RecruitingBlogscom

Follow Us:

 

security experts

Results 1 - 25 of 64Sort Results By: Published Date | Title | Company Name
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: Rackspace     Published Date: May 15, 2019
Santikos Entertainment relies on Rackspace’s security experts and certified AWS engineers to deliver a movie-going experience that fits the digital age.
Tags : 
    
Rackspace
Published By: Windstream     Published Date: Jan 12, 2016
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 22, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Oracle CX     Published Date: Oct 19, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle CX
Published By: Oracle     Published Date: May 08, 2019
Oracle DBAs Share Insights about the Future of Cloud, Security, Artificial Intelligence, and Autonomous Computing. This year, in addition to canvasing analysts, pundits, and executives for their strategic insights, Oracle is interested in the tactical views, predictions, and opinions of master DBAs, database product experts, and Oracle ACE Directors. We gathered insights about database management, security, artificial intelligence, autonomous computing, and many other topics and cover how future trends will impact DBA careers during 2019, and beyond. The Intelligent Enterprise Era. Download predictions.
Tags : 
    
Oracle
Published By: Cisco     Published Date: Oct 08, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.
Tags : 
security, cisco, hacking, malware, attackers, security report, enterprise applications
    
Cisco
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Red Hat     Published Date: Feb 25, 2019
Business-critical applications need a platform that is proven to be stable. Red Hat®Enterprise Linux® frees you to deliver meaningful business results through technology by providing exceptional reliability and military-grade security. With a Red Hat Enterprise Linux Server subscription, you gain access to the industry's most extensive ecosystem of partners, customers, and experts that supports and accelerates your success. Read the datasheet to learn more.
Tags : 
    
Red Hat
Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
mobile maturity, mobileiron, mobile first, security risks
    
MobileIron
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : 
akamai, state of the internet, security, security report, cybersecurity, ddos, analytics, networking, knowledge management, enterprise applications, business technology
    
Akamai Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies
Published By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
    
Google
Published By: Dyn     Published Date: Nov 03, 2016
The more you invest in an internet hybrid infrastructure, the more exposed you can be to internet events. At the internet infrastructure layer, this can mean unavailable destinations, poor performing paths and security events such as DDoS attacks. The fact is that there are thousands of internet events that happen every day and when it comes to DDoS attacks 97% of them happen at the infrastructure layer. You shouldn't rely on a single DNS service to protect you from all of these potential problems. Just like everything else in your IT architecture you should always have a backup plan. How you implement a redundant DNS architecture is not a given. Watch this informative webinar and learn about different ways you can get the benefits of a hardened internet infrastructure layer that fits your existing and planned online architecture. Get insights and examples from our DNS experts on different key approaches.
Tags : 
dyn, dns, hybrid infrastructure, networking, enterprise applications, business technology
    
Dyn
Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus, business technology, research
    
Qualys
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is current understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specification
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Mimecast     Published Date: Jun 15, 2017
Join Howard M. Cohen, Senior Resultant, Tech Channel Partners Results and Orlando Scott-Cowley, Cybersecurity Strategist, Mimecast for this webcast and hear from industry experts regarding the latest email phishing and whaling schemes penetrating the market and the steps needed to protect your employees and organization.
Tags : 
mimecast, phishing, whaling, internet security, email security, cyber attacks, security, enterprise applications, business technology
    
Mimecast
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top