security

Results 1 - 25 of 7872Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky Lab     Published Date: Aug 27, 2015
As networks increase in complexity, keeping them secure is more challenging. With users connecting to unsecured public networks, running multiple applications on both company-owned and personal devices, corporate data can now be accessed – and lost – from more endpoints than ever. This guide provides simple, practical advice to help simplify these issues.
Tags : 
    
Kaspersky Lab
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Feb 03, 2020
Dispel common myths about cloud infrastructure, particularly as it relates to cloud-based security.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 13, 2020
m
Tags : 
    
Forcepoint
Published By: ConnectWise     Published Date: Apr 01, 2020
The role of a trusted advisor has never been more critical. As more employees are moving to work from home, your clients are looking to you to make sure they do the right things to keep their employees and their data safe and secure. At ConnectWise, we’ve got you covered. Watch our webinar to view all the resources available to help you be the superhero your clients need. We’ve also put together a white-labeled, vendor agnostic Security Awareness Training for your end clients. We’ll cover the most critical things all employees should consider when working from home, and how to stay safe against threat actors who are actively looking for vulnerabilities.
Tags : 
    
ConnectWise
Published By: ConnectWise     Published Date: Apr 01, 2020
The world has changed overnight as more and more companies are asking their employees to work from home to prevent the spread of the Coronavirus. While working from home provides flexibility and less stress around commutes, it can raise new problems. An entire workforce has lost the protection of their IT department provided firewall, and hackers are waiting to pounce on any vulnerability they can find. Are you ready to protect your company’s data from your home office? Watch our webinar to get peace of mind by learning: The steps you MUST take to secure your connections The most popular methods of hacking and how to combat them The most important things you can do to keep your company’s data secure
Tags : 
    
ConnectWise
Published By: Veeam APAC     Published Date: Apr 26, 2020
"Join us for a webinar discussing business continuity and disaster recovery in Hyper?V environments from a general perspective. More specifically, we’ll cover: - Trends and common backup pitfalls to avoid - Different types and methods of Hyper?V replication - How to keep your backups secure - And more!"
Tags : 
    
Veeam APAC
Published By: Lenovo - APAC     Published Date: Apr 27, 2020
You have to think beyond devices and connections if you want real protection for your organization. See how Lenovo ThinkShield delivers competitive advantage by orchestrating the complete portfolio of security technologies and best practice, including third-party solutions, to provide agile, end-to-end protection. It’s a solution built for fast-moving businesses, enabling innovation and growth. Get the most comprehensive protection with a modern Windows 10 Pro device powered by the Intel®. Learn more>>
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Apr 27, 2020
More than half of the businesses that have suffered a data breach say it was due to a known, unpatched vulnerability. But you don’t need to be playing patch catch-up when automation, customization and persistence technology can take away all kinds of time-consuming processes. Get the full story on the latest agile security solutions with Think devices, powered by Windows 10 Pro and Intel®, in this quick overview from Lenovo ThinkShield.
Tags : 
    
Lenovo - APAC
Published By: F5 Networks Singapore Pte Ltd     Published Date: Mar 04, 2020
In today’s information-flooded business world, access to sufficient data isn’t a problem. But we often struggle with a different challenge—inefficient data. Data and analytics are increasingly important tools that help us decide where to invest and develop. They are a critical means of measuring the success of current strategies, justifying decisions, and building confidence in plans for growth. Engagement with customers is what matters, and that engagement is often measured in clicks. We track where site visitors are coming from, how many pages they visit, whether they click on ads and banners, and how long they ultimately choose to interact with our site or service. Without this information, we’d be making decisions in the dark. The hidden ROI of an advanced WAF solution: - Advanced security solutions can help you manage the explosion of bot traffic, while cutting costs and improving overall business outcomes – finding ROI in the automation age. - Eliminating bot traffic results i
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Mar 04, 2020
Application security is hard. We see headlines about data breaches almost daily. According to F5 Labs, web application attacks are the #1 single source entry point of successful data breaches. Additionally, the fallout from application attacks come with high costs. Insecure software makes web applications so precarious. Always-on, always-connected apps can help power and transform your business–but they can also act as gateways to the data beyond the protections of your firewalls. With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. Read this eBook to review the OWASP Top 10 Injection attacks and how to protect your enterprise.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Automation Anywhere APAC     Published Date: May 08, 2020
Symantec was seeking a solution to reduce the amount of manual processes while maintaining strict security and compliance controls. They started their RPA journey with Automation Anywhere slowly by going with small & medium priority processes first, that would deliver the highest ROI. In total they automated 26 processes that helped them save 4,500 hours in less than a year with 20% increase in auto booking of renewals. Read the full case-study now.
Tags : 
    
Automation Anywhere APAC
Published By: Dell EMC EMEA     Published Date: May 26, 2020
The end user computing industry has reached an important time in its history. For the first time, modern PC management, mobility, Zero Trust security, and virtualization are coalescing to deliver the world’s first digital workspace solutions. The world of any app, any device, and any location is finally here. Enterprises understand that this new digital capability will bring enormous benefits, including enhanced productivity, simplified management, reduced costs, and enhanced security. Today, most IT decision makers are now planning to radically transform their end user computing environments with digital workspaces in the upcoming years. Despite the enthusiasm, however, the question remains: how should companies go about adopting a modern, secure digital workspace to maximize the value from their investments?
Tags : 
    
Dell EMC EMEA
Published By: CheckMarx     Published Date: May 11, 2020
http://mediaadvanceb2b.com/LandingPage/gartner/2.html
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
http://mediaadvanceb2b.com/LandingPage/gartner/1.html
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: May 11, 2020
http://mediaadvanceb2b.com/LandingPage/gartner/3.html
Tags : 
    
CheckMarx
Published By: F5 Networks Singapore Pte Ltd     Published Date: Apr 20, 2020
"This book introduces developers and network administrators to the basic concepts and challenges of monitoring and managing API traffic. In this ebook you will learn: • About the North/South and East/West models for API traffic • How to maintain network reliability and resilience to provide a healthy and scalable infrastructure for your API platform • About security basics including API keys, authentication, authorization, and encryption. • Options for diagnosing and automating your traffic management approach"
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Apr 20, 2020
"Most organizations prioritize cloud flexibility—and let application teams choose the best environment for each application—over the organizational benefits of common environments, processes, and tools. This leads to 87% of organizations supporting multiple clouds, selecting best-of-breed capabilities from each platform. 1 As applications proliferate, it becomes more challenging to implement consistent cross-cloud application performance policies, security, and regulatory compliance leaving organizations with concerns about long-term operability. The key for IT is to strike the right balance between freedom and flexibility for application development teams, while enabling the easy and consistent inheritance of corporate security, compliance, performance, and operability requirements. Download this guide to learn how you can deploy consistent applications in a Multi-Cloud Environment."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 19, 2020
A top 3 Money Transfer service, with over $5 billion in annual revenue, serves customers in over 100 countries. They have hundreds of thousands of agents, millions of clients, and move over $200 billion in principal per year. They faced several challenges that neither they nor their existing vendors were able to resolve. Find out how the global money transfer service partnered with Shape Security and saved $786K in the first month.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 19, 2020
A Fortune 500 retailer, manages a gift card program with a stored value of over $5B. Cybercriminals targeted the program, stealing tens of millions of dollars from the company and its customers. Attackers used credentials spilled from other website breaches to hijack customer accounts and steal funds from gift cards. Traditional defenses, like web application firewalls, intrusion detection and prevention services, and fraud analytics, failed to prevent these ongoing automated attacks. Find out how Shape Security helped to eliminate $10s of millions in fraudulent transactions and chargeback fees.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 18, 2020
A top 3 Money Transfer service, with over $5 billion in annual revenue, serves customers in over 100 countries. They have hundreds of thousands of agents, millions of clients, and move over $200 billion in principal per year. They faced several challenges that neither they nor their existing vendors were able to resolve. Find out how the global money transfer service partnered with Shape Security and saved $786K in the first month.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 18, 2020
A Fortune 500 retailer, manages a gift card program with a stored value of over $5B. Cybercriminals targeted the program, stealing tens of millions of dollars from the company and its customers. Attackers used credentials spilled from other website breaches to hijack customer accounts and steal funds from gift cards. Traditional defenses, like web application firewalls, intrusion detection and prevention services, and fraud analytics, failed to prevent these ongoing automated attacks. Find out how Shape Security helped to eliminate $10s of millions in fraudulent transactions and chargeback fees.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Oracle     Published Date: May 11, 2020
When you have thousands and even millions of smart devices and distributed energy resources, each with unique requirements for maintenance, inspection, updating, and security, just to name a few tasks, it can get overwhelming quickly. Knowing where they are much less what to do with each one can seem impossible. Read this eBook today to learn more: • Protect investment in smart devices throughout their lifecycle • Ensure revenue realization by safeguarding device performance • Increase customer choice and reliability through proactive management of DER and customer owned equipment • Simplify complex processes to reduce maintenance and overall management costs
Tags : 
    
Oracle
Published By: Oracle     Published Date: May 12, 2020
As the utility-customer relationship continues to evolve and data expands across operations, meters and other smart devices are more important than ever in translating real-world events into digital intelligence. Oracle Utilities Meter Solution Cloud Service delivers the full power of our industry-leading meter solution but without the long upgrade projects, burdensome maintenance, scalability challenges, security concerns and other hassles of on-premises solutions. The result is that utility meter ops and IT teams can focus more on innovation, knowing the always-up-to-date solution is ready to go. • Focus on your business while Oracle Utilities does the heavy lifting on system maintenance • Streamline meter-to-cash processes with productized integration • Access (acceptance-based) new capabilities immediately via multiple mini-updates each year • Easily scale the solution as data volumes and processing needs expand
Tags : 
    
Oracle
Published By: CheckMarx     Published Date: May 11, 2020
This Critical Capabilities guide provides application security testing (AST) tool buyers with vendor rankings for five common use cases, based on relevant evaluation criteria. Buyers can view vendor rankings for each use case to help formulate lists of vendors that, based on Gartner assessments, are well-suited based on product capabilities to address a given use case. Using the online interactive tool, buyers can also formulate custom use cases, and corresponding vendor rankings, where predefined use cases do not offer an appropriate match to an organization’s specific requirements. Using scoring for specific capabilities, buyers can also identify vendors with a product offering that is well-suited for a specific function, such as analysis of mobile applications or APIs.
Tags : 
    
CheckMarx
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.