> Technology > Data Center
 

Data Center

Results 701 - 725 of 1060Sort Results By: Published Date | Title | Company Name
White Paper Published By: Ping Identity     Published Date: Jan 29, 2013
Now that employees are using more SaaS applications, its time for enterprises to adjust the way they manage employee identities. This white paper from Ping Identity addresses how IT can simplify identity management and maintain enterprise security.
Tags : 
it simplification, get rid of passwords, saas, applications, ping
    
Ping Identity
White Paper Published By: Ping Identity     Published Date: Jan 29, 2013
Expecting your employees to remember strong passwords for every application they use is unrealistic. Learn how identity federation provides a secure, private mechanism for businesses to share user identities, eliminating the username/passwords issue
Tags : 
passwords, password protection, unrealistic passwords, complex passwords, eliminating password confusion
    
Ping Identity
White Paper Published By: Citrix Systems     Published Date: Jan 29, 2013
This white paper describes options for a mobile services-focused computing architecture that empowers productivity through work-shifting, consumerization and collaboration.
Tags : 
ipad, android, tablet, mobility, byo
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jan 29, 2013
Client virtualization technologies properly matched to work styles provide an effective means of accelerating the BYOC program by allowing you to provide a standardized, well-managed desktop environment on employee-owned computers and more.
Tags : 
ipad, android, tablet, mobility, byo
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : 
ipad, android, tablet, mobility, byo
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : 
ipad, android, tablet, mobility, byo
    
Citrix Systems
White Paper Published By: F5     Published Date: Jan 25, 2013
Microsoft Exchange 2013 offers ways to meet productivity challenges but presents changes your infrastructure. This F5 paper takes a closer look at how the migration affects your infrastructure and offers strategies for ensuring a smooth transition.
Tags : 
architect, f5 networks, migration, network migration, smooth transition
    
F5
White Paper Published By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : 
mobile security, solutions, websense, mobile security, solutions
    
Websense
White Paper Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide
    
Websense
White Paper Published By: Websense     Published Date: Jan 25, 2013
Websense Security Labs discovers and investigates today’s advanced security threats and publishes its findings. This information is used not only to inform the public, but also to inform the ongoing development by Websense of sophisticated security.
Tags : 
websense threat report, security, websense, sophisticated security, web security
    
Websense
White Paper Published By: Websense     Published Date: Jan 25, 2013
“Is this email a phish or is it legitimate?” That’s the question that employees — and executives in particular - read this white paper to learn guidance on how to recognize advanced threats and protect yourself from them.
Tags : 
phishing, targeted attacks, websense, security, scams
    
Websense
White Paper Published By: McAfee     Published Date: Jan 24, 2013
This paper reports on the findings when testing McAfee's Risk Management solution from a holistic risk management and vulnerability life-cycle management perspective. Download this white paper to learn more.
Tags : 
miercom lab test report, mcafee risk management, vulnerability life cycle management, security and compliance, mcafee epolicy orchestrator
    
McAfee
White Paper Published By: LogRhythm     Published Date: Jan 24, 2013
Coalfire's assessment of LogRhythm's SIEM 2.0 solution validates the ability to meet specific PCI controls augment others. LogRhythm's technology encompasses key control areas for PCI compliance.
Tags : 
siem solution, logrhythm, solution, siem solution, pci controls
    
LogRhythm
Free Offer Published By: LogRhythm     Published Date: Jan 24, 2013
Gartner's 2012 SIEM Magic Quadrant report that positions LogRhythm as a leader against other technologies designed to collect, store, analyze and report on log data for regulatory compliance and forensics.
Tags : 
logrhythm, magic quadrant, security information, event management, gartner
    
LogRhythm
White Paper Published By: LogRhythm     Published Date: Jan 24, 2013
An IANS Custom Report that details how and why SIEM tools today need to more intuitive and combine multiple functionality to help IT professionals detect and defend against today's more sophisticated threats.
Tags : 
blind spots, security intelligence, big data, analytics, big data analytics
    
LogRhythm
Case Study Published By: ForeScout     Published Date: Jan 24, 2013
In this case study, Vistaprint Taps ForeScout CounterACT for Endpoint Compliance. Obtain real-time visibility into the security posture of all devices on the network, including both physical and virtual machines, in order to manage compliance.
Tags : 
vistaprint, case study, counteract, endpoint compliance, real time visibility
    
ForeScout
Free Offer Published By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : 
gartner magic quadrant, network access control, forescout, leader in network access control, nac
    
ForeScout
Free Offer Published By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : 
bring your own device, byod, idc survey, it managers, devices on network
    
ForeScout
White Paper Published By: Neverfail     Published Date: Jan 24, 2013
Neverfail Migrate offers a simple and powerful solution -- Replicates your data between servers, scalable server, application or site migration in minutes, identically clones your current production servers and more.
Tags : 
neverfail, migrate, neverfail migrate, simple, network
    
Neverfail
White Paper Published By: Neverfail     Published Date: Jan 24, 2013
It's not easy to separate hype from reality. When evaluating a high availability and disaster recovery solution, consider these questions to determine the best solution for you.
Tags : 
top ten questions, neverfail, availability solution, disaster recovery solution, top 10
    
Neverfail
White Paper Published By: McAfee     Published Date: Jan 23, 2013
Threats and vulnerabilities are a way of life for IT admins. This paper focuses on how McAfee's Vulnerability Manager and McAfee e Policy Orchestrator provide IT Admins with powerful and effective tool for identifying and re-mediating systems.
Tags : 
mcafee vulnerability manager, s3kur3, tom bradley, mcafee epolicy orchestrator, mcafee vulnerability scanner
    
McAfee
Free Offer Published By: McAfee     Published Date: Jan 23, 2013
Vulnerability assessment vendors compete on management features, configuration assessment, price and more, with other security products. Buyers must consider how VA will fit into their vulnerability management process when evaluating VA products,
Tags : 
vulnerability management, network scanning, strong positive, mcafee vulnerability manager, mvm
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : 
virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : 
mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo
    
McAfee
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.