technology security

Results 1 - 25 of 490Sort Results By: Published Date | Title | Company Name
Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 15, 2019
o The growing video surveillance market is driving demand for advanced video analysis technologies. Businesses and organizations from all vertical sectors are looking to leverage the benefits of enhanced detection accuracy and flexibility provided by deep learning to solve their security, safety, and operations challenges. Discover how Agent Vi’s innoVi* leverages cutting-edge deep learning technology to transform the hundreds, or even thousands, of cameras deployed across a city into smart video devices, contributing to the city’s ability to improve security, safety, and incident response citywide.
Tags : 
    
Intel
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: Epicor     Published Date: Apr 11, 2019
With the speed at which technology is advancing, manufacturers cannot afford to use outdated manufacturing software. “Legacy” manufacturing management systems drag down your company with inefficiencies that are both apparent and hidden. These can prevent you from keeping up with your competition and achieving your growth potential. This Epicor white paper details why manufacturing industry technology experts say delaying this important business decision often places your company at risk. By using legacy manufacturing software, not only are you unable to tap into the latest technology trends, but you leave your business vulnerable to: • Duplicate or inaccurate data • Clunky system performance • Security concerns A modern manufacturing ERP solution can eliminate these risks. Download the white paper to learn why implementing new manufacturing software built for business growth may be the most important step you take for the success of your company.
Tags : 
erp, manufacturing, industry 4.0
    
Epicor
Published By: Intel     Published Date: Mar 19, 2019
Technology has drastically transformed the banking industry and the way in which consumers transact. Mobile banking is now the new normal. Many consumers, especially millennials prefer to do most if not all of their financial transactions via smartphone due to the convenience in which it offers. Even so, the popularity of mobile banking does not imply that the end of retail banking is near as research has shown that consumers still prefer retail banking for complex services such as loan applications, new account openings and advisory services. Download the whitepaper to learn— • How to build a bank of the future by leveraging the Internet of Things • How to increase security, ease system management and reduce operational costs • The benefits of migrating to a thin-client infrastructure and going paperless
Tags : 
    
Intel
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
Astaro
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Unlock the benefits of Ethernet – An Expert Q&A Guide provided by Spectrum Enterprise. Find out how technology experts are using reliable Ethernet solutions to boost business performance. Get actionable insights from experts and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs
    
QTS
Published By: Lenovo UK     Published Date: Mar 14, 2019
An increasingly tech-savvy workforce is changing the future of work and the workplace. The workplace is now where your people are, not where they go – whether that’s the public space of a coffee shop or private space at home. Working hours are no longer standard, dictated by the tasks to be done, not by the clock. Work tools are no longer based only on workplace technology. The same cool features used in consumer devices, such as touch, are now required for workplace devices. It’s this familiar, smart technology that keeps people, across the generations, happy, productive and engaged. This dynamic IT is the foundation for a smart workplace that will enable you to attract and keep top talent – and shape the future-ready enterprise, now.
Tags : 
dynamic it, smarttechnology, dynamicworkplace, security-first, smartit, workplacesecurity, cybersecurity, iot, artificalintelligence, future-ready
    
Lenovo UK
Published By: HERE Technologies     Published Date: Mar 13, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
location data, location technology solutions, security
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
In this era of digital disruption, businesses must be more agile to capture opportunities. Many viewed cloud computing technology as the way to do this, promising to address agility, scalability, and cost. But in moving to the cloud, many found that its security, compliance, and performance did not fully meet their needs. Additionally, previous common thought was public cloud is less expensive than private cloud. We now know that is not true in all cases. Savvy businesses realise hybrid IT, which includes both offpremises and on-premises services, enables better agility. After initial experience with public cloud offerings, businesses learned that many workloads are best hosted onpremises, primarily due to security, compliance, performance, control, and cost issues.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If you’re a small-to-midsized business (SMB), you know that you’re operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure you’re under. If you can’t deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Increased access to data and more channels of communication have given citizens renewed civic power. Public-sector agencies must be just as responsive as any other enterprise with which citizens interact. If you’re an optimist, imagining the results of a hyperconnected citizenry is exciting. As long as government is responsive, greater citizen involvement could help reduce problems that plague modern society, including poverty, disenfranchisement and even crime.
Tags : 
data access, technology development, public sector, data security
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point to unclear rules, regulations, and policies around Wi-Fi use which prevent them from making informed risk decisions.
Tags : 
government it, modern technology, data security, risk reduction
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
IT security used to be about keeping intruders out and selectively letting in friendly visitors, which was best accomplished with a range of perimeter security and end-point solutions. Download this asset to learn more how the landscape has fundamentally shifted since, with much of this shift accelerating in the last 2-3 years. Sponsored by: HPE and Intel®
Tags : 
best practices, technology, security, business management, intel, hpe
    
Hewlett Packard Enterprise
Published By: Samsung     Published Date: Dec 18, 2015
Download this whitepaper to see how mobile technology can help improve patient care, communication, and security
Tags : 
    
Samsung
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.