communication security

Results 1 - 25 of 107Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Many companies claim to offer enterprise grade communications solutions. But how is “enterprise grade” measured and what should you look for? This fact-filled white paper outlines 8 ways to determine whether or not your provider is equipped to offer an enterprise-grade communications solution. Download this complimentary white paper: The 8 Criteria for Enterprise-Grade Communications as a Service 8x8 shares full technical details on what to expect from an enterprise-grade service platform that stands above the rest. You’ll learn the 8 criteria to look for including: What to expect when it comes to service level guarantees What geo-routing technology is and why it’s critical for optimizing global call clarity and reliability What you should look for in your communications provider’s network for global operations and superior service Which security and compliance certifications to expect from your provider Specific uptime and reliability metrics to ask your provider for How analytics
Tags : 
communications, enterprise grade, communications solution, 8x8, geo-routing
    
8x8 Inc.
Published By: Acxiom Corporation     Published Date: Jun 20, 2014
Consumers demand – no, expect – marketers to deliver highly relevant communications. Yet, daily headlines about security and privacy keep them on guard about use of their personal information. How do you reconcile the personalization privacy paradox? Guest speaker, Forrester Research, Inc.’s Fatemeh Khatibloo and Bryan Throckmorton of Acxiom will offer fresh findings on customer expectations regarding privacy and examples of how companies are building transparency and trust – and differentiating themselves – with preference centers that put more control in the hands of customers.
Tags : 
acxiom, forrester research, privacy, personalization, personal information, marketing, personalization privacy
    
Acxiom Corporation
Published By: Akamai Technologies     Published Date: Nov 13, 2018
The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is because security services and the vital tools they encompass can be empowered through the adoption of a carrier cloud model. This, in turn, better positions CSPs to meet the demands of their customers, including those in the small to medium-size business (SMB) market segment. The timing of this migration is optimal, since many SMBs now recognize the threats they face and realize that given their limited IT budgets and lack of security expertise, CSPs are well positioned to protect them from cyberattacks. While the opportunity for CSPs is significant, many are hesitant to make a move in this area because they want to ensure they can address SMBs’ needs and maintain control of the service in a car
Tags : 
    
Akamai Technologies
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: AlienVault     Published Date: Oct 21, 2014
The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.
Tags : 
communication, government, reducing cost, digital, network, public sector, logical, industry
    
AlienVault
Published By: Ayla Networks     Published Date: Aug 11, 2015
Innovative approaches for the Internet of Things on core building-block technologies in communications, IoT platforms and security. Gartner profiled five Cool Vendors that can help CIOs, IT leaders and decision makers to build IoT solutions.
Tags : 
    
Ayla Networks
Published By: Black Box     Published Date: Nov 24, 2015
Black Box can help you get the most out of your technology investment. We partner with customers to identify the right solutions for strategic IT needs that add value to your business. Our portfolios of Wired/Wireless, UCC, and IT Service solutions, and our depth of expertise, deliver positive business outcomes for evolving IT business scenarios. Black Box takes a vendor-independent approach to deliver the right solution, on the right network. Our long-term, established relationships with best-in-class IT technology providers allow us to offer objective, vendor-neutral solutions designed to meet a broad range of IT requirements. With more than 4,000 team members & 200 offices in 150 countries, we offer global capabilities with local expertise, and are committed to driving business success through IT excellence. Our passion to IT communications is unsurpassed, and we will work with you to find the ideal solution for today’s challenge while helping to anticipate tomorrow’s needs.
Tags : 
voip solutions, contact center solutions, business phone systems, ucc, it services, it solutions, it security, it infrastructure
    
Black Box
Published By: Black Lotus     Published Date: Apr 21, 2014
Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.
Tags : 
black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
Black Lotus
Published By: BlackBerry     Published Date: Oct 03, 2012
In this FAQ, learn how to establish harmony between security and usability with the BlackBerry PlayBook OS 2.0. Get the answers to your most pressing questions and make BYOD a success for your enterprise.
Tags : 
mobile device management, mobile device, mobile communications, managing mobility, mobile management, mobile security, mobile usability
    
BlackBerry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management
    
Brainloop
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm
    
Cenzic
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Jun 12, 2017
In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow.
Tags : 
sdn, nfv, packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud
    
Ciena
Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
This white paper provides migration steps that can save your business time and money - and answers to the two most burning questions about IPv6.
Tags : 
ipv6, cisco, transition, communication, migration, security, performance, version 6
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
In this whitepaper, Cisco provides recommendations on a building strategic network to address business needs for today and tomorrow.
Tags : 
ipv6, cisco, transition, communication, migration, security, performance, version 6
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The Cisco Intelligent WAN (IWAN) solution provides design and implementation guidance for organizations looking to deploy wide area network (WAN) transport with a transport-independent design (TID), intelligent path control, application optimization, and secure encrypted communications between branch locations while reducing the operating cost of the WAN. IWAN takes full advantage of cost-effective transport services in order to increase bandwidth capacity without compromising performance, reliability, or security of collaboration or cloud-based applications.
Tags : 
cisco, wan, iwan, network transport, path control, cloud computing
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : 
unified communication, communication trends, midsize business, byod, bring your own device, mobility, it management, workforce management
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco® Unified Access establishes a framework that securely, reliably, and seamlessly connects anyone, anywhere, anytime, using any device to any resource. This framework empowers all employees with advanced services, taking advantage of an intelligent, enterprise-wide network to increase revenue, productivity, and customer satisfaction while reducing operational inefficiencies across the business. Cisco Unified Access includes services-rich network edge systems and combines a core network infrastructure embedded with integration of productivity-enhancing advanced technologies, including IP communications, mobility, security, video, and collaboration services.
Tags : 
framework, network infrastructure, communications, optimization
    
Cisco
Published By: Cisco     Published Date: Jun 12, 2014
U.K. energy contractor reduces total cost of ownership while improving customer service and adopting new ways of working.
Tags : 
cisco, unified communications solutions, borderless network infrastructure, cisco ironport security, case study
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Since the 1990s, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate communications. Each day, more than 100 billion corporate email messages are exchanged.1 Security has naturally become a top priority. But mass spam campaigns are no longer the only security concern.
Tags : 
cisco, email threat, data, data security, information security
    
Cisco
Start   Previous   1 2 3 4 5    Next    End
Search Resource Library