it security

Results 76 - 100 of 5636Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: May 24, 2019
Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smart. Here are 5 tips to keep in mind when choosing a Next Generation Firewall for your business.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 27, 2019
A solution that grows with your business will enable you to be free to make decisions without the worry of security setbacks. Get Cisco Threat Defense Solution for your business and reach your full potential.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : 
service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks
    
Cisco
Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services
    
Cisco
Published By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
security, cyber threat, cisco
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Mar 22, 2019
Cisco ACI, the industry-leading software-defined networking solution, facilitates application agility and data center automation. With ACI Anywhere, enable scalable multicloud networks with a consistent policy model, and gain the flexibility to move applications seamlessly to any location or any cloud while maintaining security and high availability.
Tags : 
    
Cisco
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: HP AppPulse Mobile     Published Date: Oct 12, 2015
Improve website monitoring, performance, capacity and security.
Tags : 
online, capacity, security, website monitoring, performance
    
HP AppPulse Mobile
Published By: QTS     Published Date: Nov 04, 2016
Watch this video to hear from American Hacker, Jeff Moss, about the security threats faced by companies today!
Tags : 
information security, security threats, data security
    
QTS
Published By: QTS     Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
Tags : 
healthcare, cyber security, data security
    
QTS
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
This book helps you understand both sides of the hybrid IT equation and how HPE can help your organization transform its IT operations and save time and money in the process. I delve into the worlds of security, economics, and operations to show you new ways to support your business workloads.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
    
Cisco
Published By: Lenovo UK     Published Date: Sep 10, 2019
Wissen Sie, wo Sie am meisten gefährdet sind? Im Wettrennen mit Ihren Mitbewerbern um die digitale Transformation Ihres Unternehmens treten neue Bedrohungen auf. Mit ThinkShield von Lenovo erhalten Sie eine anpassbare, umfassende Lösung, die Ihr Unternehmen rundum schützt. Eine Datensicherheitsverletzung kostet durchschnittlich über 4 Millionen USD. Erfahren Sie, wie sich Investitionen in die Sicherheit auf das Unternehmenswachstum auswirken. Infografik herunterladen > 2 Kaspersky: “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Hinweis: in der Quelleninformation im Leitfaden fehlt das s in Kaspersky]
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. When it takes 23 days on average to recover from a ransomware attack1, find out why I.T. security is the most important thing, period. Download our solutions guide > 1 IBM: 2017 Global CODB Report Final (
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. As the average cost of a data breach is over $4 million, discover how investing in security impacts business growth. Download infographic >
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. With 48% of breaches caused by human error2, find out how you can protect your business against employee mistakes. Download our infoguide > 2 Kaspersky: “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Note: s is missing from Kaspersky on source information on infoguide]
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Savez-vous où vous courez le plus de risque ? Dans la course à la compétitivité et à la transformation digitale, les entreprises font face à de nouvelles menaces. Avec ThinkShield de Lenovo, vous bénéficiez d’une solution de sécurité complète et personnalisable qui vous protège de bout en bout. Dans un contexte où 48 % des compromissions sont dues à des erreurs humaines2, découvrez comment protéger votre entreprise contre les menaces internes. Téléchargez notre infoguide > 2 Kaspersky : “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Remarque : il manque un "s" à "Kaspersky" dans les références de l’infoguide]
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Sai identificare le tue aree più a rischio? Competere sul mercato e attuare la trasformazione digitale dell'azienda comporta la gestione di nuove minacce. Con ThinkShield di Lenovo hai una soluzione completa e realmente personalizzabile che protegge il tuo business a 360°. Considerando che il 48% delle violazioni è causato da errori umani2, come proteggere il tuo business dagli errori dei dipendenti? Scarica la guida informativa > 2 Kaspersky: "Small Business IT Security Practical Guide" https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Nota: nella guida informativa manca una s in Kaspersky nelle informazioni sulle fonti]
Tags : 
    
Lenovo UK
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.