"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

protection

Results 251 - 275 of 1928Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Après des années de négociations, le règlement général sur la protection des données (RGPD) de l'Union européenne prendra effet le 25 mai 2018. Il abrogera la directive européenne relative à la protection des personnes physiques à l'égard du traitement des données à caractère personnel, vieille de 22 ans.
Tags : 
personne concernée, données à caractère personnel, responsable du traitement, sous-traitant, violation de données
    
Proofpoint
Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : 
srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage, networking, platforms, storage, storage management
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : 
tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe, storage, backup and recovery
    
CA Mainframe
Published By: Tellabs     Published Date: Mar 23, 2012
Tellabs' white paper explains how IPsec addresses the security issues inherent in LTE networks. It also reviews the end-to-end protection solutions available in the IETF IPsec standard.
Tags : 
deploy, tellabs, network migration, migration, synchronization, ethernet, backhaul, backhaul network, scalability, revenues, networking, security
    
Tellabs
Published By: NetApp     Published Date: Nov 13, 2017
This easy to read eBook provides an overview of cloud-integrated backup solutions. Discover how you can:* Modernize your backup strategy* Reduce data protection cost* Secure your backup data in a cloud
Tags : 
    
NetApp
Published By: NetApp     Published Date: Nov 13, 2017
Why move to cloud-integrated data protection? Discover how NetApp AltaVault cloud-integrated data protection enables companies to save money and increase efficiency.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Nov 27, 2017
Join data protection experts from Forrester Research, NetApp and AWS and find out how to secure your Microsoft Office 365 business-critical data from accidental deletion, corruption, or malicious intent.
Tags : 
    
NetApp
Published By: LifeLock     Published Date: Mar 02, 2015
Find out why LifeLock identify theft protection is the right choice for your business with this quick guide to our technology, leadership team, marketing strategy and more.
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: Mar 02, 2015
Learn about what each of our identity theft protection services has to offer, so you can choose the service that’s right for you.
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: Mar 02, 2015
See a comparison of LifeLock identity theft protection services versus credit monitoring via card companies and credit bureaus.
Tags : 
    
LifeLock
Published By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : 
ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
    
MobileIron
Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats, fraud protection, email security, security threats, phishing, networking, security, it management, data management, data center
    
Mimecast
Published By: Mimecast     Published Date: Apr 21, 2016
Download the new E-book, Email Security Uncovered: The Five Faces of IT Preparedness, to learn the latest trends in email security and tips on how you can boost your security confidence.
Tags : 
email, security, trends, cyber attacks, threats, cyber threats, fraud protection, email security, security threats, phishing
    
Mimecast
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Cisco     Published Date: Apr 11, 2016
Máxima eficacia en seguridad en el Security Value Map de sistemas de detección de violaciones de NSS
Tags : 
    
Cisco
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory