> Technology > Data Security
 

Data Security

Data Security
Results 126 - 150 of 289Sort Results By: Published Date | Title | Company Name
White Paper Published By: F5 Networks Inc     Published Date: Dec 11, 2015
An Enterprise Mobility Gateway helps organizations scale, manage, secure, optimize and control today’s required anytime, anywhere network, cloud, and application access.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility
    
F5 Networks Inc
White Paper Published By: ThingWorx     Published Date: Dec 02, 2015
The evolution of products into intelligent, connected devices— which are increasingly embedded in broader systems—is radically reshaping companies and competition.
Tags : 
thingworx, network, manufacturing, intelligent device, product
    
ThingWorx
White Paper Published By: ThingWorx     Published Date: Dec 02, 2015
Security is a primary concern of ThingWorx customers — especially device manufacturers and end-customers that deliver and use connected products. These customers demand a proven solution that protects them and their customers against hackers, malware and unsafe operations.
Tags : 
thingworx, security, operations, audit, customer
    
ThingWorx
White Paper Published By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : 
arbor, ddos, protection, enterprise, data security
    
ArborNetworks
White Paper Published By: Resilient Systems, Inc.     Published Date: Nov 25, 2015
How does your business’s cyber resilience compare to other European organisations?
Tags : 
resilient, incident response, enterprise, security, enterprise applications
    
Resilient Systems, Inc.
White Paper Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
Maintaining a discipline of strong cybersecurity has become increasingly difficult at enterprise organizations.
Tags : 
resilient systems, incident response, platform, cybersecurity, security
    
Resilient Systems, Inc.
White Paper Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
With cyber attacks growing increasingly frequent and complex, cybersecurity strategies are shifting: while prevention is still important, it is more about prevailing.
Tags : 
resilient systems, threat, cybersecurity, security, data center
    
Resilient Systems, Inc.
White Paper Published By: Box     Published Date: Nov 24, 2015
Organizations are struggling to ensure their content is appropriately secure, while remaining easily searchable, accessible and shareable both inside and outside of the enterprise.
Tags : 
box, business, enterprise, information governance, content
    
Box
White Paper Published By: Rackspace     Published Date: Nov 24, 2015
Security is persistently top of mind for IT and business leaders because there is so much at stake. Can vendors help your organization take the topic of security from a challenge to a champion?
Tags : 
digital security, it security, data security, security risks, hosting
    
Rackspace
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : 
intralinks, mwd, volterra fietta, goldilocks zone, security
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel.
Tags : 
kuppingercole, information sharing, security, data, intralinks
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
Use this guide to clarify the process, and move toward the right solution.
Tags : 
enterprise, intralinks, collaboration, security, data
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
intralinks, security, data, threat, business technology
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management
    
Intralinks
White Paper Published By: Cisco     Published Date: Nov 17, 2015
This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor. It describes: - Trends surrounding the adoption of cloud contact center technology; - The advantages of selecting a cloud contact center solution; - Key factors to review when selecting a vendor and contact center platform; - Recommendations and a maturity model that businesses can use to develop a cloud contact center roadmap.
Tags : 
ovum, cisco, white paper, cloud contact center, contact center solution
    
Cisco
White Paper Published By: IBM     Published Date: Nov 16, 2015
The report is sponsored by vendor firms Actian Corporation, Cloudera, Exasol, IBM, MapR Technologies, MarkLogic, Pentaho, SAS, Talend, and Trillium Software.
Tags : 
ibm, tdwi, enterprise, information technology, data management
    
IBM
White Paper Published By: Adobe     Published Date: Nov 10, 2015
Download this white paper to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, data security, mobile device, enterprise
    
Adobe
Webinar Published By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : 
ibm, document management, data security, productivity, enterprise
    
Adobe
White Paper Published By: Dyn     Published Date: Nov 10, 2015
Read this Gartner Research Report and learn why without properly functioning external DNS, Internet-based resources may "disappear" without warning.
Tags : 
dyn, dns, digital business, gartner, internet-based
    
Dyn
White Paper Published By: Okta     Published Date: Nov 09, 2015
This Forrester report outlines the future IT environment for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. Read this report to learn more.
Tags : 
okta, forrester, identity and access management, it environment, security and risk
    
Okta
White Paper Published By: Dell EMC     Published Date: Nov 03, 2015
This white paper details how the EMC Isilon OneFS architecture provides high availability and data protection needed to meet the challenges organizations face as they deal with the deluge of digital content and unstructured data and the growing importance of data protection.
Tags : 
emc, data protection. isilon, nas, digital content, security
    
Dell EMC
White Paper Published By: Dell EMC     Published Date: Nov 03, 2015
This white paper outlines the principles and concepts involved in implementing an enterprise-class archive repository using EMC Isilon scale-out storage.
Tags : 
emc, nas, isilon, enterprise, data storage
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com