lock down

Results 76 - 100 of 112Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Jan 28, 2014
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
endpoint encryption, epolicy orchestrator, drive encryption
    
McAfee
By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management
    
Enterprise Mobile
By: Microsoft Azure     Published Date: Apr 11, 2018
Make sure you’re getting the most out of your data and the artificial intelligence (AI) technologies available. Read the e-book, Six cloud data challenges solved for app developers and get actionable answers. Learn the best approach when faced with six familiar data scenarios: Keeping track of essentials such as scalability and availability. Making sure your app delivers consistent service to multiple customers. Delivering data in real time, across the globe, without the complexities of multiple datacenters. Creating actionable insights from big data. Incorporating artificial intelligence into your apps. Locking down security while building in the cloud.
Tags : 
    
Microsoft Azure
By: G/O Digital     Published Date: Nov 13, 2014
Every year, consumers flock to malls, department stores and retailers - big and small - to score huge savings and deals on holiday gifts. All the while, these shoppers are chained at the hip to their smartphones and tablets to stay connected to what's happening in real time. Download this research report for a snapshot of how local search and mobile marketing streamline the path to in-store sales for small businesses.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
    
G/O Digital
By: Tripwire     Published Date: Oct 14, 2010
Now smart CISOs are looking to lockdown the enterprise to achieve continuous compliance and narrow the breach-to-detection gap with baseline controls in configuration and change management.
Tags : 
tripwire, breach, detection, security, configuration and change management, compliance
    
Tripwire
By: Marketo, INC.     Published Date: Sep 25, 2008
This free white paper reveals that more than half of all inside salespeople have less than 2 years of experience—with annual turnover close to 50%. You can’t change that, but you can back your team with superior planning. Learn 3 critical factors that can make or break your inside sales effort; the 6 building blocks of an effective sales team; and how formulating a strategic plan can help ensure your team’s success. Download now—and start building a world-class inside sales team.
Tags : 
sales, inside sales, marketing, sales reps, sales executives, sales team, sales motivation, prospects
    
Marketo, INC.
By: Curalate     Published Date: May 03, 2016
With billions of images shared daily across a growing number of channels and touchpoints, there are now more opportunities for people to consume content and discover products than ever before. The result? Visual commerce – the emerging need for marketers and brands to understand how images engage and convert consumers at every point of the purchase funnel. If this sounds familiar, then you're among the 77% of marketers who agree there's a growing amount of pressure to connect visual content to ROI. Get Your Complete Guide to Visual Commerce and learn how to: - Develop and source new, creative content for your brand. - Harness your visual data to discover which images really resonate with your fans. - Monetize your visual content, and measure the new ROI – Return on Image. So, are you ready to unlock the power of your visual content? Download your free marketing guide today.
Tags : 
curalate, visual commerce. ecommerce, visual data, measuring roi
    
Curalate
By: Fujitsu     Published Date: Feb 06, 2017
When you embark on an SAP HANA transformation, your goals should include simplifying operations and empowering your business to compete and win in the digital economy. But big transformation projects like this are extremely complex. Learn key insights into common speed bumps and roadblocks that may slow you down, as well as valuable tips to help you along your transformation journey.
Tags : 
sap hana, hana cloud platform, sap hana cloud platform, sap hana platform, sap hana analytics
    
Fujitsu
By: HP     Published Date: Jan 12, 2012
Once the cloud migration begins, finalizing SLAs with third parties, locking down the security of virtualized environments and investing in identity management, access control and reporting tools to support the new cloud business models will be essential steps to success.
Tags : 
cloud computing, cloud environment, virtualization, technology
    
HP
By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM
By: Vision Solutions     Published Date: Dec 31, 2007
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability
    
Vision Solutions
By: McAfee     Published Date: Nov 06, 2013
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
mcafee, endpoint encryption, epolicy orchestrator, drive encryption
    
McAfee
By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
    
Absolute Software
By: Salesforce.com     Published Date: Jun 24, 2013
Public cloud platforms are key to unlocking the flexibility, productivity, and economic advantages of cloud computing. Download the Forrester Research, Inc. report to learn: • Which public cloud platforms are best suited to each type of development pro • Forrester’s evaluation of the 14 most significant public cloud platforms • Why Salesforce was cited as a leader in all four categories of AD&D leaders
Tags : 
public cloud, flexibility, productivity, cloud computing, platform, technology, ad&d
    
Salesforce.com
By: Kaspersky     Published Date: Feb 06, 2017
As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.
Tags : 
ransomware, malware, encryption, cyberthreat
    
Kaspersky
By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
By: AdRoll     Published Date: Jul 11, 2017
Instagram has quickly become a key player in online advertising. With over half a billion mobile users and 200,000 active advertisers, the platform is expected to top $3.2 billion in revenue this year. This guide will help marketers unlock the power of Instagram as an advertising channel. For the experienced Instagram advertiser, we’ll offer some tips and best practices that will help take performance marketing to the next level. For marketers who are new to advertising on Instagram, we’ll break down how to get the most out of it.
Tags : 
instagram, advertising, marketing, advertising tips, social media
    
AdRoll
By: AdRoll     Published Date: Jul 11, 2017
Instagram has quickly become a key player in online advertising. With over half a billion mobile users and 500,000 active advertisers, the platform is expected to top $3.2 billion in revenue this year. This guide will help marketers unlock the power of Instagram as an advertising channel. For the experienced Instagram advertiser, we’ll offer some tips and best practices that will help take performance marketing to the next level. For marketers who are new to advertising on Instagram, we’ll break down how to get the most out of it.
Tags : 
instagram, advertising, marketing, social media, advertising tips
    
AdRoll
By: AdRoll     Published Date: Jul 11, 2017
Instagram has quickly become a key player in online advertising. With over half a billion mobile users and 500,000 active advertisers, the platform is expected to top $3.2 billion in revenue this year. This guide will help marketers unlock the power of Instagram as an advertising channel. For the experienced Instagram advertiser, we’ll offer some tips and best practices that will help take performance marketing to the next level. For marketers who are new to advertising on Instagram, we’ll break down how to get the most out of it.
Tags : 
instagram, advertising, marketing, social media, advertising tips
    
AdRoll
By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
    
AirDefense
By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software
By: Faronics     Published Date: Sep 10, 2008
IT Managers are tasked with making the desktop environment more secure and locked down to a uniform corporate standard, yet flexible enough to handle the myriad of exceptions that arise across the enterprise. Centralized Configuration Management (CCM) tools are great, especially in environments with branch offices. But CCM tools can’t do the big job of making your environment inherently more secure or more flexible.
Tags : 
security, configuration management, faronics, cmdb, desktop security, it management, ccm
    
Faronics
Start   Previous    1 2 3 4 5    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.