it security

Results 51 - 75 of 5499Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 21, 2017
While most business is digital, most organizations still rely on paper for the “last foot” of the process: the sign-off. Continued reliance on paper-based signatures is fraught with risks, including impeding productivity, reducing visibility, hampering compliance?and diminishing the customer experience. Electronic signatures (e-signatures), which are easily implemented from the cloud, help speed up the sales process by reducing errors and bottlenecks, while also ensuring greater security and mobility.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Aug 02, 2017
Marketers can personalize interactions using information that spans complete anonymity to full authentication, with a middle range in which identified data may be used intermittently. The distinction between anonymous and authenticated hinges on personally identifiable information (PII)—information that can be used alone, in combination, or in context to contact an individual. This information includes unique and partial identifiers such as name, address, phone number, and email address, as well as financial, employment, or other data associated with an individual.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection, adobe
    
Adobe
Published By: Adobe     Published Date: Nov 10, 2015
Download this white paper to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, data security, mobile device, enterprise, mobile, security, saas, document management, cloud
    
Adobe
Published By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : 
ibm, document management, data security, productivity, enterprise, mobile, security, saas, document management, cloud
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2016
While most business is digital, and business-to-business and business-to-consumer transactions – and the work that supports them -- are almost entirely digitized, most organizations still rely on paper for the “last foot” of the process – the sign-off. Continued reliance on paper-based signature is fraught with risks, including impeding productivity, reducing visibility, hampering compliance, and diminishing the customer experience. Electronic signatures (e-signatures), which are easily implemented from the cloud, help speed up the sales process by reducing errors and bottlenecks, while also ensuring greater security and mobility. Read this Forbes Insights piece to learn: • How an easy implementation of e-signatures can improve productivity and reduce busywork for your sales team • How improve customer experiences and ease of business with e-signatures increases the likelihood of renewal and retention • How e-signatures easily integrate into your existing sales tools, for seamless pr
Tags : 
sales performance, e-signatures, b2b, b2c
    
Adobe
Published By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 02, 2017
Read this Info-Tech white paper, Security Concerns Overcome: Customers moving to SaaS, and learn five ways you can work with your SaaS vendor that will inspire your confidence in their security skills.
Tags : 
security, saas, customer experience, cloud computing
    
Adobe
Published By: ADP     Published Date: May 02, 2018
How do you create competitive advantage and protect it to build a successful organization for the future? Smart organizations are rethinking their strategies: how to elevate the strengths and productivity of their people and identify the right approach to protect their people and data.
Tags : 
talent acquisition, talent activation, security, data protection
    
ADP
Published By: Aerohive     Published Date: May 13, 2015
This paper gives information on how Aerohive AP130 provides high-performance data rates up to 876Mbps in the 5-GHz band.
Tags : 
aerohive ap130, network infrastructure, aerohive networks, wi-fi security and mobility packages, hardware platform, security, integrated application, wireless
    
Aerohive
Published By: Aerohive     Published Date: May 13, 2015
This ebook reveals how organisations can ensure a secure mobility platform that starts with a single AP.
Tags : 
wi-fi, mobility, security, mobile security, byod, mobility for staff, mobility for guests, mobility for byod, wireless, aerohive, aerohive security solutions, how to secure your network, wlan, wi-fi security
    
Aerohive
Published By: Aerohive     Published Date: Jun 01, 2015
Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Découvrez comment les organisations peuvent intégrer facilement et de manière sûre une gamme d’utilisateurs et de terminaux en fournissant des clés pré-partagées individuelles sur le même SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Lernen Sie, wie man einfach und sicher eine Palette von Benutzern und Geräten aktivieren kann, indem man jedem einen einmaligen Schlüssel zuweist.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security
    
Aerohive
Published By: Aerohive     Published Date: Aug 03, 2015
Dieses Whitepaper dient als Leitfaden und erläutert die nötigen Anforderungen an Konnektivität und Produktivität, um Ihr Netzwerk auf die Mobilitätswelle vorzubereiten.
Tags : 
mobility, mobility technology, wireless. connectivity, network, security, byod
    
Aerohive
Published By: Aerohive     Published Date: Sep 25, 2015
Testez par vous-même l’éventail complet des fonctionnalités d’un point d’accès Aerohive. Assistez à ce webinaire le jeudi 8 octobre 2015 à 11 h CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Published By: Aerohive     Published Date: Sep 25, 2015
DONNERSTAG 8. OKTOBER 2015 UM 11:00 UHR
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Published By: Aerohive     Published Date: Sep 25, 2015
Experience first-hand the full feature set of an Aerohive Access Point. Attend this webinar on Thursday 8 October 2015 at 11:00 CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Published By: Aerohive     Published Date: Sep 18, 2015
SIMPLI-FI ENTERPRISE NETWORKING THURSDAY 8 OCTOBER 2015 AT 11:00 AEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Published By: Aerohive     Published Date: Sep 25, 2015
SIMPLI-FI ENTERPRISE NETWORKING THURSDAY 8 OCTOBER 2015 AT 11:00 BST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Published By: Aerohive Networks     Published Date: May 06, 2015
Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi, security, network security, bandwith limitations, ssid
    
Aerohive Networks
Published By: Ahead     Published Date: Aug 08, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, they’re realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is well-intended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular-- Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through missteps and how to get it right.
Tags : 
    
Ahead
Published By: Ahead     Published Date: Nov 15, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, they’re realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is wellintended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular--Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through common missteps and how to get it right.
Tags : 
    
Ahead
Published By: Ahead     Published Date: Nov 15, 2018
If your business is like many other organizations that are in the process of enabling a Microsoft Azure public cloud platform, then you might be struggling with the guardrails needed to secure and manage cost, while at the same time enabling flexibility for the teams consuming cloud services. While the Azure platform is already very secure, it also allows a great deal of flexibility in configuration. In order to avoid accidentally creating security holes and out-of-control spend, a Governance Framework is required. We created the AHEAD Azure Governance framework to allow enterprises to develop and maintain a fully optimized, and secure environment. The resulting framework will be tailored to your organization’s specific business and compliance needs, as every enterprise is different. This guide will introduce you to the components of this necessary Azure Foundational Governance Design.
Tags : 
    
Ahead
Published By: Ahead     Published Date: Jan 10, 2019
A January 2018 commissioned study conducted by Forrester Consulting on behalf of ServiceNow How a Representative Organization Resolved Security Incidents 45% Faster This Forrester Study provides a framework and customer example to help readers evaluate the potential financial benefits of investing in ServiceNow Security Operations. To understand and illustrate the benefits, costs, and risks associated with ServiceNow, Forrester interviewed three current Security Operations customers to create a representative organization. This organization: Improved vulnerability response times by 25% Prioritized vulnerabilities 60% faster Achieved 230% ROI Download this study to evaluate the Total Economic Impact of using ServiceNow Security Operations to deliver fast and efficient security response.
Tags : 
    
Ahead
Published By: Ahead     Published Date: Jun 05, 2019
Digital Business Continues to Move the Cyber Goal Posts Fortune magazine estimates that by the year 2020, US companies will spend $101 billion per year on cyber security, up 38% from 2016. With all of the money being invested in cyber security, why do the pace and complexity of new security threats continue to rise year after year? A big reason is that today’s digital business involves a more mobile workforce with expectations of immediate and on demand access to data fronted by intuitive and engaging user experiences, and often underpinned by public cloud infrastructure for increased agility and time to market.
Tags : 
    
Ahead
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.