oss security

Results 301 - 325 of 453Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Nov 12, 2014
Webinar showcasing best practices for implementing data loss preventino (DLP). Featuring Michael Avdeev, Enterprise Security Architect for the Intel Security Group.
Tags : 
data loss prevention, dlp, best practices, dlp implementation
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network survival, network security management, best practices, firewalls, hacker detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
NSS Labs performed rigorous testing of McAfee Endpoint Security v10.5 across a multitude of attack threat vectors targeting a very dynamic enterprise class endpoint attack surface. In addition, McAfee Endpoint Security v10.5 was evaluated for it's resistance against several evasion categories and false positive testing. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee's participation. Download a complimentary copy ($750 value) of this NSS Labs individual test report that provides detailed information not available elsewhere.
Tags : 
endpoint attack, endpoint protection, security, nss
    
McAfee
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The top concern of all of respondents with moving to IaaS is having consistent security controls that provide integrated security with central management across all cloud (private and public) and traditional data center infrastructure. The top concern of all of respondents with moving to IaaS is having consistent security controls that provide integrated security with central management across all cloud (private and public) and traditional data center infrastructure.
Tags : 
cloud, usage, data, infrastructure, private, public, security, integration
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
The General Data Protection Regulation (GDPR) will deliver a long overdue modernization and harmonization of privacy and data protection laws across the EU. It replaces legislation that was drafted before phones became smart and the cloud came to transform business. This guide will help you prepare for the GDPR. It outlines the key facts and figures, the questions organizations should ask to help assess their stage of readiness, and a comprehensive toolkit to help develop the capabilities needed to become GDPR-ready. Finally, we offer a short reference sheet covering the key information security professionals need to be prepared.
Tags : 
    
McAfee EMEA
Published By: McAfee Inc     Published Date: Aug 19, 2009
Most midsized businesses aren't fully aware of the number of vulnerabilities that exist on their networks. Is it possible to address them all? This brief explains the key benefits of implementing a network security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, hackers, security, data protection
    
McAfee Inc
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
    
Microsoft
Published By: Microsoft Azure     Published Date: Apr 11, 2018
When you extend the global reach of your enterprise, you’ll find new markets for your products and services. That means reaching more potential customers, bigger growth potential, and higher ROI. But to tap into those emerging markets, you need to provide the best, most consistent user experience. Now, it’s possible for you to build, deploy, and manage modern apps at scale with a globally-distributed database—without the hassles associated with hosting in your data center. Read the e-book Build Modern Apps with Big Data at a Global Scale and learn how Azure Cosmos DB, a globally-distributed turnkey database service, is transforming the world of modern data management. Keep access to your data available, consistent, and safe—with industry-leading, enterprise-grade security and compliance. Start developing the best app experience for your users based on five well-defined consistency models: Strong: Favors data consistency. Ideal for banks, e-commerce processing, and online booking. Boun
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Make sure you’re getting the most out of your data and the artificial intelligence (AI) technologies available. Read the e-book, Six cloud data challenges solved for app developers and get actionable answers. Learn the best approach when faced with six familiar data scenarios: Keeping track of essentials such as scalability and availability. Making sure your app delivers consistent service to multiple customers. Delivering data in real time, across the globe, without the complexities of multiple datacenters. Creating actionable insights from big data. Incorporating artificial intelligence into your apps. Locking down security while building in the cloud.
Tags : 
    
Microsoft Azure
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Windows 10 is the best Windows yet, and at Microsoft, we are excited to deliver innovative Windows 10 experiences across a wide variety of world-class devices. Get the most out of Windows 10 with innovative hardware form factors that boost user productivity while reducing security risks—delivering more value at every price point. Download this buyer's guide to discover which Windows 10 Pro devices are right for your business.
Tags : 
    
Microsoft Windows
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management, data protection
    
Mimecast
Published By: Mimecast     Published Date: Nov 10, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, software as a service, saas, data loss prevention, risk and compliance, email, security
    
Mimecast
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365, extensive use of email, primary file transport, content management systems, reduced employee productivity, extended productivity loss, it disruption, security management risks, content management risks
    
Mimecast
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Mimecast     Published Date: Mar 13, 2017
The EU General Data Protection Regulation (GDPR) is arriving soon. You may think your organization is immune from its impact, but if you do business with any customers in the EU, think again. You’ll need to rethink and possibly re-do your organizational processes around compliance and oversight. It may seem like a daunting task. The Forrester Research Brief “You Need an Action Plan for the GDPR” helps your security, regulatory and privacy teams grasp five must-have changes necessary to comply with the GDPR.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Although many organizations are switching email accounts to Microsoft Office 365, they may well be exposing themselves to a wide range of security risks, data loss, and business continuity issues. This white paper explores how to use Microsoft Office 365 while protecting organizations from various security risks. Discover: • What to look for in third-party solutions • How to protect archived data • How to ensure business continuity
Tags : 
office 365, security, email security, archived data
    
Mimecast
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: MobileIron     Published Date: Jul 31, 2015
Most large organizations deploy or intend to deploy a broad range of mobile apps to their employees for productivity, collaboration, CRM, ERP, analytics, and industry-specific business processes. Office 365 might be the productivity solution, but the IT team needs a central platform that can provide a consistent security and policy framework across all the mobile apps the organization will deploy both today and tomorrow. This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : 
office 365, mobileiron, crm, erp, analytics, security model, mobile apps
    
MobileIron
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : 
ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
    
MobileIron
Published By: MobileIron     Published Date: Sep 07, 2017
Secure corporate data, drive employee productivity, and enable business innovation in ways you never thought possible. Harness the power of mobile devices with the leading enterprise mobility management (EMM) platform from MobileIron. By providing a modern EMM solution that meets both user demands and IT security requirements, MobileIron enables today’s large enterprises to become truly Mobile First.
Tags : 
mobileiron, information technology, platform, security, mobile devices
    
MobileIron
Published By: Motorola Solutions     Published Date: Jul 02, 2018
We all want our nation’s schools to be safe, secure learning environments where students can realize their full potential. This requires reliable, continuous communication among school personnel, both onsite and district-wide, plus the ability to instantly connect with first responders in an emergency. This seamless communication must be delivered over any network, from any location, using any device. Team Communications from Motorola Solutions provides this seamless integration, helping schools preserve the all-important safety of their students. Team Communications empowers educational institutions to transform how they communicate, enabling individuals to share real-time information to make schools safer and staff more productive. Schools across the U.S. use Team Communications from Motorola Solutions to deliver unified voice and data to administrators, teachers, maintenance, security, coaches, and other personnel, improving decision making, increasing visibility into school activit
Tags : 
    
Motorola Solutions
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.