RecruitingBlogscom

Follow Us:

 

security technology

Results 301 - 325 of 433Sort Results By: Published Date | Title | Company Name
Published By: OpenText     Published Date: Apr 13, 2012
SharePoint is now an important element of the information management infrastructure in many of the world's largest organizations. In many cases, these organizations must now consider how SharePoint, and the massive (and growing) amount of content it creates, will be managed as well as how it will integrate within the broader information infrastructure.
Tags : 
opentext, technology, sharepoint, application integration, user security, technology security, business technology
    
OpenText
Published By: Oracle     Published Date: Oct 20, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jun 04, 2019
How confident are you and your peers about the data and security practices you’re working with? We asked 5,000 executives globally, across 24 markets and have some interesting results to share. For example, up to half of IT leaders consider their data is manageable but struggle to gain meaningful insights from it. Yet, while AI and autonomous technology could help relieve this situation, they aren’t high on the priority list. Read our report to find out more about executives’ views about data in connection with security, ethics, and visualisation. Read the report
Tags : 
    
Oracle
Published By: Oracle     Published Date: Dec 30, 2018
Marketers know innovation is business power and many report that cloud security delivers more than any other innovation technologies. But when it comes to inspiration, IoT comes top, with AI and blockchain not far behind. Read our paper to discover the data behind the innovation technology hype
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 04, 2019
Marketers know innovation is business power and many report that cloud security delivers more than any other innovation technologies. But when it comes to inspiration, IoT comes top, with AI and blockchain not far behind. Read our paper to discover the data behind the innovation technology hype
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 19, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle CX
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Increasing risks and cyber threats make IT security a high priority. Oracle’s SPARC S7, T7, and M7 Servers with always-on memory intrusion protection and comprehensive data encryption secure your data with no performance penalty. Oracle’s Software in Silicon technology and Oracle Solaris protect data in memory from unauthorized access and stop malware before it gets in.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"It is very well understood that Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements and remain competitive many companies are turning to cloud computing. Companies thus need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. Oracle understand the need for IT organizations to move to cloud computing at the same time also recognizes that moving to the cloud is a multi-step journey that starts with standardization and consolidation of IT infrastructure and ends by moving applications and data to the cloud. The PDF is meant to help you gauge through the Oracle’s SPARC servers and give you an experience of simplified journey to the cloud by using the same technology for both cloud and on-premises deployments. No matter where your IT organization is on the journey to the cloud SPARC servers will be an i
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is current understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specification
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Enterprises often treat information security technology as an insurance policy against the potentially devastating costs of not deploying it. From that perspective, your security technology’s ROI is determined by the time it takes for a breach—one with costs equal to or greater than your investment—to occur. Your ROI could be immediate. Or it could be longer term. With that in mind, it is hard to justify yet another security technology, but a move to the cloud suggests that you should.
Tags : 
    
Oracle Security Solutions
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Legacy firewalls aren't designed to address today's complex network traffic consisting of applications, users, and threats. They rely on outdated technology. Read how a new modern security platform safely enables any technology and application. - Learn why yesterday's methods can't handle today's cyberthreats - Find out if your firewall has the ability to see and control traffic, and prevent APTs - Discover how you can deliver modern security without compromising performance - Read why bolt-on security is a costly approach to security
Tags : 
cybersecurity, firewalls, palo alto, technology, application, network traffic security, prevent atps
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Every year, record levels of money are spent on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of “layered security” in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It’s time to rethink IT security not just the technology, but the way it’s approached from a strategic, architectural perspective.
Tags : 
palo alto, security, security architecture, saas, applications
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge
Tags : 
palo alto, security framework, security, business leaders, digital
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge.
Tags : 
palo alto, pwc, advanced enpoint protection, strategy works, company protection, security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : 
network security, security policy, government, security policies, policy based security, information security, data security, telecom, secure communications, pointsec
    
Pointsec
Published By: Polycom     Published Date: Mar 13, 2015
As the financial services industry moves away from its historic focus—on high margin business, banking, brokerage, insurance, trading, wealth management, and payment companies—they must rethink and strengthen the ways they interact with markets and customers. Organizations that fail to provide personalized services for their clients or to satisfy increasingly demanding customers will struggle to keep their position as competitors innovate at every turn.
Tags : 
investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
Polycom
Published By: Polycom     Published Date: Mar 13, 2015
The Dominion Group of Companies offers clients a wide range of professional services, including investment advising, trust services, wealth management, and insurance. Based in Virginia Beach, Virginia, the company has three main offices as well as independent affiliate offices in multiple locations throughout the United States. Dominion is a small but growing company, currently employing 40 people. A recent opportunity for expansion of the trust side of the business required Dominion to branch out from its Virginia Beach headquarters, opening an office in Florida and relocating one of the firm’s principals to that location. A top priority during that transition was maintaining effective communication, despite the distance, to limit any disruption to existing client services and workflows.
Tags : 
investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
Polycom
Published By: Polycom     Published Date: Mar 13, 2015
United Bank for Africa (UBA) Group is one of Africa’s leading financial institutions offering banking services to more than seven million customers via 750 branches in 18 African countries. With further offices in New York, London and Paris, UBA is connecting people and businesses across the world through retail and corporate banking, innovative cross-border payments, trade finance and investment banking. Over the past three years, UBA had undergone a period of rapid expansion that had seen affiliate banks in 16 African countries come on board. This expansion has naturally put the group’s communication infrastructure under pressure.
Tags : 
investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
Polycom
Published By: Polycom     Published Date: Mar 13, 2015
Korean securities and investment firm boosts profits through secure and reliable financial transmissions. Secure financial video data transmission of up to 25,000 concurrent sessions, help boost Woori client confidence and profits for Korean investment and securities firm.
Tags : 
investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
Polycom
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security
    
Process Software
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top