dp

Results 251 - 275 of 949Sort Results By: Published Date | Title | Company Name
Published By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : 
mcafee, intel, data, security, protection
    
Intel Security
Published By: MobileIron     Published Date: Apr 11, 2018
Consumer technology trends are clearly driving the evolution of modern work. As consumers (i.e. employees) become more mobile, they want their work lives to be just as flexible and responsive to their needs. They want to be able to use their own device — instead of a company-issued device — for all their personal and business-related responsibilities. As a result, consumer choice is now the driving force behind mobile enterprise decisions, and demand for the traditional locked-down enterprise device is rapidly decreasing.
Tags : 
guide, unified, endpoint, management, consumers, business, device, enterprise
    
MobileIron
Published By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data, mobile, device
    
MobileIron
Published By: MobileIron     Published Date: Apr 11, 2018
Although embarking on a modern work initiative can seem like exploring unchartered territory, the right unified endpoint management (UEM) solution can help you quickly move forward on your journey to becoming a modern, mobile enterprise. Deploying a UEM solution is best achieved by following the four steps outlined here.
Tags : 
uem, deployment, practices, mobile, enterprise, solutions, management
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
Ready or not, the global mobility trend is forcing enterprises to enable a modern, mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As enterprise users increasingly demand the ability to use their own mobile devices and desktops for modern work, IT is quickly impacted by end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. Considering that smartphone adoption is expected to grow from 1.47 billion devices in 2016 to more than 1.7 billion in 2021, it’s clear that organizations need a comprehensive way to quickly onboard and secure a vast range of employee devices coming into the enterprise.
Tags : 
endpoint, management, business, workforce, desktop, device, mobile
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Feb 28, 2017
Meer Informatie over Office 365™ Migratierisico's en hoe u de afhankelijkheid van uw SaaS-applicaties kunt beheersen. Als u als organisatie overweegt om naar Office 365™ over te stappen, moet u zich bewust zijn van een aantal belangrijke risico's voor uw e-mailinfrastructuur. De cloud lijkt misschien een eenvoudig, kosteneffectief alternatief voor lokale e-mail, maar de continuïteit en de veiligheid mag niet over het hoofd worden gezien. Download hieronder ons e-boek, Zonder Zorgen Uw E-mail naar de Cloud Verplaatsen: Aanbevolen Procedures voor het Beheersen van Risico's in een Office 365 Wereld" voor meer informatie over het beheersen van risico's met uw e-mail in de cloud. - See more at: http://info.mimecast.com/wakkerworden.html#sthash.xdcnYAbz.dpuf
Tags : 
office 365, e-mail, beveiliging, salesforce, schaalbaarheid
    
Mimecast
Published By: Mimecast     Published Date: Feb 28, 2017
Vervalsing van e-mail verpersoonlijking – ook wel bekend als CEO fraude of "whaling" aanvallen vormen een groeiende bedreiging voor bedrijven van elke omvang. Deze veiligheidsbedreiging heeft in de afgelopen 3 jaar meer dan 2 biljoen Euro aan schade veroorzaakt.* Denkt u dat deze aanvallen geen bedreiging voor u opleveren? Even wakker worden! Download nu het nieuwe Mimecast – e-boek: Anatomie van een "whaling" aanval, om meer te leren over deze bedreiging voor uw organisatie, de feiten, kosten en de schade die het kan veroorzaken – en hoe u het kan voorkomen. - See more at: http://info.mimecast.com/anatomievaneenwhalingaanval.html#sthash.rjajy1cW.dpuf
Tags : 
financieel, e-mail, phishing, veiligheid, whaling
    
Mimecast
Published By: Mimecast     Published Date: Feb 28, 2017
Lär dig mer om riskerna med att migrera till Office 365™ och hur du undviker en SaaS-monokultur. När en organisation överväger att migrera till Office 365, måste de vara medvetna om flera signifikanta risker för deras e-postinfrastruktur. Molnet kan verka vara ett enkelt och kostnadseffektivt alternativ till en lokal e-post, men kontinuitets- och säkerhetsaspekterna får inte förbises. Hämta vår e-bok, "Trygg flytt av er e-post till molnet: Bästa praxis för att hantera risker i Office 365”, nedan för att lära dig mer om hur ni undviker problem med molnbaserad e-post. - See more at: http://info.mimecast.com/dagsaattankaom.html#sthash.7mojzQPN.dpuf
Tags : 
office 365, e-post, säkerhet, salesforce, skalbarhet
    
Mimecast
Published By: Mimecast     Published Date: Mar 13, 2017
The EU General Data Protection Regulation (GDPR) is arriving soon. You may think your organization is immune from its impact, but if you do business with any customers in the EU, think again. You’ll need to rethink and possibly re-do your organizational processes around compliance and oversight. It may seem like a daunting task. The Forrester Research Brief “You Need an Action Plan for the GDPR” helps your security, regulatory and privacy teams grasp five must-have changes necessary to comply with the GDPR.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
    
Mimecast
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Feb 27, 2018
NOT ALL UEM SOLUTIONS ARE CREATED EQUALLY MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn how to enhance your existing AirWatch mobility solution with the critical requirements of UEM: • Establish a clear migration path to modern management • Fully support legacy Windows processes and apps • Reduce IT silos with cross-platform support, including Mac and Chrome • And more
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Feb 27, 2018
NOT ALL UEM SOLUTIONS ARE CREATED EQUALLY MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn how to enhance your existing AirWatch mobility solution with the critical requirements of UEM: • Establish a clear migration path to modern management • Fully support legacy Windows processes and apps • Reduce IT silos with cross-platform support, including Mac and Chrome • And more
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Traditional antivirus (AV) is not the solution to preventing security breaches on the endpoint – it is the problem. AV is no longer effective at stopping today’s cyberthreats. Although AV satisfies many regulatory, governance and compliance requirements, it saddles organizations with hidden costs while providing little to no real security value.
Tags : 
palo alto, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Your business relies on a Microsoft® infrastructure that stretches from your network to the cloud to endpoints located around the world. In many ways, the success of your business relies on how secure your Microsoft infrastructure is. Your users do not care where the applications and data reside; they only care about getting their job done. SharePoint®, Skype for Business, or Active Directory® deployed on the network, in Azure®, or as part of your Office 365® subscription should have no impact on the success of your business.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Microsoft® announced Windows Server® 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: IBM     Published Date: Aug 23, 2017
Banks today are continuously challenged to meet rigorous regulatory requirements. They must implement strict governance programs that enable them to comply with a wide variety of regulations stemming from the financial crisis that began in 2007, including the DoddFrank Act, Basel Committee on Banking Supervision regulations, the General Data Protection Regulation (GDPR), the Revised Payment Services Directive (PSD2) and the revised Markets in Financial Instruments Directive To keep pace with regulatory changes, many banks will need to reapportion their budgets to support the development of new systems and processes. Regulators continually indicate that the banks must be able to provide, secure and deliver high-quality information that is consistent and mature.
Tags : 
risk mitigation, data aggregation, risk reporting, banking
    
IBM
Published By: IBM     Published Date: Oct 17, 2017
Banks today are continuously challenged to meet rigorous regulatory requirements. They must implement strict governance programs that enable them to comply with a wide variety of regulations stemming from the financial crisis that began in 2007, including the DoddFrank Act, Basel Committee on Banking Supervision regulations, the General Data Protection Regulation (GDPR), the Revised Payment Services Directive (PSD2) and the revised Markets in Financial Instruments Directive (MiFID2). Many of these new regulations are spurring banks to rethink how data from across the enterprise flows into the aggregated risk and capital reports required by regulatory agencies. Data must be complete, correct and consistent to maintain confidence in risk reports, capital reports and analytical analyses. At the same time, banks need ways to monetize, grant access to and generate insight from data
Tags : 
    
IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.