network secure

Results 151 - 175 of 259Sort Results By: Published Date | Title | Company Name
Published By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
    
Intel Security
Published By: Intel Security     Published Date: Jan 20, 2015
With networks sprawling to massive proportions and malicious activity constantly evolving, situational awareness is more vital than ever in keeping your network secure. But it’s not built on skills alone. Eight tools are equally as essential for keeping your situational awareness—and your network—alive.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, security
    
Intel Security
Published By: Great Bay Software     Published Date: Feb 04, 2015
The majority of companies have a difficult time deploying NAC across the enterprise. No existing NAC solution provides access control for all endpoints and operating systems – leaving vulnerable blind spots on the network. Some company leaders spend hundreds of thousands – even millions – of dollars on a NAC solution only to spend years trying to implement the technology. As a result, this can turn into a very frustrating process. However, the solution intended to help you better secure and manage your network shouldn’t wind up creating greater risk and chaos. There are ways to set your network and your team up for success. Here are some tips to help you when considering deploying a NAC solution.
Tags : 
great bay, software, network, access, control, implementation, nac, enterprise, technology, security, software, deployment, process, attacks, visibility, security, policies, beacon, functionality, networking
    
Great Bay Software
Published By: LogicNow     Published Date: Mar 10, 2016
Cyber crime is one of the most innovative businesses in existence today – and make no mistake, it is a business. This guide looks at how cyber crime has evolved and continues to evolve - and the necessity now of taking a user-focused approach to network security. If you’re in the business of helping your customers businesses stay secure – or if you’re thinking about it
Tags : 
logicnow, web protection, cyber crime, cyber security, security
    
LogicNow
Published By: Sponsored by HP and Intel®     Published Date: May 09, 2013
Uncover the impact modern business demands are having on corporate networks today and learn what you must do to ensure your network performs the way you need it to for business success.
Tags : 
virtualization, agile, security, network, network performance
    
Sponsored by HP and Intel®
Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager
    
Trend Micro SaaS
Published By: CradlePoint     Published Date: May 17, 2016
Always-on Connections for Store Networks and Powering Intelligent Systems In the fast-paced world of retail, network reliability is everything—but so are security, agility, and cost-effectiveness. Retailers want it all, and they depend on their IT administrators to balance these needs. Whether it’s ensuring an always-on connection for store networks, powering intelligent systems aimed at swaying buyer behavior, or transmitting real-time analytics to inform marketing and inventory decisions, the bedrock of successful retailing is a network that can support the growing list of mission-critical applications dependent on secure Internet connectivity. In the past, finding a solution to balance these demands has been difficult at best. Less expensive wired options like DSL mean hours of downtime each month. Alternatives like T1 connections deliver more uptime but carry a price tag that usually puts large-scale distributed deployments out of reach.
Tags : 
    
CradlePoint
Published By: CradlePoint     Published Date: May 17, 2016
This white paper explores considerations for choosing network solutions that ensure secure, reliable, and cost-effective connectivity for enabling mobile healthcare — anywhere. it also discusses the advantages of 4G LTE over traditional wired lines.
Tags : 
    
CradlePoint
Published By: CradlePoint     Published Date: May 17, 2016
With its skilled nursing facilities located in remote areas of a state known for its unpredictable and sometimes violent weather, Texas-based Creative Solutions in Healthcare (CSNH) was suffering more than its share of network interruptions. According to CIO & CISO Shawn Wiora, the company was losing network connectivity multiple times each week. This downtime not only disrupted business continuity, but was bad for morale among both the company’s IT workers and its care-delivery staff. Creative Solutions in Healthcare wanted a network connectivity solution capable of delivering highly secure, uninterrupted, and centrally managed service.
Tags : 
    
CradlePoint
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Where education connects with technology that works. For your school, college or university. With global reach and local focus, we deliver purpose built networking and communications for the education environment that enable secure, reliable collaboration between your faculty and students.
Tags : 
teachers, administrators, education leaders, cyber security, iot devices, digital content
    
Alcatel Lucent Enterprise
Published By: Qualys     Published Date: Feb 04, 2010
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
    
Qualys
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Cisco Systems     Published Date: Dec 23, 2013
Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide
Tags : 
vpn, wan, cisco, cisco validated designs, cvds, remote-site user performance, full-service network, encrypted communications, networking, wireless, enterprise applications, business technology
    
Cisco Systems
Published By: AlienVault     Published Date: Oct 21, 2014
The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.
Tags : 
communication, government, reducing cost, digital, network, public sector, logical, industry, standards, performance, security, management, unified, solution, it management
    
AlienVault
Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection, secure business
    
F5 Networks
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development, enterprise applications
    
BubblewrApp
Published By: BubblewrApp     Published Date: Jan 20, 2015
The Company (name withheld) provides data center management and monitoring services to a number of enterprises across the United States. The Company maintains multiple network operations centers (NOCs) across the country where engineers monitor customer networks and application uptimes around the clock. The Company evaluated BubblewrApp’s Secure Access Service and was able to enable access to systems within customer data centers in 15 minutes. In addition, the Company was able to: a. Do away with site-to-site VPNs – no more reliance on jump hosts in the NOC b. Build out monitoring systems in the NOC without worry about possible IP subnet conflicts c. Enable NOC engineers to access allowed systems in customer networks from any device
Tags : 
systems management, customer data centers, network operation centers, secure access service, enterprise applications
    
BubblewrApp
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com