of how top information security professionals rise to those occasions.
Tags : 
    
Google Cloud
Published By: Ahead     Published Date: Jan 10, 2019
A January 2018 commissioned study conducted by Forrester Consulting on behalf of ServiceNow How a Representative Organization Resolved Security Incidents 45% Faster This Forrester Study provides a framework and customer example to help readers evaluate the potential financial benefits of investing in ServiceNow Security Operations. To understand and illustrate the benefits, costs, and risks associated with ServiceNow, Forrester interviewed three current Security Operations customers to create a representative organization. This organization: Improved vulnerability response times by 25% Prioritized vulnerabilities 60% faster Achieved 230% ROI Download this study to evaluate the Total Economic Impact of using ServiceNow Security Operations to deliver fast and efficient security response.
Tags : 
    
Ahead
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer support is predicated on the instances when customers can’t solve their problem or get answers to their question(s) on their own. In some of those cases, such as phone calls or live chats, it can be difficult for agents to identify and resolve the issue without additional visual assistance. With co-browse, agents can see what the visitor sees, provide guided assistance by highlighting items or filling out forms on a visitor’s behalf. Sensitive fields like social security numbers and passwords can be blocked from the agent’s view so private information remains just that, private. Bold360’s co-browse allows agents to follow visitors behind secure fields i.e. signing into their account – providing an extra level of support to customers.
Tags : 
browse, web, customers, security
    
LogMeIn
Published By: Right Networks     Published Date: Aug 13, 2019
For Denise Bailey, Principal at Elliot Davis, staying on top of the latest accounting technologies is a critical component of her job – and one that she’s extremely passionate. When evaluating new technologies, Denise puts a premium on security, customer service, and a flexible integrations environment. Read the full story to learn how the firm and its QuickBooks Desktop Enterprise clients have benefited from anytime/anywhere access and enhanced security with a cloud hosting.
Tags : 
    
Right Networks
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.