• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

secure data

Results 351 - 375 of 480Sort Results By: Published Date | Title | Company Name
By: BlackBerry     Published Date: Apr 13, 2010
Equipping staff with the right tools can enhance productivity, motivation and staff retention. Highly secure mobile email and data applications help mobile workers stay in touch and up-to-date with a wide range of business issues. Extending that streamlined anytime, anywhere access to mobile voice applications is the next frontier in worker empowerment.
Tags : 
blackberry, fixed mobile convergence, fmc, pbxvoip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware
    
BlackBerry
By: McAfee Inc     Published Date: Aug 19, 2009
Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.
Tags : 
mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security, anti spam, application security, authentication, ddos, disaster recovery
    
McAfee Inc
By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library, data backup, reduce backup costs, deliver roi, retain data long term, back up virtual servers, secure your stored data, data deduplication and replication, symantec openstorage technology (ost), energy-effcient technology, media and entertainment, broadcast, postproduction
    
Quantum - Quinstreet
By: Apple Corporation     Published Date: Mar 26, 2014
Join Apple Business Experts for a exclusive on-demand online seminar to learn what’s new in iOS7 for business. Learn how iOS and an ever-expanding collection of features and built-in apps make iPhone and iPad even more powerful, innovative, and enjoyable to use for work. You will also see how iOS provides IT with powerful, yet simple ways to deploy and manage iOS devices, secure corporate data, and enable a great user experience. Register Now!
Tags : 
apple, ios7, iphone, ipad, business solutions, it solutions, it management, wireless, knowledge management, enterprise applications
    
Apple Corporation
By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud, server, technology, configuration, cloudformation, security, knowledge management, enterprise applications
    
Amazon Web Services, Inc
By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe
By: GlobalSCAPE     Published Date: Nov 08, 2013
The paper explains that the right MFT solution can enable business growth, enhance operational efficiency, enable compliance, reduce costs, and increase ROI.
Tags : 
globalscape, ftp. mft, file transfer, secure file transfer, business data, managed file transfer, storage management, data integration, collaboration, information management, secure content management, email archiving
    
GlobalSCAPE
By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending, firewalls, security management, return on investment, web service security, data protection
    
Imperva
By: Exablox     Published Date: Jan 27, 2015
When it comes to the increasingly complex task of managing data storage, many small and midsize organizations face even greater challenges than large, global enterprises. Small and midsize companies have ever-increasing volumes of information to manage and secure, and they are confronting a number of difficulties when it comes to storage. Among the biggest hurdles: ›› Scaling storage as the business grows rapidly ›› Meeting the rising expense of data storage capacity ›› Dealing with the complexity of management and architecture ›› Devoting precious staff time managing storage and data backup Whereas larger organizations have significant IT budgets and staff to handle storage-related challenges, small and midsize companies lack the IT resources to dedicate to storage management. Fortunately, there are new approaches to data storage on the market that can help such companies address their data storage needs without requiring dedicated storage management resources, while at the same ti
Tags : 
scaling storage, data storage capacity, data backup, data protection, data management, exablox, oneblox, storage management
    
Exablox
By: Microsoft Office 365     Published Date: Mar 11, 2016
The cloud gives businesses of all shapes and sizes an opportunity to be mobile. Employees get flexible, secured access to important data and applications from virtually anywhere. Documents are safely stored, synchronized, and shareable at a moment’s notice—collaboration on the go has never been easier.
Tags : 
    
Microsoft Office 365
By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
By: IBM MaaS360     Published Date: Apr 15, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, application security, mobile computing, mobile data systems, mobile workers, application integration, application performance management, best practices, business management
    
IBM MaaS360
By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection, networking, software development, it management, wireless
    
IBM MaaS360
By: IBM MaaS360     Published Date: Oct 08, 2015
Security is really about access; today’s work demands access to anything from anywhere on any device. Learn how to securely let employees share, edit and distribute work data across iOS, Android and Windows.
Tags : 
ibm, fiberlink, data security, mobile, mobile strategy, networking, wireless, enterprise applications, data management, collaboration, secure content management
    
IBM MaaS360
By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management, malm, mam, mdm, enterprise, emm, networking, security, wireless, enterprise applications
    
IBM MaaS360
By: IBM MaaS360     Published Date: Jun 30, 2016
Enable secure access to critical data and applications, while mitigating the risk of mobile malware
Tags : 
ibm, mobile, ciso, mobile security, security, enterprise applications, mobile computing, mobile data systems, mobile workers
    
IBM MaaS360
By: IBM     Published Date: Mar 18, 2015
Your business depends on the easy, secure movement of data. But if you’re using outdated technologies and unsecure file transfer protocol (FTP), you’re exposing your organization to risk—and driving up costs as well. Use the FTP Risk Advisor to find out your risk level, and get a customized report with recommended actions you can take to protect your files—and your business.
Tags : 
ibm, secure data movement, risk advisor, file transfer protocol, risk report, file protection
    
IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, cloud, social business, big data, data security, data protection, privacy, security, it management, knowledge management, data management
    
IBM
By: IBM     Published Date: Oct 06, 2015
Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.
Tags : 
ibm, data security, big data, endpoint devices, safeguarding, security, it management, data management
    
IBM
By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data, security
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter