safe

Results 276 - 300 of 959Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: Panaya     Published Date: Aug 09, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: • Strategiaclly align feature releases and backlogs with your overall business strategy • Identify and prioritize dev and test activities with visibility into project waves and portfolios • Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks • Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360
Published By: Enterprise Mobile     Published Date: Sep 23, 2013
Gone are the days when mobility involved simply choosing a standardized device. Today, Enterprise IT leaders have to think about not just devices, but apps, data, storage, management (of devices, apps, content, and telecom expenses), security, and support. If you don’t consider your overall business goals as you develop and refine your mobility strategy, you risk investing in mobile technology for mobility’s sake alone. Smart decisions make it easier to adapt over time while keeping a lid on costs. Skyrocketing mobility costs are a common fear for organizations, but careful planning will help keep your mobility spend safely earthbound.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, mobility planning, enterprise mobility
    
Enterprise Mobile
Published By: Epson     Published Date: Mar 15, 2019
Learn how augmented reality glasses and drones are being used in advanced search and rescue operations. Epson’s Moverio smart glasses allow drone pilots to have a heads-up, line-of-sight flight experience, resulting in safer, more productive operations. Moverio enables real-time access to aerial sensor data from a DJI enterprise drone, allowing operators to see: Temperature data Imagery through smoke Locations of victims How full a tank is Make the most out of your Enterprise DJI drone with Epson’s Moverio Augmented Reality glasses. Click now to schedule a demo
Tags : 
    
Epson
Published By: Cisco     Published Date: Sep 16, 2015
Smart technologies are a force multiplier for public safety agencies.
Tags : 
public safety, data, cloud, communication, ioe
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
Smart technologies are a force multiplier for public safety agencies, allowing them to serve growing populations even as public spending remains constrained. The Internet of Everything (IoE) provides the connective tissue in this evolving operational environment — not only bringing together objects embedded with electronics, software and sensors, but making them work together in the service of better policing. The IoE makes it possible to collect data and share it via the cloud, uniting disparate jurisdictions, agencies and ranks of command in positive ways. These smart and connected technologies promote collaboration and transparency among public safety agencies, revolutionizing how police, fire, courts and corrections do some of the nation’s most important work.
Tags : 
public safety, data, cloud, communication, ioe
    
Cisco
Published By: Aladdin     Published Date: Aug 21, 2009
This in-depth 14-page white paper explains all available anti-spam techniques and how they are used by eSafe. It also includes a "Dare to Compare" competitive matrix for easy vendor/solution selection.
Tags : 
spam, anti-spam, anti spam, comparison guide, comparison chart, comparison table, email security, anti-spam software
    
Aladdin
Published By: Damballa     Published Date: Oct 03, 2014
The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence
Tags : 
damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
    
Damballa
Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
In order to ensure that your visitors can see that your Web site has passed Extended Validation (EV) authentication, VeriSign created VeriSign® EV UpgraderT-the first-ever solution to enable all visiting Windows® Internet Explorer® 7 (IE7) browsers to detect EV SSL Certificates and display them appropriately.
Tags : 
ssl, ssl technology, verisign, trust, seal, ev ssl, ssl certificate, trust mark
    
VeriSign Incorp.
Published By: Symantec.cloud     Published Date: Apr 27, 2010
Spammers reach new heights of inventiveness and professionalism. Understand the latest spam threat.
Tags : 
messagelabs intelligence, symantec hosted services, spam threat, web security services, security safeguard
    
Symantec.cloud
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: DigiCert     Published Date: Jun 19, 2018
Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. Website security must be evolved in line with these growing threats and challenges. Download this whitepaper to find out more about how Digicert can help.
Tags : 
    
DigiCert
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper will explore the impacts of fatigue that extend beyond personal safety and outline effective remedies for this widespread concern.
Tags : 
workforce software, fatigue, personal safety
    
Workforce Software
Published By: McAfee     Published Date: Mar 08, 2013
Databases don’t take the day off. Neither do we. McAfee security experts remain focused on keeping your sensitive information safe and available while helping your company ensure compliance with internal policies and industry regulations.
Tags : 
database security, database compliance, database virtual patching, database breach, application control, legacy databases
    
McAfee
Published By: Red Hat Government     Published Date: Jul 21, 2011
Do you have an effective cloud governance plan? This whitepaper guides you through best practices for ensuring your applications and data can safely move between clouds - whether they are private, public or hybrid.
Tags : 
cloud governance, governance, consistency, portability, consistant, portable, cloud computing, interoperability
    
Red Hat Government
Published By: BMC Control M     Published Date: Jul 16, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster
    
BMC Control M
Published By: BMC Software     Published Date: Jun 30, 2009
Deploying agent software on every system to run scheduled jobs is expensive, both to install and maintain. In this white paper, independent analyst firm Enterprise Management Associates highlights the cost-savings, flexibility, and agility of the agentless job scheduling technology built in to BMC CONTROL-M.
Tags : 
tco, total cost of ownership, bmc, product suite, wla, agentless, enterprise management associates, ema
    
BMC Software
Published By: Amazon Web Services EMEA     Published Date: Apr 16, 2019
By placing the future of transportation in the cloud, governments can improve the performance of technology infrastructure and focus on delivering innovative services to citizens, without increasing costs. You can start that journey today. In this eBook, you will learn about: • Life-saving digital initiatives on US streets • Valuable data insights across UK airports • Scalable ticketing services for Turkey’s Istanbul Deniz Otobüsleri ferry passengers • Cost savings for Singapore’s Land Transport Agency • Scalable, secure innovation at speed
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: Znode     Published Date: Jan 10, 2011
Since 1842, The Fechheimer Brothers Company, a Berkshire Hathaway Company, has been manufacturing uniforms for the public safety industry. The company maintains the largest in stock offering of public safety uniforms in the U.S., and also produces custom uniform programs to meet customers' specific requirements.
Tags : 
znode, marketing, ecommerce, online distribution, retail, development, integration, erp
    
Znode
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Partnering with Spectrum Enterprise sustains client loyalty by instilling confidence in how the bank operates, provides superior network service level agreements that ensure minimal downtime and assures smoother state and FDIC audits thanks to cybersecurity safeguards such as built-in redundancy and private network service.
Tags : 
    
Spectrum Enterprise
Published By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
    
Akamai Technologies
Published By: Metrasens     Published Date: Jun 28, 2019
The goal of any healthcare organization is to help patients live happier, healthier lives. However, healthcare facilities must also keep patients and staff safe within those environments of healing — and as healthcare assaults continue to rise, this task is becoming more difficult every year.
Tags : 
    
Metrasens
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.