> Technology > Data Center
 

Data Center

Results 701 - 725 of 1064Sort Results By: Published Date | Title | Company Name
White Paper Published By: Okta     Published Date: Jan 30, 2013
This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
top 8, access management, challenges, saas applications, okta
    
Okta
White Paper Published By: Ping Identity     Published Date: Jan 29, 2013
Corporate security compliance requirements are driving new demands/requirements for identity and access management (IAM). Learn how you can extend your enterprise beyond the perimeter with stronger security, less risk and higher efficiency.
Tags : 
access management, age of cloud computing, cloud, ping, iam
    
Ping Identity
White Paper Published By: Ping Identity     Published Date: Jan 29, 2013
Investing in SSO is not about the security and risk reduction but about empowering business. This white paper from Quocirca discusses how organizations can improve workforce collaboration and gain a competitive edge through SSO.
Tags : 
secure cloud, free business, sso security, empowering business, quocirca
    
Ping Identity
White Paper Published By: Ping Identity     Published Date: Jan 29, 2013
Although the term "SSO" seems self-descriptive, the technical approaches to accomplishing it can get muddy for all but the identity security savvy IT manager. Make sure you are not putting your organization at risk.
Tags : 
ping, sign on, savvy it manageer, organization, indentity security
    
Ping Identity
White Paper Published By: Ping Identity     Published Date: Jan 29, 2013
Now that employees are using more SaaS applications, its time for enterprises to adjust the way they manage employee identities. This white paper from Ping Identity addresses how IT can simplify identity management and maintain enterprise security.
Tags : 
it simplification, get rid of passwords, saas, applications, ping
    
Ping Identity
White Paper Published By: Ping Identity     Published Date: Jan 29, 2013
Expecting your employees to remember strong passwords for every application they use is unrealistic. Learn how identity federation provides a secure, private mechanism for businesses to share user identities, eliminating the username/passwords issue
Tags : 
passwords, password protection, unrealistic passwords, complex passwords, eliminating password confusion
    
Ping Identity
White Paper Published By: Citrix Systems     Published Date: Jan 29, 2013
This white paper describes options for a mobile services-focused computing architecture that empowers productivity through work-shifting, consumerization and collaboration.
Tags : 
ipad, android, tablet, mobility, byo
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jan 29, 2013
Client virtualization technologies properly matched to work styles provide an effective means of accelerating the BYOC program by allowing you to provide a standardized, well-managed desktop environment on employee-owned computers and more.
Tags : 
ipad, android, tablet, mobility, byo
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : 
ipad, android, tablet, mobility, byo
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : 
ipad, android, tablet, mobility, byo
    
Citrix Systems
White Paper Published By: F5     Published Date: Jan 25, 2013
Microsoft Exchange 2013 offers ways to meet productivity challenges but presents changes your infrastructure. This F5 paper takes a closer look at how the migration affects your infrastructure and offers strategies for ensuring a smooth transition.
Tags : 
architect, f5 networks, migration, network migration, smooth transition
    
F5
White Paper Published By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : 
mobile security, solutions, websense, mobile security, solutions
    
Websense
White Paper Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide
    
Websense
White Paper Published By: Websense     Published Date: Jan 25, 2013
Websense Security Labs discovers and investigates today’s advanced security threats and publishes its findings. This information is used not only to inform the public, but also to inform the ongoing development by Websense of sophisticated security.
Tags : 
websense threat report, security, websense, sophisticated security, web security
    
Websense
White Paper Published By: Websense     Published Date: Jan 25, 2013
“Is this email a phish or is it legitimate?” That’s the question that employees — and executives in particular - read this white paper to learn guidance on how to recognize advanced threats and protect yourself from them.
Tags : 
phishing, targeted attacks, websense, security, scams
    
Websense
White Paper Published By: McAfee     Published Date: Jan 24, 2013
This paper reports on the findings when testing McAfee's Risk Management solution from a holistic risk management and vulnerability life-cycle management perspective. Download this white paper to learn more.
Tags : 
miercom lab test report, mcafee risk management, vulnerability life cycle management, security and compliance, mcafee epolicy orchestrator
    
McAfee
White Paper Published By: LogRhythm     Published Date: Jan 24, 2013
Coalfire's assessment of LogRhythm's SIEM 2.0 solution validates the ability to meet specific PCI controls augment others. LogRhythm's technology encompasses key control areas for PCI compliance.
Tags : 
siem solution, logrhythm, solution, siem solution, pci controls
    
LogRhythm
Free Offer Published By: LogRhythm     Published Date: Jan 24, 2013
Gartner's 2012 SIEM Magic Quadrant report that positions LogRhythm as a leader against other technologies designed to collect, store, analyze and report on log data for regulatory compliance and forensics.
Tags : 
logrhythm, magic quadrant, security information, event management, gartner
    
LogRhythm
White Paper Published By: LogRhythm     Published Date: Jan 24, 2013
An IANS Custom Report that details how and why SIEM tools today need to more intuitive and combine multiple functionality to help IT professionals detect and defend against today's more sophisticated threats.
Tags : 
blind spots, security intelligence, big data, analytics, big data analytics
    
LogRhythm
Case Study Published By: ForeScout     Published Date: Jan 24, 2013
In this case study, Vistaprint Taps ForeScout CounterACT for Endpoint Compliance. Obtain real-time visibility into the security posture of all devices on the network, including both physical and virtual machines, in order to manage compliance.
Tags : 
vistaprint, case study, counteract, endpoint compliance, real time visibility
    
ForeScout
Free Offer Published By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : 
gartner magic quadrant, network access control, forescout, leader in network access control, nac
    
ForeScout
Free Offer Published By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : 
bring your own device, byod, idc survey, it managers, devices on network
    
ForeScout
White Paper Published By: Neverfail     Published Date: Jan 24, 2013
Neverfail Migrate offers a simple and powerful solution -- Replicates your data between servers, scalable server, application or site migration in minutes, identically clones your current production servers and more.
Tags : 
neverfail, migrate, neverfail migrate, simple, network
    
Neverfail
White Paper Published By: Neverfail     Published Date: Jan 24, 2013
It's not easy to separate hype from reality. When evaluating a high availability and disaster recovery solution, consider these questions to determine the best solution for you.
Tags : 
top ten questions, neverfail, availability solution, disaster recovery solution, top 10
    
Neverfail
White Paper Published By: McAfee     Published Date: Jan 23, 2013
Threats and vulnerabilities are a way of life for IT admins. This paper focuses on how McAfee's Vulnerability Manager and McAfee e Policy Orchestrator provide IT Admins with powerful and effective tool for identifying and re-mediating systems.
Tags : 
mcafee vulnerability manager, s3kur3, tom bradley, mcafee epolicy orchestrator, mcafee vulnerability scanner
    
McAfee
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.