RecruitingBlogscom

Follow Us:

 

data security

Results 76 - 100 of 2005Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Check out our infographic to see six common security pitfalls that put your users, their devices, and your data at risk. By avoiding these common security mistakes, you’ll be protecting your network against today’s threats and beyond. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA
Published By: AWS     Published Date: Aug 06, 2019
Old-guard database providers are expensive, proprietary, have high lock-in costs, and impose restrictive licensing terms. The challenge to date has been to achieve the same performance and availability of commercial-grade databases on open source databases such as MySQL, PostgreSQL, and MariaDB. Examine key considerations that go into any database migration decision and specific use cases—in Financial Services and Healthcare Analytics implementations—where Datavail carefully managed database migrations from traditional database providers to the cloud—and in particular Amazon Aurora. Download the eBook to learn about: Migration considerations and strategies including lift and shift, re-platforming, and re-factoring Security and compliance functionality enabled by Amazon Aurora Performance and scalability opportunities enabled by AWS
Tags : 
    
AWS
Published By: Google     Published Date: Aug 05, 2019
This Forrester Wave report provides an analysis of 12 most significant Database-as-a-service (DBaaS) providers. These vendors were evaluated against 27 criteria, grouped into three categories: Current Offering, Strategy, and Market Presence. Read the report and find out how each provider measures up in their market as Leaders, Strong Performers and Contenders.
Tags : 
agile, database solutions, forrester, database security, data management
    
Google
Published By: Juniper Networks     Published Date: Jul 31, 2019
When considering data center security, you will need to decide which security functions need to be deployed and where you want to deploy them. These functions are expected to be implemented wherever a firewall is used. Read our eGuide to find out which security functions to deploy, and where to deploy them, including: • Next-generation firewalls • Intrusion prevention systems • Centralized security management
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks
Published By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint
Published By: AWS     Published Date: Jul 29, 2019
What you'll learn in this webinar: Optimize your operations by taking advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS). Migrate your Oracle applications and databases to AWS and get all the benefits of the cloud. Migrating mission-critical Oracle databases and applications to the cloud is complex and you may feel locked into your platform. Amazon Aurora provides commercial-grade database performance and availability at a fraction of the cost. Apps Associates—an AWS Partner Network (APN) Partner and Oracle expert—can migrate enterprise workloads to the cloud, freeing customers to focus on higher-value initiatives. Watch this webinar to learn how to: Run your entire Oracle database and application environment on the cloud Take advantage of lower IT costs on the cloud and reduce your Total Cost of Ownership (TCO) Leverage Amazon Aurora to help satisfy your company’s cloud-first mandate, improve security, and reduce risk
Tags : 
    
AWS
Published By: Box     Published Date: Jul 29, 2019
Most CIOs today understand that digital transformation initiatives can help streamline business process; boost ef?ciency; increase competitiveness; and, broadly, help their organization become disruptive over the long term. Some of the transformation initiatives under way—even in many pace-setting companies—are struggling to manage the exponential explosion of unstructured data and the associated heightened compliance and security demands, however. Fortunately, new solutions that tap arti?cial intelligence (AI) can extract hidden insights from unstructured data, such as documents, images, videos, and audio ?les. AI is also helping automate many of the labor-intensive processes used to classify, organize, and analyze unstructured content
Tags : 
    
Box
Published By: Akamai Technologies     Published Date: Jul 25, 2019
In der heutigen Datenschutzlandschaft steht für Verbrauchermarken viel auf dem Spiel. Ausgeklügelte Cyberangriffe und aufsehenerregende Datenschutzverletzungen können Kundendaten gefährden und das Vertrauen in Ihre Marken schädigen. Um heute erfolgreich zu sein, müssen Ihre Marken eine Strategie für Datensicherheit und Datenschutz implementieren, bei der das Vertrauen der Kunden priorisiert wird. Sind Sie dieser Herausforderung gewachsen? Nutzen Sie die „Datensicherheits- und Datenschutzreifebewertung“ von Forrester Research, um die Kompetenzen Ihrer Marke zu beurteilen und verbesserungswürdige Bereiche zu ermitteln. Dabei erfahren Sie Folgendes: Die vier wichtigsten Kompetenzen für B2C-Marken im Bereich Datensicherheit und Datenschutz ? Ob Sie die empfohlenen Best Practices von Forrester Research erfüllen ? Tipps, wie Sie Ihre Datensicherheitskultur und Ihre Datenschutzkultur zu einem Wettbewerbsvorteil machen können
Tags : 
    
Akamai Technologies
Published By: AWS     Published Date: Jul 24, 2019
What you'll learn in this webinar: Optimize your operations by taking advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS). Migrate your Oracle applications and databases to AWS and get all the benefits of the cloud. Migrating mission-critical Oracle databases and applications to the cloud is complex and you may feel locked into your platform. Amazon Aurora provides commercial-grade database performance and availability at a fraction of the cost. Apps Associates—an AWS Partner Network (APN) Partner and Oracle expert—can migrate enterprise workloads to the cloud, freeing customers to focus on higher-value initiatives. Watch this webinar to learn how to: Run your entire Oracle database and application environment on the cloud Take advantage of lower IT costs on the cloud and reduce your Total Cost of Ownership (TCO) Leverage Amazon Aurora to help satisfy your company’s cloud-first mandate, improve security, and reduce risk
Tags : 
    
AWS
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: Oracle EMEA     Published Date: Jul 22, 2019
How confident are you and your peers about the data and security practices you’re working with? We asked 5,000 executives globally, across 24 markets and have some interesting results to share. For example, up to half of IT leaders consider their data is manageable but struggle to gain meaningful insights from it. Yet, while AI and autonomous technology could help relieve this situation, they aren’t high on the priority list. Read our report to find out more about executives’ views about data in connection with security, ethics, and visualisation. Read the report
Tags : 
    
Oracle EMEA
Published By: Canon Solutions America     Published Date: Jul 15, 2019
Student portals, mobile printing, Chromebooks…Technology has changed the way students learn and interact with your school. But it’s also made you more vulnerable to cyberthreats. This brief will bring you up to date on the new rules of data security.
Tags : 
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Jul 15, 2019
Colleges and universities are under cyber siege. In a recent attack, more than 2,500 student, alumni, and staff accounts were compromised at the University of Buffalo. This brief will teach you how to help prevent a data breach on your own campus.
Tags : 
    
Canon Solutions America
Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: HP Inc.     Published Date: Jul 03, 2019
The Cybersecurity landscape is constantly changing and expanding. Businesses are increasingly having to confront cyberattacks that threaten their information—and their customers’ private data. This guide is designed to help those small and medium-sized businesses with limited IT resources to strengthen their cybersecurity today, with little to no cost.
Tags : 
    
HP Inc.
Published By: Akamai Technologies     Published Date: Jul 02, 2019
The stakes are high for consumer brands in today’s data privacy landscape. Sophisticated cyberattacks and front-page data privacy breaches threaten to compromise customer data and damage brand trust. To succeed today, brands must implement a data security and privacy strategy that prioritizes customer trust. Are you up to the challenge? Use Forrester Research’s “Data Security and Privacy Maturity Assessment” to gauge your brand’s competencies and identify areas for improvement. You will learn: ? The four key data security and privacy competencies B2C brands must master ? How you measure up against Forrester Research’s recommended best practices ? Tips to make your data security and privacy culture a competitive differentiator
Tags : 
    
Akamai Technologies
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Download the free guide to learn how to give employees secure, flexible access to the apps, content, and data that they need to work from any device and location. In the guide, you will discover: • If your current productivity and collaboration tools are falling short. • 3 questions that will help you spot gaps in your mobile device security that are putting your company at risk. • Quick ways to improve employee collaboration while enhancing your data security.
Tags : 
    
Citrix ShareFile
Published By: Lenovo - APAC     Published Date: Jul 02, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: McAfee APAC     Published Date: Jun 25, 2019
Cloud services are fuelling growth. New apps. More devices. More Control. McAfee® MVISION Cloud protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It’s cloud-native data security.
Tags : 
    
McAfee APAC
Published By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
    
IBM APAC
Published By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top