dp and

Results 326 - 350 of 574Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 23, 2009
In the Illuminata CDP Paper, you'll see how the IBM Comprehensive Data Protection Express solution can help keep your business running. Discover diverse components and services, like Tivoli Storage Manager FastBack and System x servers, that fit your needs.
Tags : 
business continuity, ibm, tivoli, data protection, sme
    
IBM
Published By: IBM     Published Date: Oct 23, 2009
Listen to the recording, "CDPS Analyst Interview with John Webster of Illuminata," to see how the IBM Comprehensive Data Protection Express solution addresses the needs of midmarket companies that don't have adequate backup and recovery capabilities for their critical data.
Tags : 
data loss, ibm, data protection, backup and recovery
    
IBM
Published By: ESET     Published Date: Feb 17, 2010
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.
Tags : 
eset, endpoint security, networkwide platform, integrated security management, heuristic scanning, antimalware, enterprise security
    
ESET
Published By: SAS     Published Date: Apr 25, 2017
Tax evasion is the largest economic crime in the world (in terms of monetary loss), costing trillions of dollars to governments around the globe. A 2011 study by The Tax Justice Network estimates that on a global scale, total tax evasion is in excess of US$3.1 trillion, or about 5.1% of world GDP.1 And that’s just the known tax evasion and noncompliance; it doesn’t include the underground economy and cash businesses.
Tags : 
    
SAS
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
News of the Flame attack has spread faster than wildfire. While the attack effected only a small number of Endpoints, Flame signifies a new level of cyber threat that all IT security professionals need to understand in-depth.
Tags : 
security, network security, network protection, data security, data protection, cyber attack, case study
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: EMA     Published Date: Sep 23, 2013
Join Steve Brasen, EMA Managing Research Director, and Kimber Spradlin, IBM Product Marketing for Endpoint Manager, for this informative, on-demand Webinar where the latest unified endpoint management research is revealed. Learn the strategic management processes necessary to empower a mobile workforce with the agility to adapt to rapidly evolving business requirements. Topics discussed include: • Securing devices without impeding user productivity • Expanding management processes to address increased device heterogeneity • Supporting employee-owned devices • Simplifying practices for delivering business IT services • Enhancing user flexibility in accessing IT resources necessary to achieve business goals
Tags : 
ibm, ema, on-demand webinar, endpoint management, mobile workforce, strategic management, technology, productivity
    
EMA
Published By: Intel     Published Date: Aug 10, 2012
McAfee and Intel multilayer security solutions bring fresh innovation to endpoint protection to secure the future of computing and the Internet.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization
    
Intel
Published By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration
    
McAfee
Published By: McAfee     Published Date: Jan 28, 2014
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
endpoint encryption, epolicy orchestrator, drive encryption
    
McAfee
Published By: Adobe     Published Date: Sep 10, 2014
Mobile apps drive up to 4-times longer engagement than mobile sites, but mobile application development platforms (MADP) have mainly been focused on developers, making personalization and adjustments difficult for marketers. Adobe has changed that. Gartner recently evaluated the top MADP vendors, across a variety of criteria, including Completeness of Vision and Ability to Execute, and named Adobe a Leader in their Magic Quadrant for Mobile Application Development Platforms report. We help marketers and developers work together more efficiently, giving marketers an easy way to make, manage, measure, and monetize their mobile apps, so developers have more time to create rich app features.
Tags : 
mobile apps, madp, platform development
    
Adobe
Published By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : 
cloud, it pros, security, dlp, cloud securiity
    
Box
Published By: ADP     Published Date: Oct 14, 2014
In July and August 2014, the ADP Research Institute®, a specialized group within ADP®, conducted an online survey of more than 750 owners and executives at companies with 50-999 employees. The Midsized Business Owners Study is now in its third year. Midsize businesses often struggle between operating like a smaller business but having to abide by the same regulations as larger corporations. Download this case study to learn how midsize business are dealing with their three greatest concerns right now: healthcare benefit costs, the Affordable Care Act, and the level of government regulations.
Tags : 
adp, midsize business, healthcare benefit costs, affordable care act, government regulations, adp research institute, midsized business owners study, human resources
    
ADP
Published By: Great Bay Software     Published Date: Feb 04, 2015
The majority of companies have a difficult time deploying NAC across the enterprise. No existing NAC solution provides access control for all endpoints and operating systems – leaving vulnerable blind spots on the network. Some company leaders spend hundreds of thousands – even millions – of dollars on a NAC solution only to spend years trying to implement the technology. As a result, this can turn into a very frustrating process. However, the solution intended to help you better secure and manage your network shouldn’t wind up creating greater risk and chaos. There are ways to set your network and your team up for success. Here are some tips to help you when considering deploying a NAC solution.
Tags : 
great bay, software, network, access, control, implementation, nac, enterprise, technology, security, software, deployment, process, attacks, visibility, security, policies, beacon, functionality
    
Great Bay Software
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : 
cloud security, virtualization security, virtualization, data center
    
CDW-Trend Micro
Published By: AWS     Published Date: Dec 17, 2018
Watch this webinar to learn how Tr?v Insurance Solutions, an insurance agency licensed to sell on-demand property and casualty insurance products, adopted DgSecure on Amazon Web Services (AWS) to anonymize production data to help comply with GDPR and other data privacy regulations. The solution helps Tr?v meet privacy standards while enabling its analytics teams to use data to better serve its clients.
Tags : 
    
AWS
Published By: LogRhythm     Published Date: Apr 04, 2017
Is your organization prepared for a ransomware attack? Successfully defending your organization against such an attack takes preparation and an understanding of what to look for if an attack begins. This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent them, or at least shut them down, to avoid serious repercussions.
Tags : 
    
LogRhythm
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Guidance for taking any organization to the highest level of endpoint protection regardless of internal resources Organizations today have a wealth of security tools available to them but many struggle to take full advantage of the technology they have. Too often, this results in a damaging breach that could have been avoided if their solutions had been configured and updated properly or if detections had been noticed and acted on. How well your organization is doing at fully implementing its security solutions, particularly endpoint protection technology, is a reflection of your cybersecurity maturity. This white paper, “CrowdStrike Falcon Complete: How to Achieve Instant Cybersecurity Maturity for Organizations of all Sizes,” explores the challenges organizations face in getting the most out of a security solution. It also offers insights on how CrowdStrike Falcon Complete can raise you to the highest level of endpoint protection with speed and efficiency, regardless of your size an
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next-generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? This white paper, “The Five Essential Elements of Next-Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: • Details on the five essential capabilities that define true next-generation EPP and why they are so important • A matrix that evaluates and compares the potential impact of different solutions • A list of top questions to ask
Tags : 
    
CrowdStrike
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library