security challenges

Results 151 - 175 of 340Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
Published By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: The common challenges of data security Steps to solve these challenges And much more
Tags : 
finance, data security, security risks, encryption
    
Citrix ShareFile
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: MarkLogic     Published Date: May 15, 2017
Data is critical to the entertainment industry and not taking advantage of it can keep you from creating great experiences and delivering the right content to partners. And, more than that, it can make it hard for you to optimize operations, get insight into the content’s value and stay ahead of the many changes in how content is created, consumed and monetized. However, even with the new digital tools in production, there are many challenges to making use of this data. The effort involved can take time and resources away from film production, introduce security risks, and leave key data inaccessible to those that need it. In this paper, we review: • The current state of production data • The challenges the entertainment industry is facing in making use of data • A new “Smart Content” approach that is helping industry pioneers to reduce complexity on the set, drive reporting, and enable them to stay ahead of market changes
Tags : 
    
MarkLogic
Published By: VMware     Published Date: May 10, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. Download this whitepaper to discover how VMware Workspace ONE™ brings together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware
Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast
Published By: Okta     Published Date: Apr 17, 2017
In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.
Tags : 
    
Okta
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security, anti virus
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, financial services, client data protection, security risk
    
Citrix ShareFile
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, itdiscusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: Microsoft Windows     Published Date: Mar 31, 2017
This IDC Executive Brief uses recent research and IDC thinking to outline some of the challenges facing client computing, security, and compliance teams. In particular, it outlines how many of these challenges can be addressed through the deployment of Windows 10. It then looks at how well current hardware takes advantage of these core functions and features, concluding that for many organizations their current approach to hardware may well fall short of expectations.
Tags : 
    
Microsoft Windows
Published By: IBM     Published Date: Mar 30, 2017
This Ventana Research e-Book presents background, adoption, benefits, advantages to midsize businesses, security considerations, challenges of hybrid cloud adoption and recommendations for evaluating hybrid cloud for midsize organizations Download now to learn more!
Tags : 
ibm, ventana research, hybrid, midsize businesses, hybrid cloud, cost reduction, business proficiency, cloud computing
    
IBM
Published By: IBM     Published Date: Mar 29, 2017
This Ventana Research e-Book presents background, adoption, benefits, advantages to midsize businesses, security considerations, challenges of hybrid cloud adoption and recommendations for evaluating hybrid cloud for midsize organizations Download now to learn more!
Tags : 
ibm, ventana research, hybrid, midsize businesses, hybrid cloud, cost reduction, business proficiency, cloud computing
    
IBM
Published By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
insights, mobile, security, byod, lookout
    
Lookout
Published By: VMware AirWatch     Published Date: Mar 02, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. This is where VMware Workspace™ ONE™ comes in — we’ve brought together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware AirWatch
Published By: Oracle     Published Date: Feb 09, 2017
For hotel executives in the midst of, arguably, the most disruptive transformation of their industry, there is a litany of reasons: Global competition. Intense cost-control pressures. Cybersecurity threats. Social media challenges. Relentless IT updates.
Tags : 
    
Oracle
Published By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
Published By: Cisco     Published Date: Dec 21, 2016
The Cisco 2016 Annual Security Report—which presents research, insights, and perspectives from Cisco Security Research—highlights the challenges that defenders face in detecting and blocking attackers who employ a rich and ever-changing arsenal of tools. The report also includes research from external experts, such as Level 3 Threat Research Labs, to help shed more light on current threat trends. We take a close look at data compiled by Cisco researchers to show changes over time, provide insights on what this data means, and explain how security professionals should respond to threats.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
It’s possible to lead the world in an industry—medicine in this case—and to simultaneously lag behind when it comes to network security. One large national hospital system faced serious IT challenges. Network investment had been put off to the point of opening critical security vulnerabilities. A massive attack surface and limited visibility meant a threat could penetrate the network and remain hidden for months. It put critical systems, employees, patients, and the hospital’s reputation at risk.
Tags : 
    
Cisco
Published By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : 
upgrade, principled technologies, mobility, windows 10
    
Dell
Published By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : 
upgrade, principled technologies, mobility, windows 10
    
Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library