Skip to content
 

security

Results 326 - 350 of 5981Sort Results By: Published Date | Title | Company Name
Published By: Websense     Published Date: Jan 25, 2013
“Is this email a phish or is it legitimate?” That’s the question that employees — and executives in particular - read this white paper to learn guidance on how to recognize advanced threats and protect yourself from them.
Tags : 
phishing, targeted attacks, websense, security, scams, defence, key topics, security guidance
    
Websense
Published By: Websense     Published Date: Jan 25, 2013
Websense Security Labs discovers and investigates today’s advanced security threats and publishes its findings. This information is used not only to inform the public, but also to inform the ongoing development by Websense of sophisticated security.
Tags : 
websense threat report, security, websense, sophisticated security, web security, phishing
    
Websense
Published By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : 
mobile security, solutions, websense, mobile security, solutions, major it security strategy
    
Websense
Published By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : 
miercom, security, effectiveness, report, protect, network, threats, solutions
    
Websense
Published By: Websense     Published Date: Apr 09, 2013
This report focuses on significant changes in the global threatscape during the year, offering insights from several perspectives. Our goal is to help security professionals improve the effectiveness of existing security solutions, and identify and prioritize security gaps that may require new approaches and more innovative strategies.
Tags : 
websense, 2013, threat report, cyber, websites, effectiveness, security, solutions
    
Websense
Published By: Dell     Published Date: Feb 04, 2015
More than 23 million servers in the world are still running on the Microsoft Windows Server 2003 operating system, making it the most popular engine for serving information and applications globally for over a decade. But, starting in July 2015, Microsoft will no longer provide basic support for it.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
Migrating your enterprise to a modern Microsoft® Windows® operating system is a complex process that can strain IT resources. That’s why Dell is focused on helping customers meet the deadline of the decade: On 14 July 2015 support for Windows 2003 will cease. The strategic value to efficient Windows migration is application, hardware and deployment readiness.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
Technology is moving fast and your data center needs to keep up so your business can thrive. Migrating to the latest platforms and solutions, such as Windows® Server® 2012 R2, lets you take advantage of its virtualization advancements and tap into the Microsoft cloud OS. Combined with unique innovations featured in Dell server, storage and networking solutions, you can do more than modernize your IT — you can transform it.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
In the last few years there have been radical changes in the ways organizations operate and people work. Explosion of data, increased mobile demands, and the globalization of business in general are making 24/7 access to people and information the norm. Sophisticated cyber attacks are requiring robust systems security designed to counter new threats. And velocity is now essential when delivering new IT services.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
With support for Windows Server 2003 ending, transitioning to Server 2012 is clearly a must for companies. While migration will be an adjustment for organizations relying on niche applications that are 10 years old, the costs of not upgrading to Server 2012 could prove fatal.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003
    
Dell
Published By: KeyBank Commercial Banking     Published Date: May 10, 2017
When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. We believe that the more we know, the better we can serve you. Check out what leaders are saying about the economy, future growth and cybersecurity when you download our latest quarterly report. Member FDIC. © 2017, KeyCorp. CFMA 20170424- 224928
Tags : 
middle market, us economy, economic outlook, customized solutions, cybersecurity, business success, business goals, business expansion
    
KeyBank Commercial Banking
Published By: Dell     Published Date: Feb 02, 2015
Windows 8.1 is ready to give your business the tools you need to meet your workers' changing IT needs in a way that's reliable, productive and secure. Designed to respond equally well to touch as it does to a keyboard and mouse, read this paper to learn more about how the new Windows addresses today's workforce needs by enhancing mobile productivity, end-to-end security, and addresses virtualization and management advancements.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft
    
Dell
Published By: Dell     Published Date: Feb 02, 2015
While Windows 7 and Windows XP continue to dominate the market, Windows 8 adoption has been fairly slow, especially in the enterprise. The end of support for Windows XP now creates a season of needed change. Prepare now to address both the challenges and opportunities of this wave of OS migrations by downloading this IT handbook. Read it for insights into planning and preparation, hardware and software compatibility considerations, as well as end user training and implementation.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft
    
Dell
Published By: Dell     Published Date: Feb 02, 2015
Many enterprises, educational institutions, and government agencies find themselves still managing both legacy end-user hardware and an antiquated OS. The time has come to move to modern Windows options and given the gamut of robust computing hardware, upgrading both at once simply makes good sense. Download this paper to discover how your organization can benefit from the combination of reduced staff costs, fewer operational problems, lower operational costs and improved productivity, the organization realizes significant cost savings.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft
    
Dell
Published By: Dell     Published Date: Feb 04, 2016
When considering an upgrade of client PCs, it’s important to consider more than just the initial cost of new systems. User needs are ever-evolving and you want to make client hardware choices today that will meet the mobility, productivity, and security needs of today’s on-the-go work environments. Read this paper to learn about the factors that contribute to total cost of ownership so you can build a business case for upgrading that moves beyond budget constraints to focus on value.
Tags : 
dell, windows, productivity, refreshment, benefits, economic, barriers, security
    
Dell
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware
    
Dell
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: HP     Published Date: Dec 05, 2014
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud
    
HP
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors
    
HPE
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors
    
HPE
Published By: HPE     Published Date: Feb 11, 2015
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
    
HPE
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to implement a unified solution for mobile device, app, and data security and see what this means for security and risk professionals embracing and securing mobility in their enterprise.
Tags : 
junos pulse, vpn, pulse secure, security, risk, mobility
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : 
byod, pulse secure, vpn, mobile device management, network security, productivity
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to transition enterprise customers safely to the cloud and see how this will enable service providers to deliver scalable and on-demand, cloud-based deployments with simplicity and agility.
Tags : 
cloud, pulse secure, security, wireless, mobile access, data center
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions
    
PulseSecure
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.