Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

integrated security

Results 151 - 175 of 178Sort Results By: Published Date | Title | Company Name
Published By: GFI     Published Date: Jun 14, 2007
This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace, providing higher productivity and helping you save thousands of dollars in labor costs alone.
Tags : 
ip networks, ip network, ip fax, ip faxing, faxing, fax, fax server, fax security, transmission security, productivity, it spending, cost control, roi, fax cost, gfi, infrastructure
    
GFI
Published By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : 
copiatech, security
    
CopiaTECH
Published By: NCP Engineering GmbH     Published Date: Jul 03, 2008
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
Tags : 
ipsec, vpn, security policies, policy management, ncp, ncp engineering, vpn, ipsec, ssl, central management, remote access, network security, next generation, authentication
    
NCP Engineering GmbH
Published By: Webroot UK     Published Date: Aug 07, 2013
Mobility is one of the driving factors for all business and IT initiatives. IDC has characterized it as one of the four pillars of computing’s next dominant platform, along with social media, Big Data and cloud services. Mobility has the potential to dramatically enhance business agility, improve employee productivity and enable major shifts in the way individuals and businesses approach work.
Tags : 
mobile, security, small business, midsize business, improve employee productivity, business agility
    
Webroot UK
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security, infrastructure
    
Red Hat
Published By: IBM Corporation     Published Date: Jun 09, 2011
Get a clear understanding of the ways DAM technology is being consolidated and integrated enabling security professionals and database managers to make strategic and tactical deployment decisions more effectively.
Tags : 
ibm, guardium, database activity monitoring, dam, pci-dss, data protection, hipaa
    
IBM Corporation
Published By: IBM     Published Date: Mar 12, 2013
A new study by Solitaire Interglobal Ltd. (SIL) shows that the integrated IBM Power security stack offers a wide range of benefits to the organizations including high customer satisfaction and a significantly lower TCO compared to others - Read now.
Tags : 
security, ibm power security, ibm, high customer satisfaction, tco, report, it management, data center
    
IBM
Published By: Lenovo and Microsoft     Published Date: Oct 18, 2016
We’ve analyzed the new features in Windows 10 to provide you with this quick and easy look at how to get the most benefit from these innovations when coupled with a Lenovo ThinkPad®, ThinkCentre®, or ThinkStation® device. Key features you and your team will love include: • Seamless productivity across multiple tasks, locations, and devices • New features start tile and screen snap combined with classic Windows ease of use • Robust, integrated security that matches cutting edge bio-metrics with enterprise-grade basics Find out more now.
Tags : 
lenovo, innovation, microsoft, windows 10, thinkpad, thinkcentre, networking
    
Lenovo and Microsoft
Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking, security, data management, servers, operating system, infrastructure, ibm puresystems
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
This management brief discusses the value proposition for the Case for IBM PureFlex System for Cloud-Enabled SAP Enterprise Environments.
Tags : 
sap, international technology, application serving, system manager, vmware, nodes chassis, netweaver landscape, integrated systems, pureflex system, platform infrastructure, system security, ibm pureflex, security, infrastructure, cloud computing
    
IBM
Published By: Tyco Integrated Security     Published Date: May 05, 2015
Now is the time to craft a smart strategy you and your company can rely on. Download this white paper to find out how to assess vulnerabilities across the global supply chain so you can guard against major threats and ensure product integrity.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: May 05, 2015
Download this white paper to discover why many pharmaceutical companies are turning to proactive strategies to assess and respond to threats.
Tags : 
global supply chain, medication, security threats, product tampering, security goals, security
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Engineers are likely not who you would expect them to be. To create messages that resonate with this unique audience, you must understand them on a more personal level. Analyzing a recent worldwide survey of more than 2,600 engineering professionals, we help you get inside the minds of engineers and discover some surprising insights that enable you to relate to them on a deeper, more personal level.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most — even in tech, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the codes of the high-tech world would indicate that “hard” elements, such as cost, quality and efficiency, are more compelling to this audience, new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, high-tech executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they relied on most to help them make decisions.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most when making decisions, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom would indicate that “hard” elements, such as details around cost, quality and efficiency, are more compelling to decision-makers, this new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, senior executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they primarily relied on to help them make decisions.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Want to appeal to financial executives? Dial up the logic. Financial executives differ from almost every other line of business (LOB) executive when it comes to decision-making, according to a new study conducted by the FORTUNE Knowledge Group in collaboration with gyro. While executives in most other industries are moving toward a more innate approach to decision-making, this group relies primarily on logic to guide their decisions. Understanding the differences between what financial executives look for in partnering with companies and what their peers value is key to developing messaging that appeals to this unique segment.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Showing a softer side of manufacturing is winning over executives, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the standard manufacturing marketing approach would indicate that hard elements are more compelling, this new research suggests that the opposite is true: A significant majority of business leaders are moving to a more innate approach to decision-making, trusting their gut and relying on “soft” factors, such as company culture, reputation and level of trust, to help them make decisions.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
The role of the CMO is rapidly evolving as CEOs raise expectations about how marketing should contribute to company growth. Who are today’s CMOs, where did they come from, what do they do best and how do they do it? gyro, Forbes Insights and SAP surveyed more than 300 marketing executives to find out. Uncover answers and insights when you discover the unique traits that create a “growth CMO,” an elite marketer who successfully drives cultural change, builds marketing capabilities for the future and achieves compelling business results.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
The digital age has driven a rapid transformation of the IT role. No longer an order-taker, IT must now become a game-changer for the organization, according to new research gyro conducted addressing the perceptions, expectations and future priorities of IT. For IT to become a true change agent and business consultant, it must embrace its “human side” and show its relevance to business operations’ and leaders’ success. For many IT groups, this requires a change in culture and an updated mindset about the department’s ultimate purpose and focus, along with improvements in interdepartmental communication.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
To drive organizational change and achieve successful results, growth CMOs focus on fostering five specific adaptive capabilities: technology, omnichannel, measurement, social connectivity, and talent
Tags : 
    
Tyco Integrated Security
Published By: IBM     Published Date: Oct 26, 2017
Many organizations face access management chaos. As applications and resources have spread across on-premise data centers and multiple cloud providers, users are often accessing these resources from anywhere and on multiple devices. These simultaneous trends have left access management systems fragmented and access polices inconsistent, resulting in an environment that is expensive to maintain and challenging to secure.
Tags : 
access management, integrated platform, cloud security, enterprise security, data security
    
IBM
Published By: Forcepoint     Published Date: Oct 02, 2019
Security systems generate a large number of alerts, but only a small subset of them represent critical risks to high value business data. Noise – whether it comes from personal communication, broken business processes or false positives – makes the task of identifying genuine data theft risks challenging, even for wellresourced security operations teams.
Tags : 
    
Forcepoint
Published By: IBM     Published Date: Jun 05, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.