dp and

Results 1 - 25 of 574Sort Results By: Published Date | Title | Company Name
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
IT endpoint management used to be an easier game: Managers deployed user systems with custom images when employees were hired, and employees returned them on their last day at work. Even during deployment, users had minimal abilities to impact systems and devices that were centrally managed. Servers resided in physical data centers where they could be identified and accessed. Those were the days!
Tags : 
    
Group M_IBM Q418
Published By: Carbon Black     Published Date: Nov 26, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a Kaspersky Lab customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these issues, then your endpoint security products may actually be creating more problems than they solve. Ask these questions and find out for yourself.
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Published By: NetApp     Published Date: Mar 05, 2018
This independent report addresses some common GDPR myths. Learn the facts about the new obligations and liabilities faced by companies that manage data in the EU and how to assess your risks.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : 
software provider, cloud service provider, gdpr
    
Mimecast
Published By: Symantec.cloud     Published Date: May 11, 2012
The Symantec 2012 Endpoint Security Best Practices Survey reveals that organizations employing best practices are enjoying dramatically better outcomes when it comes to endpoint protection, and many of these best practices can-and should-be leveraged by SMBs.
Tags : 
symantec, cloud, endpoint security, technology, smb, protection
    
Symantec.cloud
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Lumension     Published Date: Jun 03, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity
    
Lumension
Published By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft
    
Lumension
Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security, cyber crime
    
Lumension
Published By: ttec     Published Date: Jul 24, 2019
Omnichannel is one of those words everyone uses, but few use correctly. It’s not another word for multichannel. It’s a different state of existence. In our experience, multichannel is the ability to interact with customers across many different channels, but not necessarily in a cohesive fashion. As new channels become available, they are “bolted on” to existing customer experience infrastructure such as CRM or customer support systems. Too frequently, the management of these channels becomes siloed (web versus in-store sales, for example). The effect of this from the customer experience standpoint can be disjointed and jarring. For example, the resolution of an issue following a customer conversation with an associate in the contact center may not be reflected when the customer goes online or into a store. Yet the ability to offer multichannel service experience is table stakes for today’s business. If you’re not available in the channels where customers want you to be, you cease to b
Tags : 
    
ttec
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
    
VMware
Published By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : 
cyberthreat, healthcare, gdpr, ransomware
    
Mimecast
Published By: Great Bay Software     Published Date: Feb 04, 2015
The majority of companies have a difficult time deploying NAC across the enterprise. No existing NAC solution provides access control for all endpoints and operating systems – leaving vulnerable blind spots on the network. Some company leaders spend hundreds of thousands – even millions – of dollars on a NAC solution only to spend years trying to implement the technology. As a result, this can turn into a very frustrating process. However, the solution intended to help you better secure and manage your network shouldn’t wind up creating greater risk and chaos. There are ways to set your network and your team up for success. Here are some tips to help you when considering deploying a NAC solution.
Tags : 
great bay, software, network, access, control, implementation, nac, enterprise
    
Great Bay Software
Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 22, 2016
Your network doesn’t just transport data. It serves a myriad of apps and endpoints—mobile devices, sensors, servers, machines, cameras, wearables—and all the employees, customers, and processes that use them. Which means it can produce invaluable contextual intelligence based on real-time analytics to help you navigate the growing demands of business, security, operations, and IT. Cisco DNA delivers crystal-clear visibility across your network so you can enhance mobile experiences and make business decisions quickly and accurately.
Tags : 
    
Cisco
Published By: HP Inc.     Published Date: May 21, 2019
Sinds het begin van het digitale tijdperk verandert de wereld om ons heen sneller dan ooit en zien we een transformatie van sociale interacties, menselijk gedrag en verwachtingen. Om in een dergelijke omgeving succesvol te zijn, moeten merken hun doelgroep exact bieden wat zij willen, wanneer zij dit willen en de beloften van hun merk waarmaken.
Tags : 
    
HP Inc.
Published By: Intel Security     Published Date: Jan 12, 2016
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analysts Peter Firstbrook and Neil MacDonald have created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
Tags : 
gartner, buyers guide, endpoint security
    
Intel Security
Published By: Forcepoint     Published Date: May 14, 2019
The CISO, Head of Human Resources, CIO, and Chief Legal Council are not the cast of characters you would expect to see solve a data protection challenge. Yet, the GDPR’s far-reaching impact has forced teams who typically don’t work together to collaborate to solve a nuanced problem they never thought they would have. Get a firsthand account of how Forcepoint’s CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
    
Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library