application security

Results 451 - 475 of 761Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Jan 15, 2016
A growing number of organizations are realizing the benefits of mobile devices, including increased productivity, enhanced efficiency and speedier response times. Yet while the use of mobile devices typically leads to lower costs and additional revenue opportunities, it also brings challenges associated with device and application procurement, data connections, service costs, content management and — most important — security.
Tags : 
cdw, effective mobile policy, mobile devices, revenue opportunities, application procurement
    
CDW
By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management
    
Polycom
By: New Relic     Published Date: Mar 17, 2015
This white paper will help you understand how you can achieve end-to-end visibility into application performance no matter where your application or parts of your application are running. You’ll learn what to look for when choosing an application performance monitoring solution and we’ll share some lessons learned about monitoring applications in the cloud.
Tags : 
application performance, apm, monitoring solutions, cloud integration, hybrid clouds, data center, private data security, mobile agility, cloud agility
    
New Relic
By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture
    
Box
By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : 
cloud, it pros, security, dlp, cloud securiity
    
Box
By: Singlehop     Published Date: Oct 01, 2014
As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.
Tags : 
cloud security, infrastructure threats, security data, chp infrastructure
    
Singlehop
By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content
    
bigtincan
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
    
CDW-Trend Micro
By: Microsoft Azure     Published Date: Apr 11, 2018
Developing for and in the cloud has never been more dependent on data. Flexibility, performance, security—your applications need a database architecture that matches the innovation of your ideas. Industry analyst Ovum explored how Azure Cosmos DB is positioned to be the flagship database of internet-based products and services, and concluded that Azure Cosmos DB “is the first to open up [cloud] architecture to data that is not restricted by any specific schema, and it is among the most flexible when it comes to specifying consistency.” From security and fraud detection to consumer and industrial IoT, to personalized e-commerce and social and gaming networks, to smart utilities and advanced analytics, Azure Cosmos DB is how Microsoft is structuring the database for the age of cloud. Read the full report to learn how a globally distributed, multi-model data service can support your business objectives. Fill out the short form above to download the free research paper.
Tags : 
    
Microsoft Azure
By: Amazon Web Services     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
Amazon Web Services
By: Amazon Web Services     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
Amazon Web Services
By: Amazon Web Services     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
Amazon Web Services
By: McAfee     Published Date: Mar 31, 2017
Modern malware now masks itself to evade detection. It hides by piggybacking or misusing legitimate applications. With state-of-the-art threat detection and containment tools from Intel Security, organizations can unmask the most sophisticated hidden threats.
Tags : 
malware. threat detection, intel security
    
McAfee
By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee
By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud, cloud usage, cloud security
    
McAfee
By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee
By: Insight     Published Date: Dec 05, 2017
Will you evolve with the digital workforce? New-era workers are breaking the confines of their cubicles. That means businesses need to offer more digital work experiences — but the path isn’t always clear. We’re rallying three workplace technology experts to discuss how to orchestrate a modern device and cloud application rollout to empower your anywhere, anytime workforce. Today’s solution landscape is ripe with effective ways to help organizations empower modern workers. In this exclusive Livestream, you’ll learn the true value of modern devices and cloud applications — and how to orchestrate every moving part of a connected workforce without compromising security.riving workplace disruption? This Livestream recording will reveal: -What’s driving workplace disruption? -What real-world tactics can we implement to conquer disruption? -How can we leverage the cloud? -What are the biggest challenges IT faces when modernizing?
Tags : 
technology, forum, workforce, workers, business, security
    
Insight
By: Avaya     Published Date: Nov 27, 2017
With Avaya, you have a complete, across-the-board solution that brings it all together. From telephony and video to mobility and contact center applications, to networking, security, and ongoing services, Avaya IP Office will help give your business a competitive edge. Let you do more, with less. Drive profitable growth, without driving up costs. Perform better now and in the future.
Tags : 
    
Avaya
By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
    
Qualys
By: Qualys     Published Date: Nov 05, 2013
Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals – making it a potential Achilles heel for security.
Tags : 
qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability, browser security
    
Qualys
By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : 
qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services, disaster recovery, data security, vulnerabilities management, security services, web applications, virtualisation, mobility
    
Qualys
By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies, enterprise applications, enterprise integration, vulnerability scanners, threat management, security platforms, cloud
    
Qualys
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.