enterprise security

Results 1 - 25 of 1080Sort Results By: Published Date | Title | Company Name
Published By: Genesys APAC     Published Date: Mar 24, 2020
If you are considering the right deployment model for your contact centre, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centres and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact centre, including: • The size of your contact centre, and business requirements such as customer journey management • The location and quantity of contact centres being managed • The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
    
Genesys APAC
Published By: Equinix APAC     Published Date: Mar 25, 2020
IDC recognized Equinix as a leader in colocation and interconnection services in this inaugural IDC MarketScape report. Read this competitive assessment of nine interconnection and colocation service vendors to complement your understanding of key benefits of critical infrastructure provider Equinix. Highlights: • Interconnection plus colocation is essential to remove the distance between users, cloud services, ecosystem partners and customers for higher performance and lower network latency • Enterprises need to optimize networks to reduce costs and improve scale across strategic locations, simplify hybrid-cloud access and distribute security to manage risk • With global interconnection there is an environmental need for improved sustainability. Equinix has a long-term goal of implementing 100% renewable energy
Tags : 
    
Equinix APAC
Published By: Cisco Umbrella EMEA     Published Date: Feb 11, 2020
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise."
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 11, 2020
We work everywhere: at home, in the office, airports, and coffee shops, yet traditional security solutions still focus on protecting employees only while on the corporate network. This eBook will educate IT pros about the risks of only relying on legacy defenses like firewalls, web gateways, and sandboxes for network security. What if you could leverage a secret weapon that you already have in your security stack to see attacks and protect roaming users, on any device? We'll describe how Cisco Umbrella provides visibility into all internet requests across your network, across every port, protocol or app to uncover and block connections to malicious domains and IPs. See why Fortune 50 enterprises and small businesses are realizing the security multiplier effect by using DNS to complement existing security measures.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Mar 18, 2020
More and more employees are working outside of the central office — and often outside its protection. To secure these remote workers and locations requires a fundamentally different approach. A recent survey of 450 cybersecurity experts by the Enterprise Strategy Group explored the many facets of protecting a network without perimeters. Learn more about the new state of cybersecurity.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Mar 18, 2020
The Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This executive summary recounts the key research findings observed. To learn more, please read the full report here.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Mar 18, 2020
The Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study. Download now.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Mar 18, 2020
Today’s workplaces are changing. Your users are getting work done on and off the network, and using more SaaS apps, which makes them increasingly vulnerable to attacks. Has your security kept up with the changing times? In this webinar, you’ll hear about the latest security research and learn how to keep your users safe, no matter where they work. Enterprise Strategy Group partnered with Cisco to analyze and validate the latest trends in the security market, including customer perceptions and consumption patterns. ESG Security Analyst, Jon Oltsik, and Cisco Product expert, Negisa Taymourian discuss the latest insights on the state of cybersecurity. This research reveals a fundamentally new approach to how organizations can keep roaming users and branch office (ROBO) locations secure from malicious threats.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Mar 18, 2020
More and more employees are working outside of the central office — and often outside its protection. To secure these remote workers and locations requires a fundamentally different approach. A recent survey of 450 cybersecurity experts by the Enterprise Strategy Group explored the many facets of protecting a network without perimeters. Learn more about the new state of cybersecurity.
Tags : 
    
Cisco Umbrella EMEA
Published By: HP Inc.     Published Date: Mar 06, 2020
Quocirca’s Global Print Security Landscape Report 2019 reveals that SMBs and enterprises continue to be concerned about print security.
Tags : 
    
HP Inc.
Published By: Genesys     Published Date: Jan 13, 2020
If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: The size of your contact center, and business requirements such as customer journey management The location and quantity of contact centers being managed The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
    
Genesys
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
    
Endeavour Software Technologies
Published By: Microsoft Office 365     Published Date: Nov 03, 2016
Going with a single-vendor collaboration platform is an easy call, right? Employees can communicate clearly, information is shared easily, and processes are streamlined. When improving collaboration in your enterprise, here are five core areas to focus on: Saving time and increasing productivity Lowering costs and complexity Ensuring end-to-end security compliance Scaling at your own pace Having administrative control In this free eBook, learn how a single-vendor platform helps you achieve these goals.
Tags : 
    
Microsoft Office 365
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Unlock the benefits of Ethernet – An Expert Q&A Guide provided by Spectrum Enterprise. Find out how technology experts are using reliable Ethernet solutions to boost business performance. Get actionable insights from experts and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
    
Cisco
Published By: HERE Technologies     Published Date: Mar 13, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
location data, location technology solutions, security
    
HERE Technologies
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
    
Here Technologies
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 01, 2018
It’s time to make working together what it should be—intuitive. Cisco Webex Teams enables teams to meet, create and communicate continuously on a single easy-to-use platform. Tools adapt, so teams don’t have to. The same page? Everyone is on it, no matter what device or apps they like to use or where they are. Innovation and work keep moving forward, even after a meeting ends. And everyone enjoys an exceptional experience safeguarded by enterprise-grade security no matter how big the business scales.
Tags : 
cisco, webex, collaboration
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access? The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to explore the five reasons enterprises urgently need a new application access model — one that supports a Zero Trust security framework. The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to learn the 5 reasons enterprises need a new application access model that supports a Zero Trust framework."
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.