Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

security support

Results 151 - 175 of 199Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Apr 05, 2018
Les fonctions marketing et informatique font plus que jamais la paire. Aujourd'hui, l'agilité des entreprises se mesure à l'aune de la flexibilité opérationnelle de leurs outils marketing. Pour découvrir les possibilités ouvertes par les nouvelles technologies dans le domaine du marketing, lisez notre « Guide des technologies marketing ». Au sommaire : Les technologies du paysage marketing actuel Les nouveautés de l'automatisation marketing Le rôle de vos contenus et des réseaux sociaux dans votre stratégie globale Oracle is a global technology company who provide a range of services, including the Oracle, the ‘industry’s broadest and most integrated public cloud’ which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computing industry. All information that you supply is pro
Tags : 
    
Oracle
Published By: Oracle     Published Date: Apr 05, 2018
Eine effektive Zusammenarbeit zwischen Marketing und IT ist wichtiger denn je und hängt zunehmend von der Flexibilität der Marketingtools ab. Hierbei spielt die Technologie eine zentrale Rolle. Unsere ‚Anleitung zum Aufbau Ihrer Marketingtechnologie‘ verrät, wie Sie Ihre Marketingstrategie mit der richtigen Technologie optimieren:: • Gewinnen Sie neue Perspektiven zum Einsatz von Technologie im Marketingbereich • Informieren Sie sich über neue Entwicklungen zur Automatisierung im Marketingbereich • Integrieren Sie Content und soziale Netzwerke in Ihre Gesamtstrategie Oracle is a global technology company who provide a range of services, including the Oracle, the ‘industry’s broadest and most integrated public cloud’ which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computi
Tags : 
    
Oracle
Published By: Oracle     Published Date: Apr 05, 2018
Effective collaboration between marketing and IT continues to be crucially important. As we enter an era where our business agility will be defined by the flexibility of operation of our marketing tools, technology in marketing is a key focus. Read ‘The guide to building your marketing technology stack’ to learn more about how technology can enhance every area of marketing: • Rediscover the technology in marketing landscape • Explore the latest in marketing automation • See how content and social fit into your overall strategy Oracle is a global technology company who provide a range of services, including the Oracle, the ‘industry’s broadest and most integrated public cloud’ which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computing industry.
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
    
Oracle CX
Published By: Oracle Linux     Published Date: Oct 24, 2018
Learn how customers are improving security, reducing downtime, simplifying operations, and saving money by switching to Oracle Linux support.
Tags : 
    
Oracle Linux
Published By: Oracle Linux     Published Date: Oct 29, 2018
Learn how customers are improving security, reducing downtime, simplifying operations, and saving money by switching to Oracle Linux support.
Tags : 
    
Oracle Linux
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
This document outlines three core reasons why traditional AV no longer offers organizations any meaningful security value. Looking beyond the tangible staffing, operational, and licensing and support costs, the document highlights some of the hidden costs associated with operating an antivirus system that may be intangible, difficult to quantify, or unquestioned due to precedence.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Every year, record levels of money are spent on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of “layered security” in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It’s time to rethink IT security not just the technology, but the way it’s approached from a strategic, architectural perspective.
Tags : 
palo alto, security, security architecture, saas, applications
    
Palo Alto Networks
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Published By: Rackspace     Published Date: May 15, 2019
Santikos Entertainment relies on Rackspace’s security experts and certified AWS engineers to deliver a movie-going experience that fits the digital age.
Tags : 
    
Rackspace
Published By: Red Hat     Published Date: Jan 08, 2014
This executive brief provides results of a CIO Magazine Quick Pulse poll sponsored by Red Hat which highlights the industry move to private cloud technology and hybrid cloud environments through dual-source virtualization wherein companies value security, performance and support in a quest to build the new IT paradigm.
Tags : 
red hat, virtualization, storage, cloud, cloud data, hybrid cloud, cloud management, platform as a service, paas, cloud data access storage, cloud applications, scalability, deployment, cloud technologies, it management, platforms, servers
    
Red Hat
Published By: Red Hat     Published Date: Jul 17, 2014
As a strategic partner in your business, you need to respond to growing business demand. Unfortunately, you face several challenges. Your complex IT environment is costly to manage and has a high downtime risk. Most of your resources and budget likely go to maintaining the stability, security and reliability of your IT system. Your organization might lack the processes needed to confidently manage support issues, IT transitions and new application deployments. In this whitepaper you will read about how to maximize uptime, reduce management costs, and quickly respond to business demands.
Tags : 
business demand, security, it transitions, new applications, it systems, efficiency, maximize uptime, manage costs, enterprise applications
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat is a trusted partner to enterprise customers; cloud, software, and hardware suppliers; and the global open source community. A Red Hat® Enterprise Linux® subscription provides customers with direct access to innovation and advocacy—within the open source community and within a certified and trusted network of partners. Red Hat Enterprise Linux provides you with an innovative platform that serves as the foundation for your business. It is hardened, certified, and supported by the Red Hat Product Security team, support teams, and certified engineers. Red Hat supports your timelines and advocates for your requirements so you can focus on the work of your business rather than being your own operating system vendor. We use our leadership in the open source community to do the work that brings you the best of open source. Get direct access to: Technology-driven solutions Emerging technology Experience and support Continuous security Timeline support Download the whitepaper to lea
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat can help you deliver 348% ROI and achieve agile, high-performing infrastructures Linux® has become the standard operating system for cloud infrastructure as well as the preferred delivery vehicle for modern applications. This is, in part, thanks to it being reliable environment that offers scale, security, and robust application support. Red Hat® Enterprise Linux expands on this trust and credibility by offering a supported, hardened, enterprise environment that delivers on more efficient operational costs, better reliability and availability, and better scalability. These translate into a better return on investment (ROI) for our enterprise customers. IDC’s study, “The Business Value of Red Hat Enterprise Linux,” interviewed 12 organizations to see how they’re using Red Hat Enterprise Linux to support their business operations. These organizations reported that Red Hat provides a cost-effective, efficient, and reliable operating environment. There’s a lot to gain with Red H
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
Business-critical applications need a platform that is proven to be stable. Red Hat®Enterprise Linux® frees you to deliver meaningful business results through technology by providing exceptional reliability and military-grade security. With a Red Hat Enterprise Linux Server subscription, you gain access to the industry's most extensive ecosystem of partners, customers, and experts that supports and accelerates your success. Read the datasheet to learn more.
Tags : 
    
Red Hat
Published By: Secureworks     Published Date: Nov 11, 2016
This paper outlines the discrete layers and levels of a world-class security organisation and programme, and how organisations can take advantage of services from SecureWorks to support their progress toward worldclass status.
Tags : 
managed security services, security, secureworks, threat and vulnerability management, security, security architecture, cyber security
    
Secureworks
Published By: Secureworks     Published Date: Nov 11, 2016
In this white paper we will discover what the evolving path ahead for security leaders looks like, the importance of communication from top to bottom, focusing on how proactive measures can stop threat actors from derailing businesses, and how building a security architecture that protects the most critical assets will support the overall goals of an organisation.
Tags : 
managed security services, security, threat and vulnerability management, security, security architecture, cyber security
    
Secureworks
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: ServiceNow     Published Date: Oct 02, 2015
From students to executives, finding solutions to improve efficiency, productivity, and communication has become vital. These end users are trying to excel in their work, and while they don't mean to cause harm, in most organizations this desire leads to the use of applications, services, and data storage and sharing beyond IT's boundaries. This practice, known as “shadow IT,” walks a line that information security officers are uncomfortable with, and it's having an obvious impact on technical support teams. The good news is, there are opportunities for all support organizations, regardless of their stance on shadow IT.
Tags : 
    
ServiceNow
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : 
shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning, configuration management, infrastructure, network security
    
Shavlik Technologies
Published By: Silver Peak     Published Date: Jun 24, 2013
Background and Goals of the 2013 Application and Service Delivery Handbook Throughout the 2013 Application and Service Deliver Handbook, the phrase ensuring acceptable application and service deliver will refer to ensuring that the applications and services that an enterprise uses: Can be effectively managed Exhibit acceptable performance Incorporate appropriate levels of security Are cost effective
Tags : 
application, service delivery, cost effective, security, technology, encryption, supporting chatty protocols, transmitting files, cloud computing, networking
    
Silver Peak
Published By: SnowFlake     Published Date: Jul 08, 2016
In the era of big data, enterprise data warehouse (EDW) technology continues to evolve as vendors focus on innovation and advanced features around in-memory, compression, security, and tighter integration with Hadoop, NoSQL, and cloud. Forrester identified the 10 most significant EDW software and services providers — Actian, Amazon Web Services (AWS), Hewlett Packard Enterprise (HPE), IBM, Microsoft, Oracle, Pivotal Software, SAP, Snowflake Computing, and Teradata — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architect professionals select the right solution to support their data warehouse platform.
Tags : 
forrester, enterprise, data, technology, best practices, innovation, security
    
SnowFlake
Published By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : 
soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr, network storage, file sharing, cloud file sharing, hybrid cloud, mobile file sharing, efss, it management, hybrid it, sync and share, vpn access, networking
    
Soonr
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.