Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 2271Sort Results By: Published Date | Title | Company Name
White Paper Published By: Cisco     Published Date: Nov 18, 2015
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget. You might be wondering how things could get so complicated so quickly. But as an IT professional, you are nodding your head, because it all sounds very familiar.
Tags : 
cisco, network, business growth, virtual network, security
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 18, 2015
This e-book describes a hypothetical company, referred to as NeedToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book presents a summary of the key components of some of the emerging approaches to WAN architecture and design amd concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
applications, systems integration, cloud, platform, wan
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2015
This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.
Tags : 
cisco, transceiver, cost reduction, data center aggregation, migration
    
Cisco
Webinar Published By: Cisco     Published Date: Nov 17, 2015
Built for continuous availability in mission-critical data center environments, Cisco NX-OS has set the standard for resiliency, extensibility, efficiency, and virtualization. Now it has added programmability and automation to that list, too. For this episode of TechWiseTV, Robb Boyd talks to two foremost experts in this, the world's most deployed operating system in the data center. They discuss all the exciting changes Cisco has made to NX-OS and, more importantly, how organizations can take full advantage of this automation opportunity. This is truly a deep dive into the full potential of all the components that compose Open NX-OS.
Tags : 
cisco, twtv, nx-os, virtualization, programmability
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2015
IoT describes a system where items in the physical world, and sensors within or attached to these items, are connected to the Internet via wireless and wired Internet connections. These sensors can use various types of local area connections such as RFID, NFC, Wi-Fi, Bluetooth, and Zigbee. Sensors can also have wide area connectivity such as GSM, GPRS, 3G, and LTE.
Tags : 
iot, internet of things, data management, business efficiency, manufacturing process
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2015
Gain Immediate Value from Your Connected Factory Architecture! Imagine if you could reconfigure your production line in days instead of weeks. Or if you could cut long search times for parts in half using factory wireless across a connected factory architecture. These are only a few of the reasons why leading manufacturers deploy Cisco’s Connected Factory Solution. Now you can try out these new technologies and capabilities on a small scale, with low financial risk in your own plant with the Cisco Connected Factory Starter Kit. Create a living lab and test out one or more specific use cases. Use it as a demo to get buy in from stakeholders. Or get one production line up and running immediately and roll out a more comprehensive deployment later on.
Tags : 
cisco, connected factory, starter kit, manufacturing process management, programmable logic controllers
    
Cisco
White Paper Published By: VMware     Published Date: Nov 13, 2015
AirWatch Support for Office 365 (This infographic is in Japanese)
Tags : 
airwatch, emm, office365, cloud, security
    
VMware
White Paper Published By: VMware     Published Date: Nov 13, 2015
Enterprise Mobility Best Practices: MDM, Containerization or Both? (This article is in Japanese).
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware
White Paper Published By: Symantec     Published Date: Nov 12, 2015
By reading this whitepaper, you will gain insight into the following topics: The next steps in automated monitoring How automation can speed detection of attack attempts The role of automation as a key feature of the "20 security controls" or CSCs Practical guidelines for moving from manual to automated analysis
Tags : 
security automation, security breaches, automated monitoring, detect attack attempts, automated analysis
    
Symantec
White Paper Published By: VMware     Published Date: Nov 12, 2015
IT requires a solution that solves the challenge of securing proprietary applications and data in the cloud datacenter and is available only to users and devices that are delegated safe for access. VMware NSX solves this challenge through user-level micro-segmentation. The VMware NSX approach offers several differentiated advantages over traditional security approaches.
Tags : 
vmware, cloud datacenter security, mobility, smart networking, vmware nsx
    
VMware
White Paper Published By: VMware     Published Date: Nov 12, 2015
Il y a moins d’un an, les prévisions des analystes avaient laissé croire aux fervents défenseurs de la mobilité qu’une catastrophe allait toucher de plein fouet le secteur de la gestion des terminaux mobiles. Lors d’un événement réservé aux analystes qui s’est tenu en 2013, un panel de spécialistes indiquait que l’utilisation des terminaux personnels allait aboutir à une réduction des prix et faire chuter les ventes. Ils annonçaient la mort de cette industrie. « La gestion des terminaux mobiles est actuellement totalement chaotique et je pense que ce marché est en train de mourir, » déclarait l’analyste Gartner John Girard (CRN.com). John Girard avait prédit une nouvelle orientation dans la gestion de terminaux personnels qui consiste à gérer uniquement les applications pour répondre à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware
White Paper Published By: VMware     Published Date: Nov 12, 2015
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware
White Paper Published By: VMware     Published Date: Nov 12, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen. Auf einer Veranstaltung im Jahr 2013 verkündete ein Ausschuss von Analysten, dass das BYOD-Phänomen (Bring Your Own Device) zu stark herabgesetzten Preisen führen würde, was wiederum Umsatzeinbußen und schlussendlich den Untergang der gesamten Branche zur Folge haben könnte. "Die Mobile Device Management-Branche befindet sich in einem chaotischen Zustand und ich denke, dieser Markt wird untergehen“, teilte Gartner-Analyst John Girard (laut Bericht von CRN.com) dem Publikum mit. Girard prognostizierte einen Trend zum Management auf Anwendungsebene, verursacht durch das BYOD-Phänomen und die ablehnende Haltung von Mitarbeitern gegenüber dem Management ihrer persönlichen Geräte.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware
White Paper Published By: RingCentral     Published Date: Nov 10, 2015
Many businesses feel the pain of living with a phone system that lacks the capabilities and flexibility to support rapid growth or business agility.
Tags : 
ringcentral, pbx, cloud system, location management, security
    
RingCentral
White Paper Published By: RingCentral     Published Date: Nov 10, 2015
This Network Guide explains the challenges, benefits, and unknowns of replacing dated technology.
Tags : 
ringcentral, network, cloud, voip, wireless
    
RingCentral
White Paper Published By: RingCentral     Published Date: Nov 10, 2015
Mobility and Bring Your Own Device (BYOD) have transformed the idea of a 9-to-5 workplace. Employees now check their email first thing in the morning and expect to stay connected whenever and wherever they go throughout the day.
Tags : 
ringcentral, cloud, phone system, mobile, workforce
    
RingCentral
White Paper Published By: Adobe     Published Date: Nov 10, 2015
Download this white paper to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, data security, mobile device, enterprise
    
Adobe
Webinar Published By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : 
ibm, document management, data security, productivity, enterprise
    
Adobe
White Paper Published By: Dyn     Published Date: Nov 10, 2015
Read this Gartner Research Report and learn why without properly functioning external DNS, Internet-based resources may "disappear" without warning.
Tags : 
dyn, dns, digital business, gartner, internet-based
    
Dyn
White Paper Published By: Okta     Published Date: Nov 09, 2015
Many companies believe Active Directory Federation Services (ADFS) is the best choice for applications to integrate with AD. After all, both Active Directory and ADFS are from Microsoft and ADFS is 'free,' so that should be the best choice, right? Not quite. Read this whitepaper and learn what to examine when integrating cloud applications to AD via ADFS.
Tags : 
okta, adfs, microsoft, active directory, hidden costs
    
Okta
White Paper Published By: Okta     Published Date: Nov 09, 2015
You’re moving towards Office 365 and you want true single sign-on and secure authentication using AD for users. Read this eGuide to learn the top three reasons to consider Okta instead of Microsoft’s ADFS.
Tags : 
okta, office 365, okta vs microsoft, adfs, secure authentication
    
Okta
White Paper Published By: Okta     Published Date: Nov 09, 2015
Today, 61% of North American and European enterprise information workers are choosing their smartphones for work either on their own or from a company-approved list. According to Forrester’s Business Technographics® Global Devices And Security Workforce Survey, 2014, 53% of employees are unwilling to make any kind of sacrifice to their user experience in the interest of heightened security. Read this report to learn more about the results.
Tags : 
okta, user identity data, mobile security, forrester's business technographics, security
    
Okta
White Paper Published By: Okta     Published Date: Nov 09, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn more.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders
    
Okta
White Paper Published By: Okta     Published Date: Nov 09, 2015
This Forrester report outlines the future IT environment for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. Read this report to learn more.
Tags : 
okta, forrester, identity and access management, it environment, security and risk
    
Okta
White Paper Published By: Vectra Networks     Published Date: Nov 05, 2015
Intrusion Detection Systems have ceased to live up to their name and have lost their ability to spot today’s sophisticated intrusions. Consequently, cyber attackers are taking advantage of it by launching more evasive and strategic threats that spread rapidly within networks. And security teams are left without the proper tools or insight to identify intrusions that pose the biggest risk.
Tags : 
intrusion detection systems, cyber attackers, sophisticated intrusions, intrusion detection, security
    
Vectra Networks
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.