it networks

Results 226 - 250 of 849Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: IBM Watson Health     Published Date: Mar 03, 2017
In this on-demand webinar Jacqueline Matthews will share her insight with attendees on: - The current healthcare climate in moving from volume to value - The key components of clinical integration - The important role Information Technology plays in Clinically Integrated Networks
Tags : 
ibm, watson, watson health, accountable care, clinical integration, information technology
    
IBM Watson Health
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: IBM     Published Date: Dec 15, 2016
In this on-demand webinar Jacqueline Matthews will share her insight with attendees on: - The current healthcare climate in moving from volume to value - The key components of clinical integration - The important role Information Technology plays in Clinically Integrated Networks
Tags : 
ibm, watson, watson health, accountable care, clinical integration, information technology
    
IBM
Published By: AWS     Published Date: Dec 19, 2018
Migrations to the cloud sometimes face difficulties in transitioning apps, operational inconsistencies, and incongruent networks. VMware Cloud on AWS is an on-demand hybrid cloud service designed to preserve existing investments and legacy applications, while reaping the rewards of cloud scalability and flexibility. But what are the right use cases for VMware Cloud on AWS, and how do you best approach this new solution? Download our webinar to find answers to both questions, and to see specific use cases like migration, disaster recovery, and M&A integration. Download our webinar to learn How to prepare and validate your environment for integration The right circumstances for and expected benefits of deploying VMware Cloud on AWS The value of deploying a right-sized VMware Cloud on AWS environment based on your application needs
Tags : 
    
AWS
Published By: Juniper Networks     Published Date: May 17, 2017
Here are the Top 6 reasons why enterprises embarking on the journey of digital transformation should switch to the Juniper Unite Cloud-Enabled Enterprise solution.
Tags : 
    
Juniper Networks
Published By: IBM     Published Date: Nov 03, 2017
Massive shifts within the digital business landscape are sparking immense opportunities and reshaping every sector. In some cases, complete upheaval is happening at lightning-fast speed. In other instances, digital undercurrents are stirring beneath the surface as organizations scramble to monetize vast volumes and variety of data in an effort to sharpen their competitive edge and not be blindsided by unforeseen events that completely upend existing business models. While long-standing industry leadership might be no match for the next cool app, agility, speed and the ability to harness more data than was ever imagined is fueling powerful possibilities for reinvention among companies of every size. Data is following rapidly from mobile devices and social networks, as well as from every connected product, machine and infrastructure. This data holds the potential for deep insights that can replace guesswork and approximations as to locations, behaviors, patterns and preferences. As the w
Tags : 
digital business, data, data-driven enterprise, innovation, ibm
    
IBM
Published By: Comcast Business     Published Date: Apr 13, 2017
Of all the industries targeted by cyber-attackers, financial services is one of the most attractive. As noted bank robber Willie Sutton once said, “Go where the money is … and go there often.” That, it seems, is what cybercriminals are doing, launching malware, Trojans, spear phishing and ransomware attacks at banks and institutions to compromise networks and gain access to valuable data. Download now!
Tags : 
    
Comcast Business
Published By: Comcast Business     Published Date: Jul 10, 2017
Healthcare technologies have proven their worth for practitioners and facilities in increasing the quality of patient care while saving time and streamlining operations. In some cases, however, the benefits of these technologies are outweighed by their impact on the network, slowing network performance sometimes to the point of ineffectiveness.Software-defined networking can be the bridge to help healthcare providers update their networks and avoid disruption. SDN helps organizations save money on networking infrastructure, reduces the complexity of managing networks, enhances security through added intelligence and simplifies compliance, among other benefits.
Tags : 
healthcare, sdn, healthcare technology, patient care, technology, reducing costs, improve security, healthcare benefits
    
Comcast Business
Published By: Comcast Business     Published Date: Jul 10, 2017
The financial services industry is increasingly at a crossroads. Faced with mounting pressure from external forces, such a competition from FinTech companies and a more demanding client base, banks and financial services firms are working to become more customer-centric in their approach to business. However, the need to keep sensitive customer and business information secure and ensure compliance with government regulations can stymie those efforts. The proprietary hardware so prevalent in traditional networks can’t provide what financial institutions need; a growing number, therefore, are turning to software-defined networking (SDN).
Tags : 
financial services, sdn, increase efficiency, reducing complexity, next-generation technologies, financial benefits, security control, lower costs, customer experience
    
Comcast Business
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: Anycast vs. Unicast networks CNAME DDoS and Hijacking Load Balancing and GSLB
Tags : 
    
Oracle + Dyn
Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec
Published By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q119     Published Date: Jan 04, 2019
Digital transformation is poised to change the supply chain more profoundly than any other functional area and more dramatically than at any point in its history in terms of driving efficiency and resiliency to disruption. In the context of the challenges facing supply chains, both now and in the future, it becomes clear that the old ways of working will not suffice and that even best-in-class performance today is unlikely to be good enough in the future. It is the view of IDC that the supply chain must become a "thinking" supply chain, one that is intimately connected to all data sources, enabled with comprehensive and fast analytics, openly collaborative through cloud-based commerce networks, conscious of cyberthreats, and cognitively interwoven. According to IDC supply chain research, technology is emerging as a prime driver of change, particularly artificial intelligence, blockchain, and the Internet of Things (IoT).
Tags : 
    
Group M_IBM Q119
Published By: Mist Systems     Published Date: Jun 19, 2019
Today’s digital classrooms need amazing wireless networks that are predictable, reliable and measurable. By choosing the Mist Learning WLAN, Guilford College graduated to a modern cloud platform that uses AI to automate daily Wi-Fi operations, simplify troubleshooting, and most importantly ensure every student has a great mobile experience.
Tags : 
    
Mist Systems
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: • Anycast vs. Unicast networks • CNAME • DDoS and Hijacking • Load Balancing and GSLB Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This paper discusses the need for and details of a Zero Trust approach to network security. It also itemizes the essential criteria and capabilities required of a Zero Trust solution, explains how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust design.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity
    
Palo Alto Networks
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Threat actors increasingly look toward illicit cryptomining as an easy source of income. Cryptomining is the production of virtual currency, also known as cryptocurrency, such as Bitcoin and Monero. It comes at the expense of system performance and power consumption. Moreover, threat actors are infiltrating networks to use their victims’ computer resources to do this work for them. In this white paper, you will learn how to defend your organization from illicit cryptomining with the Cisco® security portfolio.
Tags : 
    
Cisco Umbrella EMEA
Published By: VMware Citrix     Published Date: Jan 23, 2018
This paper provides guidance for selecting and purchasing a virtual workspace solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile workspace strategy are discussed in detail. Recommendations for the most critical specifications are given to help you in defining an effective virtual workspace strategy for your environment. The intended audience for this paper is enterprises seeking to empower a completely mobile workforce while enabling IT administrators to manage and secure their rapidly changing networks. IT decision-makers and lineof- business leaders alike will find the insights presented helpful for executing a mobile conversion strategy.
Tags : 
buying criteria, mobile, workforce, work solutions, vmware
    
VMware Citrix
Published By: Cisco     Published Date: Jul 08, 2016
Historically, the speed of a wired connection at the access edge has always been faster than that of a wireless connection. This means workers had to choose between the performance of wired connectivity and the convenience of a wireless connection. Consequently, workers often had to modify the way they worked— first, finding a wired port to use for high-bandwidth applications, such as video or streaming media, and then shifting to wireless connections when the need to be mobile was more important than having the performance of wired.
Tags : 
    
Cisco
Published By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : 
botnet, bot, messagelabs, email security, malware, virus
    
MessageLabs
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist
    
MessageLabs
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.