data security

Results 226 - 250 of 1853Sort Results By: Published Date | Title | Company Name
Published By: Savvis UK Limited     Published Date: May 14, 2013
Savvis has been hosting eCommerce platforms for nearly two decades. Internet retailers including easyJet and Hallmark Digital trust us to power their online success. Savvis offers a comprehensive portfolio of infrastructure, network and application management across the eCommerce ecosystem. No matter what you sell or where you are along the eCommerce journey, we can support your commercial goals with the speed of implementation, accessibility, security and affordability of a retail-ready cloud environment, with our Virtual Private Data Centre. Combined with our global data centre footprint and network options ranging from Tier1 public IP access to private, low-latency connectivity, the VPDC offers a resilient, made-to-measure solution for any eCommerce application.
Tags : 
virtual, private, data centre, it foundation, ecommerce, platforms, internet retailers, online, virtual private data centre, security, affordability
    
Savvis UK Limited
Published By: Skillsoft     Published Date: Apr 23, 2015
This paper explains how embedding 7 key skills within your IT team can keep your organisation’s data safe and its employees productive. From data storage and security to database design and management, these key skills will ensure that your business is able to make the most of new technology as it develops.
Tags : 
fundamental it skills, it staff development, professional it development, skillsoft
    
Skillsoft
Published By: Blueprint     Published Date: Mar 31, 2015
Banks, insurance companies, investment firms and other financial institutions operate in a competitive, fast-moving marketplace where “speed wins.” Small errors can cost millions of dollars, bruised reputations and even worse challenges from regulatory bodies. Missteps often end up on the front page of the Wall Street Journal. Developing effective IT solutions requires a comprehensive understanding of the industry’s priorities, regulatory requirements and unique business needs. Furthermore, it demands a development approach that allows you to deliver projects with an ever increasing need for speed within the context of a dizzying amount of organizational, regulatory and business change.
Tags : 
banks, financial services, agile, waterfall, finance, financial it, data management, cyber security, compliance, risk management
    
Blueprint
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data, ibm
    
IBM APAC
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. Intel otwiera nowe mozliwosci. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeonultrabook, celeron, celeron inside
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : 
data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption, email encryption, security, business technology
    
Voltage Security
Published By: Voltage Security     Published Date: Sep 13, 2012
If there are any lingering doubts that mobile de-vices-such as smartphones and tablets-have profoundly transformed today's business, one study finds that using smart devices for produc-tivity is "now the standard.
Tags : 
data security, smart devices, smart security, data security strtegy, mobile security, security risks, security, business technology
    
Voltage Security
Published By: Voltage Security     Published Date: Sep 28, 2012
Meeting Data Residency and Compliance Challenges in Global Enterprises
Tags : 
data residency, information privacy, patriot ii act, voltage security, business technology
    
Voltage Security
Published By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : 
arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud, cloud migration, high-bandwidth attacks, volumetric attacks, deployment, multi-vector threat, ips solutions, deployment models, security
    
Arbor
Published By: Juniper Networks     Published Date: Oct 28, 2014
To understand why an open, scalable network architecture is essential for enhanced IT security in the cloud era, get our eBook. Read how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
cloud, data protection, security, security breaches, safe virtual environment, risk, network security
    
Juniper Networks
Published By: QTS Data Centers     Published Date: Jun 09, 2015
Read this white paper to learn what you need to know about cloud security and the benefits cloud migration can bring to your organization.
Tags : 
cloud security, data protection, cloud migration, enterprise security, security, it management, wireless, data management
    
QTS Data Centers
Published By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : 
mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed, wireless
    
CA Technologies
Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data, certificate security, trust protection platform
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management, apt, automated applications
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls, digital certificates, mobile application security, security management
    
Venafi
Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron
Published By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
data security, regulation, legal system, data protection
    
MobileIron
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com