Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

integrated security

Results 101 - 125 of 177Sort Results By: Published Date | Title | Company Name
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Mobile Security Management can help give you the flexibility and control you need to check on your business wherever you go.
Tags : 
tyco, security, mobile security management, threat
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Learn what you need to know before buying Remote Video Viewing technology
Tags : 
tyco, security, remote video, video conference, it management
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
In today’s challenging retail world, businesses have little time to spare. Every day, retailers are under extreme pressure to reduce shrink, improve store operations, increase profits and enhance the customer experience, all at the same. When every minute counts, time-saving solutions like source tagging, can help.
Tags : 
tyco, security, source tag, time-saving, retail
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Security concerns differ from industry to industry. So why do many businesses settle for one-size-fits-all security systems? Discover the potential threats to businesses such as car dealerships, restaurants and retailers, and the ways you can better protect against them.
Tags : 
tyco, security, data threat
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Since 1874, Tyco Integrated Security has consistently provided quality products and services to our customers. From loss prevention to operational and risk management, our ultimate goal is to help you better protect your business and meet your security needs.
Tags : 
tyco, security, commercial, loss prevention
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Building on the experience we’ve gained as the leading name in the security field since 1874, Tyco Integrated Security currently helps protect thousands of schools around the country. And because of our comprehensive offerings, we’ve been able to do so with security solutions specifically designed for each unique situation.
Tags : 
tyco, security, security education, school
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
A healthcare facility must ensure a safe and secure environment for patients, visitors, staff, physicians and suppliers on a 24/7 basis.
Tags : 
tyco, security, hosted video, healthcare application
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
From the assembly line to the checkout line, Tyco Integrated Security is there
Tags : 
tyco, security, retail security
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
A Real-Time Location System (RTLS) that helps monitor equipment, medications, temperature-sensitive products and staff.
Tags : 
tyco, security, rtls asset tracking, location system, real-time
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Omnichannel retailing adds the flexibility of cross-channel and mobile shopping to the unique revenue- and loyalty-building capabilities of the face-to-face retail experience. It offers opportunities to build deeper shopper relationships—or risks ending them, when availability promises go unmet.
Tags : 
tyco, security, omnichannel, store, retail, customer relationship
    
Tyco Integrated Security
Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud, cloud usage, cloud security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Tags : 
ibm integrated data management, data privacy, data security, ibm optim data privacy solution, hackers, security breach, best practices for data security, data inventory
    
IBM
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Help your employees achieve their best with integrated, secure technology Thrive in a fast-changing digital world by giving your people the freedom and flexibility to be productive and work together from anywhere, while maintaining security and compliance. Discover how an integrated solution can deliver: Familiar productivity and collaboration tools System and device management Intelligent security The latest version of Windows for the enterprise
Tags : 
    
Microsoft Office 365
Published By: ASG Technologies     Published Date: Apr 25, 2017
In today’s business model, organizations must provide support and flexibility in addressing the needs of a growing mobile workforce, and interactions with external partners, suppliers, and clients. In short, today’s business model must look beyond corporate walls and extend their business processes and access to business information in an effective, and secure manner regardless of device type. In this way, cloud applications can be leveraged to enhance and extend business processes beyond their corporate walls and support the increasing use of mobile devices. This paper presents the challenges and benefits of implementing an integrated cloud solution that provides the flexibility, agility, and security business organizations need to increase operational efficiency, and responsiveness.
Tags : 
    
ASG Technologies
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Produced in conjunction with Integrated Solutions for Retailers, this National Retail Foundation (NRF) 2014 guide explores why mobile device, app and content management are critical components of success for large scale mobile deployment and ongoing security management.
Tags : 
mobile solutions, roi, mobile deployment, mobile security management, mobile hardware, it management, enterprise applications
    
IBM MaaS360
Published By: IBM     Published Date: Nov 05, 2014
IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, ibm threat protection, security, it security, protection system, threat protection system, prevention, detection
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
Published By: IBM     Published Date: Feb 11, 2015
BM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, threat protection system, automated response capabilities, it security practices, security, it management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data analytics and mobility. In this paper, we will look at how the growing adoption of cloud computing is changing the way organizations are implementing security.
Tags : 
security strategies, ibm, deployment model, cloud security, data analytics, security, data center
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies, security, it management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : 
ibm security, access management solutions, mobile channel security, advanced threats, byod, security, it management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.
Tags : 
application deployment, point security, ibm, ibm security solutions, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.
Tags : 
ibm, integrated security, security weakness, risk management, infrastructure security
    
IBM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.