data security

Results 201 - 225 of 1973Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Dec 21, 2018
The transition to autonomous is all around. Its capability for problem-solving has never been seen before. Its potential for creating business value from algorithms and data makes it the next big frontier for business leaders. Two industry experts have discussed Oracle Autonomous Data Warehouse Cloudand what it can help organisations achieve. Talking about innovation, security and efficiency, they put the casefor an autonomous future.
Tags : 
    
Oracle
Published By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
    
Mimecast
Published By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
    
Cisco
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
    
Group M_IBM Q119
Published By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Okta’s mailing list at any time, by following this process. Additional details about Okta’s privacy practices are available in our Privacy policy.
Tags : 
    
Okta APAC
Published By: Workday APAC     Published Date: Dec 18, 2018
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
    
Workday APAC
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is the best strategic option for meeting your organization’s demands for increased efficiency and agility while leveraging existing apps and data. HCI is a scale-out software-defined infrastructure that converges core data services on flash-accelerated, industry standard servers, delivering flexible and powerful building blocks under unified management. Put simply, HCI has the potential to revolutionise your security environment and increase efficiencies relating to application performance. In this whitepaper, we break down the top 5 reasons why hyperconverged infrastructure is the right way forward for your organisation. Please enter your details to access the whitepaper.
Tags : 
    
VMware
Published By: Gigamon     Published Date: Dec 13, 2018
Despite increasing security budgets, companies find there is too much data for new tools to analyze, not enough skilled IT security professionals and little confidence in current technology investments. Read the “2018 Cyberthreat Defense Report” to learn how your peers are managing increased breaches, vulnerabilities and encrypted traffic. How does your cyberthreat approach compare to other security pros who are protecting their organizations? Learn now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Read "Understanding the State of Network Security Today" to learn why ESG recommends consolidating security tools through a structured, platform-based approach. Data, analytics and reports from multiple tools can be aggregated and consumed in one control panel, reducing network vulnerabilities. Learn more about challenges, changes and best practices for today’s network security operations and tools. Read now.
Tags : 
    
Gigamon
Published By: Akamai Technologies     Published Date: Dec 11, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
    
Akamai Technologies
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 11, 2018
Employees can now access your corporate data from any device, anywhere. But what does this new norm mean for your security?
Tags : 
    
Lookout
Published By: Epicor     Published Date: Dec 06, 2018
Over the last several years, manufacturers have embraced cloud applications. However, some manufacturers remain reluctant to migrate ERP systems and other business-critical applications to the cloud. Read on to discover four areas where manufacturers can benefit from a more complete understanding of how and why Epicor Cloud ERP offers unique advantages compared to on-premises deployment, including: • Increased data security • Greater financial visibility and control • Better long-term reliability • Easier access to cutting-edge tech innovation Moving an ERP environment to the cloud enables IT leaders to free up the resources they need to partner with the business and to focus on more strategic technology initiatives. Download the white paper to learn more.
Tags : 
epicor erp, erp system, cloud erp
    
Epicor
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: CrowdStrike     Published Date: Nov 28, 2018
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? This white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn: • How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware • Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML • How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-gene
Tags : 
    
CrowdStrike
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: Oracle     Published Date: Nov 21, 2018
Database Security Assessment Tool: Finding Your Weaknesses Before the Bad Guys Do
Tags : 
    
Oracle
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon® platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organization’s overall security posture. Learn how CrowdStrike® Falcon Discover™ enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: • Monitoring and searching metadata to improve security posture • Reviewing the rate of the Amazon EC2 instances launched over time • Gaining additional context surrounding alerts"
Tags : 
    
AWS - ROI DNA
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.