customer security

Results 226 - 250 of 382Sort Results By: Published Date | Title | Company Name
Published By: Intralinks     Published Date: Jun 18, 2013
Intralinks a New York based company, has announced the general availability of its new Intralinks VIA service, and unveiled new brand containers for existing core services in extra-corporate document-based collaboration. Intralinks VIA, in development for nearly two years, is initially positioned to serve "the rest" of the employee population inside customers, which already use Intralinks. Download this white paper to learn more about the role of Intralinks in the broader business collaboration market, with more robust security, controls, and other necessary features for enterprise use.
Tags : 
enterprise, file sharing, collaboration, technology, market, security, new news
    
Intralinks
Published By: Jamf     Published Date: Aug 12, 2019
A well-planned cyberattack or an accidental download of malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security.
Tags : 
    
Jamf
Published By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : 
javelin, debix, customer service, customer experience, damage control, data breach, security breach
    
Javelin Strategy & Research
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies
    
KEMP Technologies
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Is Windows 10 right for your business? Get All the Answers in This Comprehensive Guide to Windows 10. Making the decision to upgrade your OS in a multi-platform environment can be scary, and worse, risky! Put your mind at ease with this detailed guide to Windows 10 and Enterprise: Upgrade the Way You Work. You'll get details on: • All the new features • Security upgrades • Migration options Get the whitepaper now.
Tags : 
technology solutions, customer feedback, software, data security, encryption, cyberattacks
    
Lenovo and Intel®
Published By: Lenovo and Microsoft     Published Date: Oct 17, 2016
Is Windows 10 right for your business? Get All the Answers in This Comprehensive Guide to Windows 10. Making the decision to upgrade your OS in a multi-platform environment can be scary, and worse, risky! Put your mind at ease with this detailed guide to Windows 10 and Enterprise: Upgrade the Way You Work. You'll get details on: • All the new features • Security upgrades • Migration options Get the whitepaper now.
Tags : 
technology solutions, customer feedback, software, data security, encryption, cyberattacks
    
Lenovo and Microsoft
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: LiveOps     Published Date: Aug 03, 2012
This paper will first discuss the impact of cloud computing, consumerization of IT, and the emergence of social media in driving the transition from traditional on-premises call centers to a superior model, the cloud contact center.
Tags : 
cloud computing, consumerization of it, consumerization, on-premises call centers, cloud contact center, contact center operations, functionality, cloud-based customer service, mirgation, social media, crm, customer relations management, availability, innovation, scalability, security, self-service, staffing, workforce
    
LiveOps
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer support is predicated on the instances when customers can’t solve their problem or get answers to their question(s) on their own. In some of those cases, such as phone calls or live chats, it can be difficult for agents to identify and resolve the issue without additional visual assistance. With co-browse, agents can see what the visitor sees, provide guided assistance by highlighting items or filling out forms on a visitor’s behalf. Sensitive fields like social security numbers and passwords can be blocked from the agent’s view so private information remains just that, private. Bold360’s co-browse allows agents to follow visitors behind secure fields i.e. signing into their account – providing an extra level of support to customers.
Tags : 
browse, web, customers, security
    
LogMeIn
Published By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection
    
Logrhythm
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: McAfee     Published Date: Feb 06, 2013
Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies.
Tags : 
big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected
    
McAfee
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security Innovation Alliance Partners have integrated, tested, and certified their security solutions to work with McAfee Enterprise Security Manager. We have collaborated with our partners to simplify the integration of these products in even the most complex customer environments. This provides a truly connected security ecosystem that optimizes the value of your existing investments, improves efficiency, maximizes protection, and reduces operational costs.
Tags : 
entity, analytics, mcafee, enterprise, security, customer, environments
    
McAfee EMEA
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Here’s a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of today’s reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Microsoft     Published Date: Jul 20, 2018
When you’re in the software business, your resources can be spread pretty thin. You like to stay focused on building great software, but there are always distractions— from supporting sales opportunities to assisting with customer deployments and troubleshooting existing installations. With so much time spent maintaining the status quo, few cycles remain for modernizing your technology, streamlining internal operations, delivering new customer value, and broadening your customer base. More likely than not, your offerings are based on an on-premises approach, forcing you and your customers to spend considerable time on essential requirements like infrastructure, scalability, availability, and security. Today, you still must deliver on those essentials, but the solutions you’re building—or, more accurately, the solutions you want to be building—need to do a lot more: support millions of users, span the globe, make sense of petabytes of data, and wow users in new ways. At the same time, y
Tags : 
    
Microsoft
Published By: Microsoft Azure     Published Date: Apr 11, 2018
When you extend the global reach of your enterprise, you’ll find new markets for your products and services. That means reaching more potential customers, bigger growth potential, and higher ROI. But to tap into those emerging markets, you need to provide the best, most consistent user experience. Now, it’s possible for you to build, deploy, and manage modern apps at scale with a globally-distributed database—without the hassles associated with hosting in your data center. Read the e-book Build Modern Apps with Big Data at a Global Scale and learn how Azure Cosmos DB, a globally-distributed turnkey database service, is transforming the world of modern data management. Keep access to your data available, consistent, and safe—with industry-leading, enterprise-grade security and compliance. Start developing the best app experience for your users based on five well-defined consistency models: Strong: Favors data consistency. Ideal for banks, e-commerce processing, and online booking. Boun
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Make sure you’re getting the most out of your data and the artificial intelligence (AI) technologies available. Read the e-book, Six cloud data challenges solved for app developers and get actionable answers. Learn the best approach when faced with six familiar data scenarios: Keeping track of essentials such as scalability and availability. Making sure your app delivers consistent service to multiple customers. Delivering data in real time, across the globe, without the complexities of multiple datacenters. Creating actionable insights from big data. Incorporating artificial intelligence into your apps. Locking down security while building in the cloud.
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Your company is a cloud-engaged Independent Software Vendor (ISV) evaluating various Software-as-a-Service (SaaS) platforms to strengthen your various product offerings. With so many options, you’re wondering how to begin. Fortunately, the industry experts at Frost & Sullivan have created a short guide to help you decide, covering such areas as: Innovation Speed to market Customer reach Security ROI Ready to get serious with your choice of SaaS provider? Fill out the form at right to read the free executive brief.
Tags : 
    
Microsoft Azure
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
    
Microsoft Windows
Published By: Mimecast     Published Date: Mar 13, 2017
The EU General Data Protection Regulation (GDPR) is arriving soon. You may think your organization is immune from its impact, but if you do business with any customers in the EU, think again. You’ll need to rethink and possibly re-do your organizational processes around compliance and oversight. It may seem like a daunting task. The Forrester Research Brief “You Need an Action Plan for the GDPR” helps your security, regulatory and privacy teams grasp five must-have changes necessary to comply with the GDPR.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance."
Tags : 
forrester, gdpr, organizational processes, security, compliance
    
Mimecast
Published By: Mimecast     Published Date: Apr 25, 2017
Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance.
Tags : 
gdpr, security, regulation, forrester
    
Mimecast
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.