RecruitingBlogscom

Follow Us:

 

security technology

Results 276 - 300 of 444Sort Results By: Published Date | Title | Company Name
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper is intended for Information Security and Information Technology professionals interested in understanding Zero-day Attacks, the various protection schemes available today and how Top Layer Network's Intrusion Prevention System (IPS) solutions provide the best mechanisms for protection from these types of attacks.
Tags : 
network security, intrusion prevention, ips, cso, server protection, toplayer, top layer, security
    
TopLayer
Published By: Symantec Corporation     Published Date: Oct 03, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to websites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge.
Tags : 
palo alto, pwc, advanced enpoint protection, strategy works, company protection, security
    
Palo Alto Networks
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd
    
AT&T
Published By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
ibm, network, cloud, analytics, mobile, social, big data, it security
    
IBM
Published By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
networks, ibm, redefining networks, cloud, analytics, mobile, social, security
    
IBM
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: DoubleTake     Published Date: Jul 14, 2010
The Department of Homeland Security puts businesses in two categories: those who have already experienced the pain of losing valuable electronic data, and those who will at some point in the future. Well-prepared businesses know that deploying the right resources, processes and technology to protect vital HR information is important, but having adequate resources and technology in place to protect the same invaluable data in branch offices is just as important, though often overlooked. This paper will teach you how real-time data replication software can automatically backup branch office data to a central server for a simpler, more reliable and cost-effective way to protect your branch.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
DoubleTake
Published By: Webroot UK     Published Date: Sep 25, 2013
Have you seen a lot of articles and blog posts with titles like “Is Antivirus Dead?” If so, there is a good reason: Traditional signature-based antivirus technology is rapidly heading toward obsolescence.
Tags : 
reinventing the virus, antivirus, webroot security, client cloud, architecture, rollback, technology, antivirus technology
    
Webroot UK
Published By: Tyco Integrated Security     Published Date: May 05, 2015
52 percent of all businesses are likely to be victimized within the next three years. Download this white paper top learn how accessible, easy-to-use solutions can help lower security costs and give you peace of mind.
Tags : 
small businesses, affordability, security, accessibility, networking, wireless, knowledge management, human resource technology
    
Tyco Integrated Security
Published By: Cisco     Published Date: Jul 10, 2015
Today’s multivector and persistent threats, fluid IT environments, and increasing user mobility are prompting more organizations to seek NGFW capability that provides affordable and effective layered threat protection.
Tags : 
security, ngfw, firewall, threat detection, technology, smd, midisized
    
Cisco
Published By: Ipswitch     Published Date: Mar 14, 2014
In this case study, you’ll learn how Rochester General Hospital leveraged MOVEit’s point and click simplicity to set up, manage and track more than 70 different file transfer operations between hospital servers and the systems used by payers and outside healthcare providers.
Tags : 
ipswitch, moveit, sensitive data, managed file transfer solution, file transfer, file transfer systems, records management, data security
    
Ipswitch
Published By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : 
pinkslipbot, malware protection, malware, technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : 
pinkslipbot, malware protection, malware, technology
    
McAfee
Published By: LogRhythm     Published Date: Aug 08, 2016
It feels as if these folks have been around forever. They started life as a SIEM with a heavy emphasis on log management. Today they are all that plus a solid suite of next-generation attributes. They have many of the attributes of next-gen SIEMs: artificial intelligence, sophisticated log correlation, sophisticated pattern recognition and behavioral analysis. Their strength is, as it always has been, log management. But “log management” has taken on an entirely new dimension with this product. As is absolutely necessary today, it has the intelligence to analyze, correlate and make sense of huge amounts of data.
Tags : 
security, technology, best practices, information technology, business intelligence, business technology
    
LogRhythm
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"It is very well understood that Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements and remain competitive many companies are turning to cloud computing. Companies thus need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. Oracle understand the need for IT organizations to move to cloud computing at the same time also recognizes that moving to the cloud is a multi-step journey that starts with standardization and consolidation of IT infrastructure and ends by moving applications and data to the cloud. The PDF is meant to help you gauge through the Oracle’s SPARC servers and give you an experience of simplified journey to the cloud by using the same technology for both cloud and on-premises deployments. No matter where your IT organization is on the journey to the cloud SPARC servers will be an i
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
This white paper explains the benefits of using Kaspersky Security for Virtualization and its Light Agent technology.
Tags : 
security application, virtualisation, security, kaspersky, security solutions
    
Kaspersky Lab Australia and New Zealand
Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
    
CDW-Trend Micro
Published By: GeoTrust     Published Date: Aug 09, 2013
Learn more about typical situations where multiple domain certificates are the ideal solution. After this whitepaper, you'll know how to select the right multi-domain certificate for your needs.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate. Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : 
ssl, domains, sensitive data, e-commerce traffic, internal servers, secure communications, multiple domains, retail
    
GeoTrust
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top