device security

Results 51 - 75 of 577Sort Results By: Published Date | Title | Company Name
Published By: Motorola Solutions     Published Date: May 02, 2019
FORECASTER GUIDE | MANUFACTURING SOLUTIONS 2 What does it look like when all workers at your manufacturing facility can communicate and coordinate seamlessly from any location, device or network? The time is NOW to imagine a world where devices, networks, and locations don’t matter. A world where workers from production lines, to plant managers, engineers, security and beyond can communicate effortlessly and instantly, both on and offsite. A Unified Team Communications solution from Motorola Solutions is what’s NEXT for your facility to make this all possible. This guide was created to help you experience how each and every staff member can work smarter, safer, and minimize unwanted downtime when equipped with intelligence driven communications solutions. See how Unified Team Communications powers the collaboration between all these workers to create the next-generation in smart connected manufacturing:
Tags : 
    
Motorola Solutions
Published By: Motorola Solutions     Published Date: Apr 26, 2019
What does it look like when all members of your hotel staff can communicate and coordinate seamlessly from any location, device or network? The time is NOW to imagine a world where devices, networks, and locations don’t matter. A world where hotel staff from transportation to security, maintenance, operations, housekeeping, and beyond can communicate effortlessly and instantly, both on and off site.
Tags : 
    
Motorola Solutions
Published By: Motorola Solutions     Published Date: Apr 24, 2019
What does it look like when all members of your hotel staff can communicate and coordinate seamlessly from any location, device or network? The time is NOW to imagine a world where devices, networks, and locations don’t matter. A world where hotel staff from transportation to security, maintenance, operations, housekeeping, and beyond can communicate effortlessly and instantly, both on and off site. A Unified Team Communications solution from Motorola Solutions is what’s NEXT for your hotel to make this all possible. This guide was created to help you experience how each and every staff member on and across your properties can work smarter, safer, and deliver a top-notch guest experience when equipped with intelligence driven communications solutions.
Tags : 
    
Motorola Solutions
Published By: Panasonic     Published Date: Apr 23, 2019
Thousands of federal employees are issued mobile devices every year to carry out their agency’s mission. The government has strict security standards for such devices, but a new poll by Government Business Council (GBC) suggests that employee perceptions may be at odds with organizational priorities regarding security of these mobile devices.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy
    
Rubrik EMEA
Published By: Intel     Published Date: Apr 15, 2019
o The growing video surveillance market is driving demand for advanced video analysis technologies. Businesses and organizations from all vertical sectors are looking to leverage the benefits of enhanced detection accuracy and flexibility provided by deep learning to solve their security, safety, and operations challenges. Discover how Agent Vi’s innoVi* leverages cutting-edge deep learning technology to transform the hundreds, or even thousands, of cameras deployed across a city into smart video devices, contributing to the city’s ability to improve security, safety, and incident response citywide.
Tags : 
    
Intel
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in today’s software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises can’t risk security slowing this down.
Tags : 
    
CheckMarx
Published By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Today’s globally distributed and diverse workforce needs flexible yet straightforward access to the corporate network, regardless of user location, device type, employee affiliation, and application location (on-premises, SaaS, IaaS). Expedience and fluidity can’t come at the cost of security, especially given the realities of modern cybercrime. Learn more about the five demands you should make of an updated comprehensive application access solution.
Tags : 
    
Akamai Technologies
Published By: Dell EMEA     Published Date: Mar 05, 2019
In a business environment increasingly threatened by aggressive malware, ransomware and data theft, Dell client devices and the Dell endpoint security portfolio deliver a unique combined hardware and software solution, integrating revolutionary threat prevention with enterprise-class encryption and authentication, all managed from a single console. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMEA
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Jamf     Published Date: Feb 25, 2019
While PCs have historically dominated the workplace, that may not be the case for much longer. Apple devices have experienced explosive growth in recent years, rising 128 percent since 20101. This growth has been attributed to a number of factors including: lower total cost of ownership, improved security, improved productivity and user preference1.
Tags : 
    
Jamf
Published By: Gigamon     Published Date: Feb 20, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security
Tags : 
    
Gigamon
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security.
Tags : 
virtual cloud network, cloud adoption, data automation
    
VMware SD-WAN by VeloCloud
Published By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
    
Flexera
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Learn how Citrix Workspace enables a flexible workplace that helps your organization become productive, innovative, and attractive to top talent. In this eBook, you will learn how to: - Empower employees and teams anywhere, on any device - Simplify and improve both security and endpoint management - Adopt new technologies more quickly and effectively"
Tags : 
    
Citrix Systems
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. To find out more on how Cisco can help with these challenges download this white paper today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Zebra Technologies     Published Date: Jan 30, 2019
Don’t let your legacy devices hold you back. Watch these three exclusive 2018 webinars to learn how Zebra can help you and your organization modernize your warehouse. Webinar #1: The Age of Android in the Enterprise Zebra’s Kevin Lollock, Regional Product Manager, Mobile Computing OS and Developer Platforms will unpack the vast migration to Android™ and the opportunities available for your warehouse and distribution centers. Webinar #2: Modernize the Warehouse with Android Warehouses without Windows®? Mark Wheeler, Zebra’s Director of Supply Chain Solutions discusses the migration to Android devices and shares a vision of the warehouse of the future. Webinar #3: How to Start your OS Migration Zebra’s Ritesh Gupta, Lead for Zebra Learning Services simplifies the steps of migrating to Android devices, including key considerations for planning, management, support and security. Get free access to these Webinars today!
Tags : 
    
Zebra Technologies
Published By: Jamf     Published Date: Jan 14, 2019
The Jamf Pro is the leading mobile device management tool for iOS. Designed to automate common tasks around Apple deployment, inventory and security, Jamf Pro makes mobile device management easy, so you can better ensure a transformative learning experience.
Tags : 
mobile device management, mdm, managed devices, mobile, apple, ios
    
Jamf
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.