"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

security solutions

Results 1 - 25 of 500Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Oracle Hardware     Published Date: Oct 20, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most compani
Tags : 
    
Oracle Hardware
Published By: Oracle Hardware     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle Hardware
Published By: McAfee EMEA     Published Date: Nov 15, 2017
To ensure fast, efficient, and comprehensive remediation of breaches, IT security decision makers have acknowledged the need to reduce the complexity of their endpoint security environments. Today’s enterprises value integrated endpoint security solutions that can effectively handle the whole process of endpoint security, including attack prevention, detection, and remediation. Single-vendor suite solutions and cloud technologies are on the rise due to their perceived benefits, including simplicity, lower costs, and better integrated coverage across platforms. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
endpoint, efficiency, security, prevention, technology, decision makers
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security Innovation Alliance Partners have integrated, tested, and certified their security solutions to work with McAfee Enterprise Security Manager. We have collaborated with our partners to simplify the integration of these products in even the most complex customer environments. This provides a truly connected security ecosystem that optimizes the value of your existing investments, improves efficiency, maximizes protection, and reduces operational costs. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
entity, analytics, mcafee, enterprise, security, customer, environments
    
McAfee EMEA
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services, access control, application security, security management
    
Cisco
Published By: Cisco     Published Date: Jun 22, 2015
Read this paper to find out how the Cisco and Microsoft data center solutions provide your IT infrastructure with the flexibility and agility needed to address your changing business needs and achieve your business goals.
Tags : 
cisco and microsoft data center, it infrastructure, security risks, data center, data center solutions, security management, virtualization, cloud computing, infrastructure, design and facilities
    
Cisco
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Despite momentous benefits, cloud computing has its own set of challenges that must be addressed. The primary concern that many enterprises and end users have is related to security, especially data protection and privacy and loss of control. This article discusses the several challenges associated with security for cloud-based video conferencing and how organizations can remove these barriers by adopting solutions that implement security as a key tenet.
Tags : 
cloud, video conference, protection, security, management, application security, security management, productivity, cloud computing
    
LifeSize, a division of Logitech
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
IT security used to be about keeping intruders out and selectively letting in friendly visitors, which was best accomplished with a range of perimeter security and end-point solutions. Download this asset to learn more how the landscape has fundamentally shifted since, with much of this shift accelerating in the last 2-3 years. Sponsored by: HPE and Intel®
Tags : 
best practices, technology, security, business management, intel, hpe
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jan 05, 2016
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions
Tags : 
cisco, next gen buyer, guide, network security, solutions, security, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: GE Power     Published Date: Jan 31, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : 
cyber security power plants, utilities, power producers, power plant cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment
    
GE Power
Published By: VMware     Published Date: Feb 24, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware
Published By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle CX
Published By: Gigamon     Published Date: Oct 19, 2017
Download the Forrester Total Economic Impact™ of Gigamon: Cost Savings and Business Benefits Enabled by Gigamon to see how customers benefit from comprehensive and scalable visibility across their networks. This study delves into a cost-benefit analysis of the Gigamon security delivery platform, network visibility and traffic monitoring solutions that enable companies to see what matters in order to meet their security objectives, increase productivity and keep hardware, software and personnel costs in check without affecting performance.
Tags : 
    
Gigamon
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory