technology security

Results 1 - 25 of 532Sort Results By: Published Date | Title | Company Name
Published By: MicroStrategy     Published Date: Nov 08, 2019
In today’s rapidly changing technology landscape, it’s critical for organizations to invest in systems that can keep up with changing needs. Cloud technology is rising to the occasion because it provides a cost-effective way to deploy flexible analytics solutions--with little capital investment. If your organization is considering a move to the cloud, be sure to read this whitepaper for an in-depth analysis of how it can help accelerate your business. The paper covers key considerations around: Time to value: deploying applications faster than ever Elasticity: scaling data and users with ease Flexibility: rapidly adapt to changing requirements Security: adhere to key compliances and certifications and secure data at every level Total cost of ownership: realize significant savings from migrating to the cloud
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
In today’s rapidly changing technology landscape, it’s critical for organizations to invest in systems that can keep up with changing needs. Cloud technology is rising to the occasion because it provides a cost-effective way to deploy flexible analytics solutions--with little capital investment. If your organization is considering a move to the cloud, be sure to read this whitepaper for an in-depth analysis of how it can help accelerate your business. The paper covers key considerations around: Time to value: deploying applications faster than ever Elasticity: scaling data and users with ease Flexibility: rapidly adapt to changing requirements Security: adhere to key compliances and certifications and secure data at every level Total cost of ownership: realize significant savings from migrating to the cloud
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
In today’s rapidly changing technology landscape, it’s critical for organizations to invest in systems that can keep up with changing needs. Cloud technology is rising to the occasion because it provides a cost-effective way to deploy flexible analytics solutions--with little capital investment. If your organization is considering a move to the cloud, be sure to read this whitepaper for an in-depth analysis of how it can help accelerate your business. The paper covers key considerations around: Time to value: deploying applications faster than ever Elasticity: scaling data and users with ease Flexibility: rapidly adapt to changing requirements Security: adhere to key compliances and certifications and secure data at every level Total cost of ownership: realize significant savings from migrating to the cloud
Tags : 
    
MicroStrategy
Published By: Resolver     Published Date: Nov 01, 2019
Together with ASIS International, Resolver polled corporate security professionals in the ASIS community about the state of security management in 2019. Based on the results, Resolver examined current practices and trends in the systems and technologies involved with managing incidents and assessing threats. Watch this webinar for access to the survey results where Resolver identified the top incidents organizations face, where security teams are planning technology improvements or upgrades, and how they use incident management to assess future threats. You’ll walk away with the information you need to benchmark your team, as well as practical tactics to collect relevant data to help allocate and maximize your security budget for 2020.
Tags : 
    
Resolver
Published By: Dell EMC     Published Date: Oct 10, 2019
Security leaders have been in front of boards and executive committees long enough to know that security metrics that simply portray statistics from monitoring tools, or count the number of malware attacks, add relatively little value to strategy and budget decisions. Protecting sensitive customer and company data shouldn’t be just a compliance obligation, it should be a business imperative. This is exactly why the right technology partners will help push security, risk, and compliance objectives forward. In March 2019, Dell commissioned Forrester Consulting to evaluate the evolving security trends and technology needed to protect and enable employees. Our study found that empowering employees while adhering to security protocols improves employee productivity. Forrester conducted an online survey of 887 senior business and IT decision makers to explore this topic. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Nozomi     Published Date: Oct 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: IBM APAC     Published Date: Sep 30, 2019
Companies that are undergoing a technology-enabled business strategy such as digital transformation urgently need modern infrastructure solutions. The solutions should be capable of supporting extreme performance and scalability, uncompromised data-serving capabilities and pervasive security and encryption. According to IDC, IBM’s LinuxONE combines the advantages of both commercial (IBM Z) and opensource (Linux)systems with security capabilities unmatched by any other offering and scalability for systems-of-record workloads. The report also adds LinuxONE will be a good fit for enterprises as well as managed and cloud service provider firms. Read more about the benefits of LinuxONE in this IDC Whitepaper.
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: Sep 30, 2019
Digital technology is changing the financial services industry rapidly with automated process, AI insights, customized experiences, new operating models and next generation applications. In such a scenario how should banks innovate and stay ahead of the game? This e-book will provide you the best strategies and recommendations for modernizing your IT infrastructure and operations. You’ll learn how to lead disruption and manage rapid change for your bank, its operations and its customers. Here are the five key takeaways: • Personalize customer experiences by maximizing your data • Borrow strategies from open banking and new business models • Step up your security game • Drive innovation from the inside out • Design an agile infrastructure to support participation in new digital marketplaces Find out more in the e-book.
Tags : 
    
IBM APAC
Published By: Oracle     Published Date: Sep 30, 2019
Do you want more powerful insights from your data? Are you looking for ways to make your data more secure? Hear how you can do this using technology, AI, machine learning, and automation in a secure, compliant, and sustainable way. In this episode of tomorrow talks with IDC and Oracle the conversation moves on from who’s responsible for data security to making sure data delivers value. To find out more download the webinar today.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 09, 2019
Do you want more powerful insights from your data? Are you looking for ways to make your data more secure? Hear how you can do this using technology, AI, machine learning, and automation in a secure, compliant, and sustainable way. In this episode of tomorrow talks with IDC and Oracle the conversation moves on from who’s responsible for data security to making sure data delivers value. To find out more download the webinar today.
Tags : 
    
Oracle
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys
Published By: Akamai Technologies     Published Date: Sep 04, 2019
It’s a bold claim; one that hasn’t always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, it’s that security-related incursions are inevitable. And it’s news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, there’s no longer a choice. As a CIO, CISO, or other security or IT leader, you know it’s your job to be the central agent stressing the connections between business and digital risk. It’s your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. That’s up from 40% in 2018. Whether you’r
Tags : 
    
Akamai Technologies
Published By: Darktrace     Published Date: Aug 30, 2019
The Industrial Immune System is a fundamental AI platform for OT cyber defense. The self-learning technology passively learns what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber threats in real time. Martin Sloan, Group Head of Security, Drax: “I often describe Darktrace as life insurance. It catches anomalous behavior and deals with the incident immediately.” Find out how AI is being using to defend Drax power station, the largest coal-powered plant in the UK. Read this case study to find out how Darktrace’s Industrial Immune System can protect your entire digital infrastructure.
Tags : 
    
Darktrace
Published By: Dell EMEA     Published Date: Aug 28, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security. Download this whitepaper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMEA
Published By: Dell EMEA     Published Date: Aug 28, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security. Download this whitepaper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMEA
Published By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19
Published By: Dell EMEA     Published Date: Aug 20, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security.
Tags : 
    
Dell EMEA
Published By: Indegy     Published Date: Jul 29, 2019
Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber- security threats even more difficult to detect, investigate and remediate.
Tags : 
    
Indegy
Published By: Indegy     Published Date: Jul 29, 2019
Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events.
Tags : 
    
Indegy
Published By: Oracle EMEA     Published Date: Jul 22, 2019
How confident are you and your peers about the data and security practices you’re working with? We asked 5,000 executives globally, across 24 markets and have some interesting results to share. For example, up to half of IT leaders consider their data is manageable but struggle to gain meaningful insights from it. Yet, while AI and autonomous technology could help relieve this situation, they aren’t high on the priority list. Read our report to find out more about executives’ views about data in connection with security, ethics, and visualisation. Read the report
Tags : 
    
Oracle EMEA
Published By: Intel     Published Date: Jul 17, 2019
Managing a large, diverse, and geographically dispersed fleet of client systems can be complex and time-consuming. With the increasing prevalence of smart, connected devices that are beginning to appear within the enterprise across industries, technology service organizations will face an explosive demand for a consistent approach to device management and security. Using Intel AMT, service organizations can take simple and effective steps to enable more manageable client systems. They can streamline operations and create a consistent approach to managing a broad spectrum of devices. Powerful platform capabilities can help service organizations meet user needs, minimize downtime, and safeguard the enterprise. Service organizations can draw upon available solution reference architectures, implementation guides, and readily available tools from Intel and others to successfully activate Intel AMT and begin to realize its major benefits.
Tags : 
    
Intel
Published By: Canon Solutions America     Published Date: Jul 15, 2019
Student portals, mobile printing, Chromebooks…Technology has changed the way students learn and interact with your school. But it’s also made you more vulnerable to cyberthreats. This brief will bring you up to date on the new rules of data security.
Tags : 
    
Canon Solutions America
Published By: Nozomi     Published Date: Jul 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.