communication security

Results 1 - 25 of 100Sort Results By: Published Date | Title | Company Name
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Samsung     Published Date: Dec 18, 2015
Download this whitepaper to see how mobile technology can help improve patient care, communication, and security
Tags : 
    
Samsung
Published By: Cisco     Published Date: Feb 23, 2016
Cisco® Unified Access establishes a framework that securely, reliably, and seamlessly connects anyone, anywhere, anytime, using any device to any resource. This framework empowers all employees with advanced services, taking advantage of an intelligent, enterprise-wide network to increase revenue, productivity, and customer satisfaction while reducing operational inefficiencies across the business. Cisco Unified Access includes services-rich network edge systems and combines a core network infrastructure embedded with integration of productivity-enhancing advanced technologies, including IP communications, mobility, security, video, and collaboration services.
Tags : 
framework, network infrastructure, communications, optimization
    
Cisco
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
According to a McKinsey study, half of all outsourced projects failed to meet their expected goals – while an Information Week Survey showed that 40% of outsourced projects did not save money! Factors that contribute to these problems include issues with quality, time zone challenges, and added travel expenses, among others.
Tags : 
collaborative consulting, infographic, offshoring, real company costs, language issues, communication issues, property risk, security systems, onshore opertaions, offshore costs
    
Collaborative Consulting
Published By: Polycom     Published Date: Sep 04, 2012
This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Tags : 
firewall traversal, polycom, unified communications, security solutions, uc devices
    
Polycom
Published By: ServiceNow     Published Date: Oct 02, 2015
From students to executives, finding solutions to improve efficiency, productivity, and communication has become vital. These end users are trying to excel in their work, and while they don't mean to cause harm, in most organizations this desire leads to the use of applications, services, and data storage and sharing beyond IT's boundaries. This practice, known as “shadow IT,” walks a line that information security officers are uncomfortable with, and it's having an obvious impact on technical support teams. The good news is, there are opportunities for all support organizations, regardless of their stance on shadow IT.
Tags : 
    
ServiceNow
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Secureworks     Published Date: Nov 11, 2016
In this white paper we will discover what the evolving path ahead for security leaders looks like, the importance of communication from top to bottom, focusing on how proactive measures can stop threat actors from derailing businesses, and how building a security architecture that protects the most critical assets will support the overall goals of an organisation.
Tags : 
managed security services, security, threat and vulnerability management, security, security architecture, cyber security
    
Secureworks
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: IBM APAC     Published Date: Sep 25, 2017
Industry convergence is collapsing the barriers between formerly distinct industries. According to “Redefining Connections: Insights from the Global C-suite Study – The CIO Perspective,” produced by the IBM Institute for Business Value, CIOs believe this is the biggest trend transforming the business arena.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
IBM APAC
Published By: Venafi     Published Date: Jul 27, 2015
According to Gartner, by 2017, more than ?50% of network attacks will use encrypted SSL/TLS. Most organizations cannot decrypt and inspect SSL communications to detect these threats, which creates security blind spots.
Tags : 
ssl traffic, venafi, tls, security blind spots, it security, it security solutions
    
Venafi
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss
    
Vectra Networks
Published By: Level 3     Published Date: Mar 04, 2016
Are You Prepared For Complex Attacks On Your Network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Tags : 
level 3 communications, hybrid security, best practices, it security, hybrid security architecture, ddos
    
Level 3
Published By: Level 3     Published Date: Mar 04, 2016
It’s time to think differently about your network security. Forget the fragmented and reactive approach you’ve used in the past with patchwork point solutions under separate IT silos. According to Frost & Sullivan’s report, you need a holistic approach to network security.
Tags : 
level 3 communications, frost and sullivan, network security, best practices, isp, malware protection, apt protection
    
Level 3
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
The whitepaper is intended for security practitioners as well as developers and administrators of applications who can benefit from secure communications. The paper presents carious strategies for securing applications using Oracle Solaris 11 security and hardware-assisted cryptographic acceleration features of Oracle's SPARC processors. The paper unveils the core mechanisms, configuration, and deployment strategies, as well as the role of relevance of using Oracle Solaris Cryptographic Framework and Java Cryptography Extension-based techniques for delivering a high-performance, end-to-end security solution. With Oracle's new Software in Silicon capabilities coupled with an innovation cache and memory hierarchy, Oracle's SPARC M7 processor delivers dramatically higher processing speed and revolutionary protection against malware and software errors.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Workday     Published Date: Jul 19, 2017
Multi-tenancy is a key feature of Workday and enables multiple customers to share one physical instance of the Workday system in a highly secure environment. Multi-tenancy is enabled through the Workday Object Management Server (OMS). Workday OMS allows servers to host multiple customer tenants simultaneously and builds “security walls” between each of the tenants. Thanks to Workday OMS, there is no way for any worker in one tenant to access the information of another tenant. Workday delivers its software using a continuous development model. Builds are rolled out weekly that contain new features, bug fixes, or performance improvements. Twice a year, Workday takes all the features put into preview and releases them to production for all customers. Workday customers are never landlocked on an old release, and all customers can utilize new features for the products they purchased as soon as they are live.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
Workday
Published By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerry’s new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In today’s highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
MobileIron
Published By: Cloud Direct     Published Date: Jan 17, 2018
Senior leaders realise the stakes of not addressing digital transformation. PWC suggests that CEOs who aren’t prioritising digital are either changing their minds or being phased out. If you compare PWC’s 2007 Digital IQ report to 2016’s, you’ll see that the number of executives who said their CEO was a champion for digital has more than doubled from 33% to 68%. Digital transformation doesn’t have to be intimidating or complicated. If you take it in stages and work with an experienced partner, it can be a straightforward journey. At this stage, it’s all about transforming how people work.
Tags : 
cloud, business, communication, mobile, collaborating, security
    
Cloud Direct
Published By: TigerText     Published Date: Aug 24, 2016
This white paper shows how instant communication improves security, population health, and interoperability.
Tags : 
    
TigerText
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Founded in 1997, Benchmark Senior Living is the largest senior living provider in New England. The community in Shelton, Connecticut is just a short drive from the Connecticut coastline—the Split Rock community is home to about 50 assisted living and memory care residents. In addition to being a LEED-certified facility, Split Rock also exemplifies Benchmark Senior Living’s goal to leverage technology to enrich the lives of residents. To that end, the facility incorporates a range of communication technologies to promote engagement with family and the community. Read this case study to learn about how Benchmark Senior Living selected an integrated solution from STANLEY Healthcare and STANLEY Security encompassing emergency call from portable pendants and fixed call points, wander management, environmental monitoring and access control to improve resident's lives.
Tags : 
healthcare, resident safety, senior living, assisted living, locating system, wi-fi
    
STANLEY Healthcare
Start   Previous   1 2 3 4    Next    End
Search Resource Library