guard

Results 251 - 275 of 342Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Feb 16, 2016
Today the success of your organization may depend on effectively safeguarding the resources and information in your data center.
Tags : 
data security, security, resource management
    
Cisco
Published By: Symantec     Published Date: Jan 04, 2012
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive informati
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: Symantec     Published Date: Jun 29, 2012
Choosing the Right Security Solution. Moving Beyond SSL to Establish Trust
Tags : 
ssl, symantec, safeguard customers, third-party solutions, security
    
Symantec
Published By: IBM     Published Date: Jul 09, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, it security, resilience investments, enhanced brand value
    
IBM
Published By: Juniper Networks     Published Date: Feb 18, 2015
Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
juniper, juniper networks, security, network security
    
Juniper Networks
Published By: Guardian Digital     Published Date: Oct 02, 2007
Open source is just a method to reaching a goal, not a goal in itself. In this overview, "The Top 5 Open Source Security Myths," you will be introduced to some of the largest misconceptions regarding open source security.
Tags : 
open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian
    
Guardian Digital
Published By: Guardian Digital     Published Date: Oct 02, 2007
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
Tags : 
open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian
    
Guardian Digital
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 11, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, verisign.com, security, extended validation ssl, authentication, trust marks, certificate authority, search-in-seal
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Eaton     Published Date: Jun 01, 2012
This white paper aims to fill that knowledge gap byproviding introductory-level information about what arc flashes are, why they're so hazardous and what steps data center managers should take to safeguard their employees and infrastructure.
Tags : 
arc flash, mitigation strategy, hazard analysis, ppe, personal protective equipment, ieee 1584, nfpa 70e, nclb, high-resistance grounding
    
Eaton
Published By: HP     Published Date: Apr 13, 2014
Learn how Isbank, Turkey’s largest bank, dramatically reduced testing times for Functional Testing automation from 6 man-days to a few hours. Read about the benefits of adopting an Application Lifecycle Management approach to improve software quality, automate testing processes and safeguard mission-critical applications while supporting growth.
Tags : 
application lifecycle management, application development, application testing, enterprise release management, financial services, functional testing, hp application, hp loadrunner, hp performance center, hp quality center, hp quick test professional, hp service, hp service test, hp software professional, it case study, lifecycle management, performance testing, quality planning assessment, services, test management
    
HP
Published By: HP     Published Date: May 14, 2014
As a long-time leader in data protection and backup solutions, and with innovations such as HP StoreOnce deduplication, HP TapeAssure and HP StoreOpen with LTFS, HP understands your immediate requirements and strategic business direction. With an integrated approach to comprehensive business protection, we can help you safeguard the integrity of your data and rapidly restore access whenever, wherever, and however you need it.
Tags : 
hewlett packard, data protection, storeonce, tapeassure, ltfs
    
HP
Published By: Oracle Corp.     Published Date: Sep 13, 2012
Read this white paper to get an overview of the Oracle Database family of products and learn how you can transform your business, budgets, and service levels with Oracle Database 11g Release 2.
Tags : 
oracle, database, data guard, analytics, data masking, database appliance
    
Oracle Corp.
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Email is the nervous system of most companies. It answers everyday questions. What do I do next? What did we agree? What happened? How did we do it last time? Who do I need to talk to?
Tags : 
messagelabs, complete email safeguard, managing email, security
    
MessageLabs Ltd.
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.
Tags : 
messagelabs symantec, security safeguard, email spam, malware
    
MessageLabs Ltd.
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.
Tags : 
messagelabs symantec, web threat, security safeguard, malware, web security services
    
MessageLabs Ltd.
Published By: Symantec     Published Date: Apr 02, 2015
The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers’ sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.
Tags : 
security solution, ssl, e-commerce environments, malicious activity, safeguard information, ssl-based security
    
Symantec
Published By: GeoTrust     Published Date: Aug 09, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
cloud provider, cloud computing, economic benefits, safeguard information assets, ssl, confidence
    
GeoTrust
Published By: Symantec     Published Date: Oct 12, 2012
This paper discusses how online businesses can instill trust and confidence in their websites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
security solutions, online secutiry, ssl, secure socket layer, extended validation ssl, ev ssl
    
Symantec
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : 
symantec, stuxnet, cyber-attack, security, certificate authority
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : 
security, code signing, software, private keys
    
Symantec Corporation
Published By: Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
    
Schneider Electric
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
Government agencies today are focused on collaboration and how they can best share information and make it available to those who need it, while maintaining security. This white paper discusses the necessary elements of a personalized portal and how they are leveraged to enable e-intelligence. Includes case studies of the U.S. Air Force Portal and the U.S. Coast Guard Portal.
Tags : 
egovernment, e-government, government, usaf, agency, agencies, portal, broadvision
    
Clearvale by BroadVision
Published By: Data Guard Systems     Published Date: Aug 21, 2009
Customer Resource Management (CRM) and marketing are essential parts of today's cellular/wireless retail business. Given the ever-increasing competition for every consumer dollar, being able to develop effective and directed marketing programs can define the longevity of a cellular retailer's success.
Tags : 
customer resource management, cell phone, telecom, telecommunications, cellular retailer, telecom marketing, crm, customer relationship management, customer loyalty, retention, data guard, data guard systems
    
Data Guard Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.