dp and

Results 101 - 125 of 570Sort Results By: Published Date | Title | Company Name
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
The threat landscape has evolved and the traditional approach to endpoint security cannot keep up. Detection/response is not an acceptable approach. There are a number of approaches to prevent threats on the endpoint and their ability to prevent unknown and zero-day threats varies widely. Join this webinar featuring a guest speaker from Forrester where we will discuss the findings from a recent commissioned survey they conducted that evaluates these approaches and illustrates that exploit prevention and integration with a network security platform are must-have capabilities. Forrester will also summarize their recommendations for prevention of advanced threats on the endpoint.
Tags : 
security, endpoint, zero day exploit, forrester, phishing, ddos
    
Palo Alto Networks
Published By: CA Technologies     Published Date: Sep 13, 2017
"Explore survey results on the readiness of organizations to meet the compliance needs of the GDPR. Given the GDPR is set to have wide-ranging implications for the type of data that can be used in non-production environments, CA Technologies wanted in particular to understand how companies are planning for the GDPR and what processes and technology is needed to help them. Explore the results of a survey to understand the readiness of organizations to meet the compliance needs of the GDPR."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"The Implications for Test Data Management The GDPR is set to have wide-ranging implications for the type of data which can be used in non-production environments. Organizations will need to understand exactly what data they have and who’s using it, and be able to restrict its use to tasks where they have consent. Learn more about how you can protect the data that matters most and comply with the GDPR."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"As the EU General Data Protection Regulation (GDPR) looms overhead, finding specific answers to these obvious questions, How do I best want to secure my data, and which kind of data? Which milestones along the development journey are most at risk?, you might also begin to ask the right questions about how to solve them, and with that, begin ticking the GDPR box for each and every task at hand. View this Computing Research report to understand why GDPR is a state of mind, not just a technology solution."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"Companies have complied with data protection directives and regulations for more than two decades. But the General Data Protection Regulation (GDPR), an overhaul of existing European Commission data protection legislation, aims to strengthen and unify those laws for EU citizens. Primary GDPR objectives are to give citizens back control over their personal data and simplify the regulatory environment for international business. For organizations already compliant with Directive 95/46/EC, what do they need to do from a technology perspective to comply with GDPR? Read this solution brief to see how CA can help you with GDPR compliance."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"GDPR, the General Data Protection Regulation has just been signed into law and enacts new rules and stiff penalties for any company who misuses or loses European Union (EU) citizens’ personal data. This sweeping legislation has expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across development and testing environments. Test data management, the process of obtaining and distributing test data for development teams, takes on greater urgency as the GDPR deadline looms. Solid test data management practices will be key to overcoming compliance roadblocks and avoiding huge fines associated with GDPR. Utilizing new ways in which test data can be generated, distributed and managed will be pivotal role to meeting this regulation. In this webcast, Vanson Bourne and CA will present the results of their highly anticipated GDPR readiness survey of 200 corporations in North American and the UK. Join us to learn more about: •Th
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe with global impact that will come into force on May 25th, 2018. Its objective is to further strengthen data protection. Enforcement will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. In this webinar, CA experts will share some thoughts around the journey organizations are on and discuss some real life examples.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"There's new legislation in place, that's expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across testing and development environments. It's the General Data Protection Regulation (GDPR). Are you ready for it? In this session, we’ll demonstrate how CA Test Data Manager helps to both mask your production data and to generate synthetic test data; a powerful combination to help you meet compliance needs and deliver quality applications. There will be a short section on the future of the tester self-service model that will enable testers to efficiently get access to the right test data."
Tags : 
    
CA Technologies
Published By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
    
VMware
Published By: VMware     Published Date: Aug 02, 2017
When evaluating and migrating to Windows 10, it is critical to understand the use cases and benefits of various deployment choices. Should you: • Refresh or upgrade your existing deployments? • Migrate your physical endpoints to VDI? • Extend published remote apps to your Windows endpoints? We look at these use cases and introduce SysTrack - a tool that provides recommendations on an optimal Windows 10 deployment approach your organizations should take.
Tags : 
    
VMware
Published By: CrowdStrike     Published Date: Feb 01, 2017
A large and growing number of security solutions are being touted as the ""next generation"" in cyber defense, and endpoint protection products are no exception. This has led to widespread confusion about which solutions have truly incorporated next-generation technologies and approaches, and which ones are making empty claims or half-hearted attempts. CrowdStrike developed this white paper to help you sift through the hype and uncover the critical elements that a true next-generation endpoint security solution must include. Download this white paper to explore: ? An explanation of the essential elements of Next-Generation Endpoint Protection ? An evaluation matrix for comparing the potential impact of different solutions ? A list of the top questions to ask potential vendors ? Tools to help you measure and compare different solutions
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
    
CrowdStrike
Published By: Pure Storage     Published Date: Nov 02, 2017
FlashBlade fabric modules implement a unified network that connects all blades to each other and to the data center network. With full connectivity, all blades can serve as client connection endpoints, as authorities that process client requests, and as storage managers that transfer data to and from flash and NVRAM.
Tags : 
storage systems, network, hardware components, architectural, storage software, integrated software
    
Pure Storage
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
Digital technologies and increasing customer engagement point traditional financial institutions towards a wonderful new world of an enhanced customer experience. Herded by a wave of regulatory ‘enablers’ - through the yin-yang regulations in the form of the GDPR and PSD2 - the industry landscape is ripe for transformation for those willing and able to embrace this new world: connected customer ecosystems beyond their own institutional walls. In doing this, this creates more comprehensive customer journeys - and ultimately, better quality customer experiences.
Tags : 
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a Kaspersky Lab customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these issues, then your endpoint security products may actually be creating more problems than they solve. Ask these questions and find out for yourself.
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Published By: Splunk     Published Date: Aug 21, 2018
How can you utilize machine data to support compliance with the General Data Protection Regulation of the European Union? This white paper, “How Machine Data Supports GDPR Compliance”, answers this question and identifies three use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment – on-premises, in the cloud or hybrid Download the white paper to: *Master the risks necessary to be prepared for GDPR through real-world scenarios *Understand which articles of GDPR will impact your business *Learn how machine data can help you overcome those requirements
Tags : 
    
Splunk
Published By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
    
Splunk
Published By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: Mar 07, 2019
IT transformation is never easy – being a continuous endeavor with no single, definite endpoint – which makes the CIO role in the future of enterprise IT, more important and more difficult. Our e-book, The CIO’s IT Transformation Guide, helps CIOs avoid known pitfalls with a tour of the Rackspace framework to explore IT transformation results in the trenches. With examples of real-world successes and challenges taken from within Rackspace, and the companies that have journeyed with Rackspace, this is a must-have resource for the modern CIO.
Tags : 
    
Rackspace
Published By: Oracle     Published Date: Nov 30, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle Dyn
Published By: Sophos     Published Date: Oct 07, 2015
This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : 
endpoint buyers, vendors, endpoint security solution, antivirus, security solutions, security, security threats, endpoint buyers guide, endpoint security solution
    
Sophos
Published By: Mimecast     Published Date: Apr 25, 2017
Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance.
Tags : 
gdpr, security, regulation, forrester
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : 
gdpr, risk mitigation, email resiliency, personal data protection
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library