security cloud

Results 1 - 25 of 1070Sort Results By: Published Date | Title | Company Name
Published By: Dell APAC - EMC     Published Date: Feb 20, 2020
Cloud-based PC management, PC-as-a-service (PCaaS), and digital workspaces are gaining traction as modern approaches to end user computing. Why? They enable organizations to support a great employee experience (EX), alleviate IT management pressure, and enhance the security posture of the enterprise. Above all though, cloud-based management stands out as the backbone of all of these innovations, enabling faster device refresh, better access to apps and data, and a more automated employee onboarding process. Many organizations are ready to make the transition due to the increasing maturity of vendor offerings. The question is: How? This paper outlines the realities of today’s business environment that make cloud-based management necessary, describes the roadmap for the transition, and demonstrates the benefits of cloud-based management for enterprises. In February 2019, Dell commissioned Forrester Consulting to evaluate employee experience and enterprise computing. Forrester conducted a
Tags : 
    
Dell APAC - EMC
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: LastPass APAC     Published Date: Mar 30, 2020
"Digital and Business transformation is having a major impact on the role of the security team. Cloud, on-premise and hybrid services are now the norm resulting in the traditionally secure perimeter disappearing. This has given rise to a new challenge; managing the identity, access and authentication of anyone who is adding value to the business. This is now the new perimeter of security; the front line of your organisation. We sat down with Mark Child, Research Manager, European Security, IDC to hear about the evolving identity landscape and what this means for the modern security workforce. We covered a number of areas including: What an effective identity solution looks like -Are we witnessing the demise of the password? -Key business drivers behind identity solution implementation -Business benefits of IDT (Identity & Digital Trust) deployment or upgrade -Balancing security and end user experience"
Tags : 
    
LastPass APAC
Published By: Genesys APAC     Published Date: Mar 24, 2020
If you are considering the right deployment model for your contact centre, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centres and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact centre, including: • The size of your contact centre, and business requirements such as customer journey management • The location and quantity of contact centres being managed • The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
    
Genesys APAC
Published By: TIBCO Software     Published Date: Mar 16, 2020
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software
Published By: Rackspace     Published Date: Mar 12, 2020
Across every industry, organizations are moving away from traditional IT infrastructure and moving their workloads to the cloud. With the right cloud strategy, you can improve application performance, address security and compliance demands, eliminate geographic limitations and reduce costs. However, most businesses lack the technical resources, time or knowledge needed to smoothly migrate applications across technologies and platforms — resulting in business risk, disruption and downtime. According to a study conducted by Forrester Consulting, 71% of surveyed organizations are now more than two years into their public cloud journey, with 27% experiencing more complexity involved in integrating, maintaining, and managing the cloud environment than estimated prior to migration, and 40% reported that migrations and operations are costing more than forecast. Discover the insights you need for a successful migration journey in the following Forrester paper.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: Mar 26, 2020
Private cloud security challenges and opportunities In study after study, security is noted as a top concern in moving to the cloud. 1/3 of surveyed central IT professionals still call cloud security a significant challenge 52% of surveyed technology decision makers have concerns around the risk of unauthorized access, data integrity and protection in the cloud 62% of surveyed IT security professionals say their top cloud concern is unauthorised access to data by outsiders.3 Despite the widespread concern, security can be one of the core benefits of moving to the cloud. Download the whitepaper ‘Locking down private cloud security’ to find out how to best balance the challenges and opportunities that come with cloud security.
Tags : 
    
Rackspace
Published By: Cisco Umbrella EMEA     Published Date: Feb 11, 2020
As networks become decentralized and more users connect directly to SaaS applications, backhauling traffic from satellite offices to apply security policies just isn’t efficient. Plus, it's expensive, and it adds latency. More organizations are turning to SD-WAN for distributed networks, and more branch offices are migrating to direct internet access (DIA). How does security need to change in response? Find out how to quickly and easily deliver network security for today's evolving networks, and protect remote and roaming users with cloud-delivered protection.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q2'20     Published Date: Mar 24, 2020
IBM Security commissioned Forrester Consulting to conduct a study and examine the potential return on investment (ROI) enterprises may realize by deploying IBM's Identity and Access Management Services. Download the report to get insights and detailed findings of the study and see how a Fortune 500 company significantly saved time, money and effort with IBM IAM Services, including the following results: - 86% reduction in cloud IAM migration costs - 95% reduction in downtime on IAM workloads - 60% reduction in IAM help desk requests - 96% reduction in maintenance hours to support IAM software
Tags : 
    
Group M_IBM Q2'20
Published By: Genesys     Published Date: Jan 13, 2020
If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: The size of your contact center, and business requirements such as customer journey management The location and quantity of contact centers being managed The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
    
Genesys
Published By: Marketo     Published Date: Mar 23, 2020
I f your business is growing (or you’d like it to be), delivering an exceptional shopping experience that keeps you ahead of your competitors is non-negotiable. And, if you’re still running your webstore on Magento Open Source 1, the time to upgrade is now. Only Magento Commerce gives you the tools, intelligence, and security you need to deliver a brand journey that keeps your customers coming back, time and time again. Read our eBook on why you shouldn’t delay upgrading to Magento Commerce: Ensure your store remains secure and PCI compliant Consolidate the extensions you run and take advantage of the latest marketplace innovations Fast track your move to the cloud and eliminate the headache of maintaining extra infrastructure
Tags : 
    
Marketo
Published By: HPE APAC     Published Date: Jun 20, 2017
HPE Flexible Capacity service enables a cloud-like consumption model and economics for your on-premise IT. Now you don’t have to a make difficult choice between security and control of on-premise IT versus the agility and economics of public cloud. Watch this video to find out more.
Tags : 
cloud, agility, data center, security, public cloud
    
HPE APAC
Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Rackspace     Published Date: Feb 18, 2016
AN OVERVIEW OF THE ACCOUNT MANAGEMENT APPROACH
Tags : 
rackspace, data security, aws account, cloud, data, data center
    
Rackspace
Published By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs, security, it management, data management
    
QTS
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA
Published By: Box     Published Date: Jun 22, 2018
more people than ever before. Whether it's your employees, partners or customers, all your people use enterprise content. And that means content management is becoming increasingly top-of-mind — but companies find it difficult to get it right. In this newsletter, Gartner shares how cloud content management helps you build your content management strategy from the bottom up, enabling you to: o Improve company-wide collaboration and become more customer-centric o Scale your business and reduce cost o Provide security and stability for your entire organization • Download the full Gartner newsletter, Reshaping ECM: New Opportunities in the Cloud. You'll learn about the emerging requirements of top ECM vendors, as well as discover real-world use cases of Cloud Content Management.
Tags : 
    
Box
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
With a hybrid IT approach, small and midsized businesses can leverage the greater control, faster access, and increased security that comes with on-premise, while taking advantage of the increased agility, reduced costs, and better flexibility that the cloud offers. In this report we’ll look at some of the challenges that smaller organizations face in building and managing IT, along with how some businesses are leveraging a hybrid cloud and on premise approach, gaining some significant benefits through this approach.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
In this era of digital disruption, businesses must be more agile to capture opportunities. Many viewed cloud computing technology as the way to do this, promising to address agility, scalability, and cost. But in moving to the cloud, many found that its security, compliance, and performance did not fully meet their needs. Additionally, previous common thought was public cloud is less expensive than private cloud. We now know that is not true in all cases. Savvy businesses realise hybrid IT, which includes both offpremises and on-premises services, enables better agility. After initial experience with public cloud offerings, businesses learned that many workloads are best hosted onpremises, primarily due to security, compliance, performance, control, and cost issues.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Hybrid cloud drives innovation—but digital transformation introduces more potential threats and vulnerabilities. Build security in and address risks upfront with proven capabilities from HPE, a global authority in IT security.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.