Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

security challenges

Results 301 - 325 of 345Sort Results By: Published Date | Title | Company Name
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
A new IDG survey reveals optimism about the ability of next- generation firewalls to help IT balance productivity and security.
Tags : 
firewall security, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management
    
Dell SonicWALL
Published By: Fortinet     Published Date: Nov 14, 2012
Fortinet Technologies and Services that Address Your Cloud Security Challenges
Tags : 
fortinet, cloud, cloud computing, cloud security, total cost of ownership, tco, scalability, security management
    
Fortinet
Published By: WatchGuard     Published Date: Oct 16, 2012
Businesses of all sizes have leveraged virtualization to improve utilization and reduce costs. Virtualization - Are You Secure? This white paper explores the advantages of virtualization and the potential security challenges that come with it.
Tags : 
watchguard, infrastructure, virtualization, cloud computing, security, it security, data security
    
WatchGuard
Published By: IBM     Published Date: Jul 13, 2012
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. But this has introduced new challenges and opportunities. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Tags : 
ibm, technology, risk management, professionals, business, security management, emerging threats, data center design and management
    
IBM
Published By: Trend Micro Inc.     Published Date: Jun 06, 2012
Introduces Trend's Threat Research Group and provides a look at tomorrow's threats and security challenges that cover the Spectrum of Computing including mobility from the perspective of an industry leader.
Tags : 
trendmicro, trend micro, trend, threat, security, security challenges, mobility, spectrum
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Jun 06, 2012
Includes "Top 5 Reasons Why Companies Allow Employees to Use Personal Devices for Work," and "3 Steps Toward Consumerization"
Tags : 
trendmicro, trend micro, trend, threat, security, security challenges, mobility, spectrum
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Jun 06, 2012
TrendLabs Q1 2012 report highlights Trend Micro's success in predicting and stopping new threats.
Tags : 
trendmicro, trend micro, trend, threat, security, security challenges, mobility, spectrum
    
Trend Micro Inc.
Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
    
Symantec.cloud
Published By: Intel Corp.     Published Date: Apr 26, 2012
Download this report to read critical feedback from 200 IT managers in both SMB and enterprise organizations - find out how they are addressing challenges of cloud computing, especially cloud computing security issues.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 26, 2012
Dealing with compliance, privacy, data and application security in the cloud
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 26, 2012
Learn about the business case for developing a private cloud and the basics of building a cloud for the organization.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 25, 2012
Download this guide, which is designed to help you better evaluate different cloud technology vendors and service providers based on a series of questions posed by three cloud infrastructure providers.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 25, 2012
Read the paper now and learn how to implement secure virtualization and discover the benefits that could be achieved.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 25, 2012
Security technologies built into Intel® Xeon® processor-based servers give cloud solution providers tools for security challenges.
Tags : 
cloud, cloud computing, myths, infrastructure, services, it executives, data, intel
    
Intel Corp.
Published By: Blue Coat Systems     Published Date: Apr 05, 2012
This Webcast , discusses how hybrid web security can tackle these tough challenges. Hear pros and cons of various deployment options and key considerations for even the most cloud-hesitant security professionals.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: LogLogic     Published Date: Mar 15, 2012
"Big Data" is the latest buzzword, yet over 70% of companies don't know what Big Data means and how to solve the data management challenges, finds LogLogic survey.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage
    
LogLogic
Published By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
In this must read white paper, you will learn about cloud computing, new opportunities, new security challenges and how to ensure your data is safe.
Tags : 
cloud, hosting company, security, ssl certificate, verisign inc., verisign ssl certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Absolute Software     Published Date: Sep 09, 2011
Security professionals are wondering how to best deal with the oncoming tide of personal mobile devices finding their way into the workplace. Download this research report to learn some key areas of consideration before moving ahead with a mobile implementations strategy.
Tags : 
absolute, managing security, risk challenges, mobile devices, it implementation, secure processes
    
Absolute Software
Published By: Trend Micro Inc.     Published Date: Aug 23, 2011
In this program, leading experts from Gartner, Inc. and Trend Micro, write down the risks and opportunities of virtualization security.
Tags : 
    
Trend Micro Inc.
Published By: Akamai     Published Date: Jul 01, 2011
This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.
Tags : 
akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection
    
Akamai
Published By: TrendMicro     Published Date: May 09, 2011
Download this paper to learn how the right endpoint security for virtual desktops will help your enterprise achieve cost and efficiency advantages from virtual desktops.
Tags : 
trendmicro, endpoint security, virtual desktop infrastructure, vdi, infrastructure
    
TrendMicro
Published By: Symantec.cloud     Published Date: Mar 02, 2011
Most companies already have an endpoint security solution in place. But a single security product is not sufficient to address the challenges of securing and managing the endpoint. This paper explains how a hosted endpoint solution can help.
Tags : 
symantec.cloud, messagelabs, endpoint security, security threats, cloud computing
    
Symantec.cloud
Published By: CSC     Published Date: Oct 18, 2010
The CSC Security Stack white paper lifts the fog of complexity with regards to the cybersecurity challenges businesses and governments face.
Tags : 
cybersecurity, security, information technology
    
CSC
Published By: Datacastle     Published Date: Jul 09, 2010
How to address business continuity, information security, policy enforcement, and regulatory compliance challenges for your laptop users.
Tags : 
datacastle, business resiliency planning, mobile workforce, business continuity, information security, policy enforcement, regulatory compliance, backup and data protection
    
Datacastle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.