security investment

Results 51 - 75 of 119Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle
Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast
Published By: IBM APAC     Published Date: Mar 19, 2018
We know that flash storage can provide significant benefits and deliver needed agility for large businesses, but what about medium-sized businesses (MMB = 500 to 999 employees)? IBM asked Forrester Consulting to look into adoption and use of flash storage technologies by mid-market organizations. A snapshot survey of 106 IT professionals found the following: › MMBs are actively adopting flash storage › Flash is exceeding expectations regarding cloud management, flexibility and security › A majority of respondents expect to continue their investments, with almost half aspiring to an all-flash storage environment. To learn more download this report.
Tags : 
    
IBM APAC
Published By: Solidcore     Published Date: Jan 07, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.
Tags : 
pci, pci dss, pci compliance, compliance, payment card, credit card, data protection, data security, database security, cost of non-compliance, customer data, solidcore, fortrex
    
Solidcore
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications
    
Oracle
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: OKTA     Published Date: Oct 23, 2017
As organizations and workplaces evolve, less control is exercised over devices, services, and people, leading to a gap with traditional security tools. Identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments. Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore what characteristics a strong authentication solution should include as we demo Okta’s Adaptive MFA solution.
Tags : 
    
OKTA
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI). Entrust’s cloud-based PKI service eliminates up-front capital investment and significantly reduces on-going operation cost associated with in-house PKI software, provides built-in maintenance capabilities and speeds deployment time.
Tags : 
entrust, identityguard, pki, certificate based security, security, pki software, cloud
    
Entrust Datacard
Published By: Aberdeen Group     Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
Tags : 
aberdeen, ev ssl server certificate, extended validation, key management solution, encryption, security investment, scg, ssl, certificate, ecommerce
    
Aberdeen Group
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
    
Citrix Systems
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Infosys     Published Date: May 22, 2018
When one of our client's most strategic web applications was hacked, it was something of a wake-up call. Application security is surprisingly often an afterthought, and serious investment is only sometimes made when security breaches are discovered. Effectively, companies try to close the stable door after the horse has bolted. However, preventive security maintenance of apps is far more cost-effective and less damaging than reactive security. Our client therefore asked us to put in place an app security testing program early in the development life cycle to reduce the chances of similar breaches in the future.
Tags : 
security, technology, data, app, device, web
    
Infosys
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: Okta APAC     Published Date: Dec 19, 2018
Multifactor authentication (MFA) is a critical security requirement for every organization, regardless of size and industry. But not every MFA solution is created equal. Your investment in MFA should be well-thought-out. Not only does your chosen MFA solution need to meet the requirements you have today, but it needs to enable and secure the future growth and evolution of your business. This evaluation guide will help you understand the key factors you need to consider when investing in MFA. Your MFA choice determines how well you can protect access to all your internal resources, as well as your ability to provide frictionless experiences for your internal employees and external customers. Your MFA choice also impacts your ability to grow your business and take advantage of emerging technologies and future innovations. As part of Okta’s identity-led security framework, Okta Adaptive MFA delivers on the key considerations that need to be part of your search for a solution that meets a
Tags : 
    
Okta APAC
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps
    
Cisco
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security Innovation Alliance Partners have integrated, tested, and certified their security solutions to work with McAfee Enterprise Security Manager. We have collaborated with our partners to simplify the integration of these products in even the most complex customer environments. This provides a truly connected security ecosystem that optimizes the value of your existing investments, improves efficiency, maximizes protection, and reduces operational costs.
Tags : 
entity, analytics, mcafee, enterprise, security, customer, environments
    
McAfee EMEA
Published By: Red Hat     Published Date: Dec 15, 2017
Virtualization can vastly improve efficiency, free up resources, and cut costs-without sacrificing performance, security, and existing investments. This testimonials document lists 15 enterprise customers who are using Red Hat Virtualization and 4 of them share how it's helping their business and why they chose Red Hat.
Tags : 
    
Red Hat
Published By: LockLizard     Published Date: Dec 09, 2008
NetMasterClass, as with all advanced elearning providers, have to be able to offer their training courses at any time with total availability – across the Internet.  NetMasterClass have made a significant investment in the development of proprietary training methods and techniques and have already experienced having their IPR stolen and made publicly available.
Tags : 
locklizard, netmasterclass, elearning, security, drm, return on investment, elearning security, protect, online training, elearning, intellectual property theft
    
LockLizard
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview covering threat management, identity and access, data protection, and monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview animation covering threat management, identity and access, data protection, monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, animation
    
Intel
Published By: McAfee     Published Date: Apr 25, 2014
While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what measures are being taken to defend against it.
Tags : 
advanced malware, protection, network breaches, intrusion provention systems (ips), web and email gateway protection, tracking malware, malware analysis and detection, blocking and remediating malware, sandbox technology, network protection, integrating security systems
    
McAfee
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Tyco Integrated Security Video Auditing enables the company to leverage their existing quality control and production procedure, providing more functionality without a huge investment.
Tags : 
tyco, security, food processing, manufacturing, quality control
    
Tyco Integrated Security
Start   Previous    1 2 3 4 5    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.