Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

security support

Results 76 - 100 of 199Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
High-security mobility management is a subset of the enterprise mobility management market that serves organizations with the most-stringent requirements. If security is the highest priority, IT planners should pursue best-of-breed solutions for each platform they intend to support.
Tags : 
citrix, gartner, mdm, emm
    
Citrix Systems, Inc.
Published By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
    
Zingbox
Published By: Microsoft Corporation     Published Date: Oct 19, 2010
Get a close look at Microsoft security measures for ensuring data protection and integrity, and learn how you can rest assured about the security and reliability of Microsoft Online Services with 24x7 IT professional support and a financially backed service level agreement (SLA) for 99.9 percent uptime.
Tags : 
microsoft online services, security measure, data protection, business productivity, collaboration, it administration
    
Microsoft Corporation
Published By: Citrix Systems     Published Date: Feb 10, 2016
What is an application delivery controller (ADC) and what role does it play in supporting complex enterprise application environments? In this paper, it will discuss how modern ADCs can help provide improved reliability, security and performance for Microsoft Exchange, SharePoint and Lync. And with Citrix NetScaler, it will serve as an excellent front-end to a Microsoft environment, enhancing the user experience and providing for optimal supportability – allowing you to get the most value out of your Microsoft applications .
Tags : 
    
Citrix Systems
Published By: Lenovo     Published Date: Aug 31, 2018
You shouldn't have to trade one for the other. We'll show you where organizations typically make compromises for mobility, to help you avoid the trade-off pitfall and select the best devices for your mobile organization: • Insist on uncompromising productivity • Demand 360° security • Choose reliable durability first Lenovo is the first, best and most innovative leader in building devices to support your mobile workforce.
Tags : 
    
Lenovo
Published By: BigCommerce     Published Date: Feb 13, 2018
Are you getting the most out of your ecommerce platform, for the best price? In this Ecommerce Comparison Chart, find out how Magento, Shopify Plus, and BigCommerce compare. See who checks the box for important keys features, security, and support, and learn what each pricing plan includes. How does your ecommerce platform stack up?
Tags : 
bigcommerce, magento, ecommerce, shopify, shopping cart, website, dropshipping, amazon, ebay, google shopping, demandware, wesbite design, ecommerce website, best ecommerce, omnichannel, b2b ecommerce, erp, payment gateway, saas, sell online
    
BigCommerce
Published By: BigCommerce     Published Date: May 30, 2018
Are you getting the most out of your ecommerce platform, for the best price? In this Ecommerce Comparison Chart, find out how Magento, Shopify Plus, and BigCommerce compare. See who checks the boxes for important key features, security and support, and learn what each pricing plan includes. How does your ecommerce platform stack up?
Tags : 
    
BigCommerce
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : 
trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, network security, data center design and management
    
Trend Micro Inc.
Published By: Google Cloud     Published Date: May 09, 2018
As companies seek to innovate and engage customers through digital channels, they need superstar security leaders — business executives who know how to protect, support, and drive performance. This report looks at the biggest changes in firms’ expectations of their chief information security officers (CISOs) and provides specific examples of how top information security professionals rise to those occasions.
Tags : 
    
Google Cloud
Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault
Published By: VMware     Published Date: Feb 24, 2017
Mobility, having permeated our cultural ethos, has subsequently transformed the enterprise. No longer considered a frill, its ripple effect on our workforce can be seen in the way IT handles security and productivity. As IT administrators catch up with their new responsibilities, enterprise mobility management (EMM) solutions flood the market. Explore key questions to ask on your EMM journey, including: - Does this EMM platform address my use case? - Does it support common platforms? - Does it control access to corporate resources? - And more
Tags : 
    
VMware
Published By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : 
ibm, gartner, cloud, cloud security, casb, ciso, security, cloud computing
    
IBM
Published By: F5 Networks Inc     Published Date: Dec 22, 2014
The new requirements for application delivery mean adopting the principles behind cloud, DevOps, and SDN, and enabling emerging security models. Now you must provision apps in minutes instead of months, and with significantly reduced operational costs. Read this whitepaper to learn how you can manage every delivery aspect of users, applications, systems and infrastructure with an elastic, dynamic infrastructure designed to support these requirements.
Tags : 
application delivery, cloud, devops, sdn, operational costs, it management, enterprise applications
    
F5 Networks Inc
Published By: LogMeIn Rescue     Published Date: Oct 21, 2013
This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.
Tags : 
logmein, remote support, remote support tool, support desk, remote support solutions, support agents, core functionality, usability, customization, branding, security, scalability, deployment model, remote support software, software development
    
LogMeIn Rescue
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : 
soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr, network storage, file sharing, cloud file sharing, hybrid cloud, mobile file sharing, efss, it management, hybrid it, sync and share, vpn access, networking
    
Soonr
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
This book helps you understand both sides of the hybrid IT equation and how HPE can help your organization transform its IT operations and save time and money in the process. I delve into the worlds of security, economics, and operations to show you new ways to support your business workloads.
Tags : 
hpe synergy, api, infrastructure, hybrid it, workloads, code
    
Hewlett Packard Enterprise
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Sophisticated banking requires sophisticated computing systems. But which systems offer the greatest chance for success? Many banks are discovering that the answer can be found within their on-premise data centers – the mainframe computer. Mainframes have become a modern platform for innovation. When operating in a hybrid cloud environment, mainframes provide cost flexibility, scalability, agility, sophistication and unmatched security. And they support innovation, business transformation and new types of monetization. The power of mainframe computing is being rediscovered. Specifically, in a recent 2017 survey of banking executives, we found that: • 50 percent said they believe hybrid cloud – and the systems that underpin it – can significantly lower the cost of IT ownership • 47 percent said they believe mainframe enabled hybrid cloud can improve operating margin • 47 percent said they believe dual-platform hybrid cloud can accelerate innovation. While innovation and improved p
Tags : 
    
Group M_IBM Q418
Published By: IBM     Published Date: Jun 19, 2008
Maintaining data security, performance, availability and recoverability is a growing challenge. The IBM Power platform offers many advantages in performance, scalability and key functional capabilities to support key database serving. In addition, it simplifies virtualization, making it easier to reduce the number of physical servers required. This ITG report shows the advantages of the IBM Power platform as an alternative to commodity Windows servers in mid-sized companies.
Tags : 
ibm, express seller, servers
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
Maintaining data security, performance, availability and recoverability is a growing challenge. The IBM Power platform offers cost-effective performance, scalability and key functional capabilities to support Linux-based database serving. It also simplifies virtualization, making it easier to reduce the number of physical servers required. This ITG report shows the advantages of the IBM Power platform for Linux database serving in mid-sized companies.
Tags : 
ibm, express seller, linux, servers
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat can help you deliver 348% ROI and achieve agile, high-performing infrastructures Linux® has become the standard operating system for cloud infrastructure as well as the preferred delivery vehicle for modern applications. This is, in part, thanks to it being reliable environment that offers scale, security, and robust application support. Red Hat® Enterprise Linux expands on this trust and credibility by offering a supported, hardened, enterprise environment that delivers on more efficient operational costs, better reliability and availability, and better scalability. These translate into a better return on investment (ROI) for our enterprise customers. IDC’s study, “The Business Value of Red Hat Enterprise Linux,” interviewed 12 organizations to see how they’re using Red Hat Enterprise Linux to support their business operations. These organizations reported that Red Hat provides a cost-effective, efficient, and reliable operating environment. There’s a lot to gain with Red H
Tags : 
    
Red Hat
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: IBM     Published Date: Jan 23, 2013
How security, business continuity, and technical support can shape the reputation and value of your company
Tags : 
reputational risk, business continuity, risk management, cloud, social media, mobile, byod
    
IBM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.