point point

Results 76 - 100 of 426Sort Results By: Published Date | Title | Company Name
By: Metalogix     Published Date: Aug 22, 2016
Read this eBook to learn the best practices for SharePoint Server 2016 migration
Tags : 
sharepoint, sharepoint server, migrating, best practices
    
Metalogix
By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
By: Carbon Black     Published Date: Aug 21, 2018
Are you looking for a “sophisticated threat hunting product”? Find out why Forrester says this about our product and named us a leader in Endpoint Detection and Response. Download the complete Forrester Wave on Endpoint Detection and Response to see how Carbon Black is scored among its peers. The Forrester Wave evaluates solutions for: • - The strength of their current offering • - Their strategy and vision for the future • - Their market presence
Tags : 
    
Carbon Black
By: Carbon Black     Published Date: Nov 26, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
By: Cisco DWA Security     Published Date: Sep 14, 2018
Cisco Advanced Malware Protection (AMP) offers an integrated, comprehensive approach to endpoint security. Continuous analysis and telemetry features keep its finger on the pulse of network anomalies, and all suspicious activity is investigated. Contextual reporting highlights trends for administers, helping them reassess network architecture to close vulnerable points of entry. Also important is its flexible deployment, which makes it simple for any organization to tailor its endpoint security.
Tags : 
    
Cisco DWA Security
By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection
    
Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection
    
Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management
    
Illusive Networks
By: Here Technologies     Published Date: Mar 29, 2019
Rich, real-time location intelligence enables third-party logistics (3PL) companies to deliver pinpoint accuracy and offer superior service, which ultimately means higher volumes, better timelines and more competitive budgets. This ebook looks at seven specific ways in which location data is being used by 3PL companies to enable more accurate fleet routing, precise tracking of vehicles and the ability to meet increasingly demanding customer expectations. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes), HERE can help 3PL companies develop key competitive advantages.
Tags : 
here technologies, transport and logistics
    
Here Technologies
By: Sophos     Published Date: Mar 30, 2017
Threats are becoming increasingly dynamic, forcing organizations to defend against both traditional malware and new advanced attacks. As a result, more and more organizations are making the switch to next-gen endpoint protection from Sophos to get the proven, innovative defense they need. Read this solution brief to learn how Sophos Next-Gen Endpoint Protection delivers the protection, usability and support required to stay ahead of the constantly evolving threat landscape.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Sophos
By: IBM     Published Date: Aug 08, 2016
In this solution brief, you'll learn how IBM Integration Bus enables you to: - Eliminate the need for point-to-point connectivity - Connect across an array of packaged applications and web services - Route and transform data in virtually any format so you can read, interpret and convert multiple data formats - Expose and extend back-end systems to mobile devices
Tags : 
ibm, middleware, api economy, ibm integration bus, business agility
    
IBM
By: IBM     Published Date: Nov 17, 2016
In this solution brief, you'll learn how IBM Integration Bus enables you to: - Eliminate the need for point-to-point connectivity - Connect across an array of packaged applications and web services - Route and transform data in virtually any format so you can read, interpret and convert multiple data formats - Expose and extend back-end systems to mobile devices
Tags : 
ibm, middleware, api economy, ibm integration bus, business agility
    
IBM
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
DigitalPersona UK
By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
By: Brainshark     Published Date: Mar 22, 2013
With unprecedented adoption among businesses and consumers, the iPad is quickly becoming the preferred device for mobile sales professionals. Find out how enterprise adoption of iPads gives organizations an advantage when in sales and marketing.
Tags : 
ipads, enterprise, powerpoint, sales, marketing, iphone, apple, smartphone
    
Brainshark
By: Brainshark     Published Date: May 07, 2013
Do your field reps use iPads or iPhones? If so, enable them to present with PowerPoint the way it was meant to be seen -- with fonts, colors and animations intact. Plus, empower you content team to instantly edit and update all versions of a particular presentation, all with the click of a mouse. Ideal for reducing risk and maintaining compliance! Users in more than 140 countries use SlideShark to deliver consistent, secure PowerPoint presentations on iPads and iPhones. Find out how SlideShark can empower you to distribute, control and track field PowerPoints. Click here to watch a quick 2-minute video and see SlideShark in action.
Tags : 
powerpoint, sales, mobile, ipad, iphone, slideshark, compliance, presentation
    
Brainshark
By: Brainshark     Published Date: Jun 03, 2013
View this 2 minute video to learn why millions use SlideShark to show flawless PowerPoints on the iPad...instantly track what reps presented which PowerPoints and to whom. Update every copy of a field sales presentation with a single of a mouse...Control, manage and track individual rep usage of master presentations.
Tags : 
powerpoint, sales, mobile, ipad, iphone, slideshark, compliance, presentation
    
Brainshark
By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
By: MobileIron     Published Date: May 07, 2018
Office 365, Microsoft’s cloud-based productivity suite, includes online versions of Microsoft’s most popular solutions, like Exchange and SharePoint, storage through OneDrive, and several mobile apps, including Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Skype for Business. Office 365 is central to Microsoft’s strategy as the company evolves into a mobile-first, cloud-first software and solutions provider. Many MobileIron customers are increasingly using Office 365 on mobile devices instead of on traditional PCs. Therefore the ability to secure and deploy Office 365 on mobile devices using MobileIron is a common requirement.
Tags : 
security, office, 365, mobileiron, microsoft, cloud, onedrive, business
    
MobileIron
By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
By: K2     Published Date: Aug 24, 2015
This white paper follows the story of Kim, head of the IT department for a large financial-services company, as she navigates the transition from Microsoft SharePoint 2010 to SharePoint 2013. Kim can’t wait to use the latest SharePoint technology, but she also knows she’ll need a third-party solution to expand the capabilities of SharePoint. She needs a solution that helps increase mobility, flexibility and collaboration between departments within her company.
Tags : 
    
K2
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.