dell security

Results 51 - 75 of 88Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen ähnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich außerhalb der Festung befinden, nicht mehr unterstützen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lösungen umgesehen, die diese Technologien heute sichern können und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verändern.
Tags : 
    
CA Technologies EMEA
Published By: Dell     Published Date: Oct 20, 2008
Windows Vista incorporates a number of new and enhanced security features that address spyware, security vulnerabilities and end user naiveté.
Tags : 
dell, cyber security shield, windows vista security, vista uac, dell assessment
    
Dell
Published By: Dell     Published Date: Oct 21, 2008
It’s not so much a matter of "if" but "when" for most organizations regarding migration to Windows Vista. Laying the groundwork now for this migration can yield higher ROI than waiting until later. This Computerworld Technology Briefing explains it all.
Tags : 
dell, windows vista, windows, security
    
Dell
Published By: Dell SecureWorks     Published Date: Apr 09, 2011
Read this whitepaper to learn how Dell SecureWorks' multi-phase Penetration testing can help you obtain a true understanding of your security and risk posture so that you can strengthen your defenses and prevent a successful attack.
Tags : 
intrusion prevention, dell, secureworks, attacks, network security, cyber risk, cyberrisk, penetration
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: Apr 17, 2011
Read this whitepaper to understand how combining the iSensor Intrusion Prevention appliance with 24x7 monitoring and administration by Dell SecureWorks' certified security experts to deliver exceptional cyber threat protection for your midsize organization.
Tags : 
isensor, secureworks, safeguard, firewalls, cyberthreats, threat protection, network security, midsize security
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: Apr 11, 2011
Read this whitepaper to understand how Dell SecureWorks can help your midsize organization improve security, increase operational efficiency and demonstrate compliance with regulatory requirements, allowing you to focus on the priorities and strategic projects that drive your business.
Tags : 
dell secureworks, internet security, compliance, regulatory compliance, vulnerability, security intelligence, global threats, cyber attack
    
Dell SecureWorks
Published By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : 
secnap, network security, data security, compliance, osi, malware, antispam, anti-spam
    
SECNAP Network Security Corporation
Published By: Dell Windows Server     Published Date: Jan 16, 2009
New virtualization tools, Web technologies, and security enhancements help save time and reduce costs, and provide you with high availability and increased flexibility for your changing business needs. Central to IT simplification is streamlining maintenance and maximizing availability — and by running Windows Server 2008 on Dell servers, you can do both.
Tags : 
dell, ws08, new virtualization, web technologies, security enhancements, windows server 2008
    
Dell Windows Server
Published By: Dell     Published Date: Mar 02, 2012
Since the emergence of the personal computer, IT managers have had to navigate through a computing and communications landscape where business and consumer technologies have intersected. Sometimes those intersections produce benefits for all involved; other times they result in destructive collisions.
Tags : 
dell, idg, mobile technology, mobile data, mobile phones, mobile services, network security
    
Dell
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
Why your current firewall may be jeopardizing your security
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
    
Dell SonicWALL
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
Dell™ SonicWALL™ thought leaders identify top IT security drivers for the year ahead.
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
    
Dell SonicWALL
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
The Impact of Attacks on Your Bottom Line
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
    
Dell SonicWALL
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
The Dell SecureWorks Security and Risk Consulting practice delivers the independent expertise, experience and perspective you need to address your security, risk and compliance concerns.
Tags : 
dell, dell secureworks, risk consulting, cyber security, security
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
Advanced Threat Protection with Dell SecureWorks Security Services
Tags : 
dell, dell secureworks, advanced threat protection, advanced persistent threats, apt, security services
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Tags : 
dell, dell secureworks, risk consulting, cyber security, security, security breach, counter threat unit
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: Sep 13, 2013
Accelerating Incident Response: How Integrated Services Reduce Risk and the Impact of a Security Breach
Tags : 
dell, dell secureworks, security breach, incident response
    
Dell SecureWorks
Published By: Dell Software     Published Date: May 10, 2013
Moving server files to a new server with permissions intact can be an awful, manual-intensive process. There is a better approach that puts you in control. Learn about suite of three products that can provide a complete solution to this and other permission-based problems and challenges.
Tags : 
dell quest, server migration, security permissions, file servers, manual-intensive process, securely migrate files
    
Dell Software
Published By: Dell Software     Published Date: May 10, 2013
Have you ever had problems securing Active Directory? In this Dell technical brief, learn about three critical tasks administrators often overlook – and why doing them helps maximize AD security.
Tags : 
dell software, active directory, ad security, dell technical brief
    
Dell Software
Published By: Microsoft Office 365     Published Date: Sep 08, 2016
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on premise solutions.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on-premise solutions. Even though a high percentage of enterprises are adopting cloud storage and compute within their businesses, the adoption of cloud-based content and collaboration products is by no means universal. Concerns relating to governance, risk, and compliance with regard to cloud services are understandable, but it is not unusual to find them overstated.
Tags : 
    
Microsoft Office 365
Published By: Dell SecureWorks     Published Date: May 28, 2013
The Dell SecureWorks Incident Response and Digital Forensics team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents.
Tags : 
incident response, security breach, security incidents
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: May 28, 2013
The Dell SecureWorks Incident Response and Digital Forensics team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents.
Tags : 
security, security breach, incident response, digital forensics
    
Dell SecureWorks
Published By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : 
upgrade, principled technologies, mobility, windows 10
    
Dell
Published By: Dell EMC     Published Date: May 09, 2018
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees
Tags : 
    
Dell EMC
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Intel® Xeon® Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside
    
DellEMC and  Intel®
Start   Previous    1 2 3 4    Next    End
Search Resource Library