security leaders

Results 1 - 25 of 143Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
A security orchestration, automation and response (SOAR) platform is a valuable tool for organizations who have made appropriate investments in their security operations processes. This recent research from Gartner looks at the necessary preparations that security leaders need to make so that the deployment of a SOAR solution will improve the efficiency of their incident response and security operations teams.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
According to the latest research from Gartner, SOAR solutions are gaining visibility and real-world use driven by early adoption to improve security operations centers (SOCs). The first market guide from Gartner to cover the SOAR solution market provides analysis and direction on the current state of the SOAR market, as well as recommendations and key findings to help security and risk management leaders evaluate how a SOAR solution can improve their ability to prioritize security operations activities, formalize triage and incident response, and automate response.
Tags : 
    
Group M_IBM Q4'19
Published By: Sift     Published Date: Aug 29, 2019
As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach
Tags : 
    
Sift
Published By: Adobe     Published Date: Oct 08, 2019
Gartner evaluates eighteen digital commerce platforms and for the second year in a row, Gartner has identified Magento Commerce as an Industry Leader (top 3). According to Gartner, Leaders execute well against their current vision and are well-positioned for tomorrow. Magento Commerce, part of Adobe Experience Cloud, is innovating on platform functionality to help businesses like yours with the performance, scalability, and security required to deliver full-lifecycle customer experiences. Digital commerce platform choice has grown in complexity due to increased vendor choice and breadth of offerings, pricing model complexity and emerging managed service offerings. This report evaluates 18 vendors of digital commerce platforms to assist application leaders supporting digital commerce.
Tags : 
    
Adobe
Published By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Cisco     Published Date: Jul 08, 2016
This primer offers some strategies to help IT communicate the full value of mobility to key security stakeholders in the organization. It explains why partnering with IT is their smartest path to success.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
So what do end-users—companies in the process of building or upgrading their data centers today—think of the security problems they face? We conducted this survey to answer key questions about buyers’ plans for security in their data centers.
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Is your organization prepared for a cyberattack? Most aren’t. 86% of organizations surveyed lack adequate cybersecurity capabilities. Read MIT Technology Review’s latest infographic, based on their survey of 225 business and IT leaders, and learn if you have cybersecurity holes and how to patch them.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Published By: Dell EMC     Published Date: Oct 10, 2019
Security leaders have been in front of boards and executive committees long enough to know that security metrics that simply portray statistics from monitoring tools, or count the number of malware attacks, add relatively little value to strategy and budget decisions. Protecting sensitive customer and company data shouldn’t be just a compliance obligation, it should be a business imperative. This is exactly why the right technology partners will help push security, risk, and compliance objectives forward. In March 2019, Dell commissioned Forrester Consulting to evaluate the evolving security trends and technology needed to protect and enable employees. Our study found that empowering employees while adhering to security protocols improves employee productivity. Forrester conducted an online survey of 887 senior business and IT decision makers to explore this topic. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Oracle EMEA     Published Date: Jul 22, 2019
How confident are you and your peers about the data and security practices you’re working with? We asked 5,000 executives globally, across 24 markets and have some interesting results to share. For example, up to half of IT leaders consider their data is manageable but struggle to gain meaningful insights from it. Yet, while AI and autonomous technology could help relieve this situation, they aren’t high on the priority list. Read our report to find out more about executives’ views about data in connection with security, ethics, and visualisation. Read the report
Tags : 
    
Oracle EMEA
Published By: Dell     Published Date: Dec 12, 2017
Workers expect a high-quality workplace and the ability to be productive anywhere. As people increasingly prefer tablets and laptops, organizations are reassessing their continued investment in traditional PCs. Download "Security and Productivity Benefits Drive Increased Micro PC Adoption" for the latest research how business and IT leaders are rethinking the role of PCs.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Aug 17, 2017
This report highlights a unique approach to enabling IT to succeed in the digital age—a fully engineered converged infrastructure with richly supported capabilities for management, updates and configuration, security, and overall resilience. In particular, this report targets Dell EMC’s distinctive leadership in converged/hyper-converged infrastructure, while highlighting the many compelling benefits achieved in two real-world deployments: an enterprise and a global service provider.
Tags : 
it transformation, digital transformation, converged infrastructure, hyper-converged infrastructure, deployments
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC
Published By: Cisco     Published Date: Sep 21, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive. Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex Download this eBook to find the elements of complexity we have to deal with today.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Start   Previous   1 2 3 4 5 6    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.