protect

Results 1 - 25 of 3252Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand.
Tags : 
    
Cisco EMEA
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Business leaders recognize that their industries and markets are either being disrupted or have the potential to be disrupted by nimble digital players. In order to compete, senior IT leaders need to modernize their data centers. In this Forbes Insights Executive Briefing, learn how to embrace an agile data infrastructure, modern data protection, and intelligent operations to reap the benefits of a truly modernized data center.
Tags : 
    
Hitachi Vantara
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Technology is a fast-moving target, and organizations need agility and flexibility to compete. By modernizing your data center and maximizing the value of your corporate data, your company can gain those qualities. In this Forbes Insights checklist, learn how to derive value from your corporate data and embrace three elements of a modernized data center: an agile data infrastructure, a modern approach to data protection, and intelligent data center operations.
Tags : 
    
Hitachi Vantara
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Finding the right data protection and recovery solution for complex enterprise infrastructures is a formidable challenge. Traditional backup and recovery solutions cannot keep up with or meet today’s business-critical requirements. Read this white paper to learn smarter approaches to data protection and recovery. See how to radically improve key performance metrics – including business continuity – as well as backup windows, operational recovery and disaster recovery.
Tags : 
    
Hitachi Vantara
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Data is one of the most valuable assets in your enterprise. Ensuring that your data is protected, should the worst possible scenario occur, is vital. However, no single data protection tool can offer complete peace of mind. Use the right tools for each job but manage them from one place. Read this white paper to see how Hitachi Vantara takes a unified approach to modern data protection and simplifies data protection.
Tags : 
    
Hitachi Vantara
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
With IT under increasing pressure to deliver on availability service levels and make a positive impact on the business, having a robust, efficient, and reliable modern data protection strategy is a must. Making the right IT investments can be instrumental in moving the needle, and leveraging the right tools and technology can make a substantial impact.
Tags : 
    
Hitachi Vantara
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Now is the time to take a smarter approach to data protection an recovery. Finding the right data protection and recovery solution for complex enterprise infrastructures is a formidable challenge. Traditional backup and recovery solutions cannot keep up with or meet today’s business-critical requirements. Read this white paper to learn how to radically improve key performance metrics – including business continuity – as well as backup windows, operational recovery and disaster recovery.
Tags : 
    
Hitachi Vantara
Published By: Sage People     Published Date: Jan 04, 2019
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPR’s focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handled—and it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and it’s vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world wh
Tags : 
    
Sage People
Published By: Dell EMC     Published Date: Feb 14, 2019
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article from Dell and Intel® to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 14, 2019
Disaster recovery and long term retention (LTR) of data can be challenging for mid-sized organizations. Keeping a secondary site up for disaster recovery can be expensive and dealing with tape for LTR can be slow and costly. IDPA DD4400 enables mid-size organizations to take advantage of clould efficiencies for data protection with cloud disaster recovery and long term retention. Download this summary from Dell and Intel® to learn more. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: Dell SB     Published Date: Jan 24, 2019
Whether we choose to or not , our businesses are undergoing a rapid digital transformation. To ride this technology wave successfully, we need a modern IT infrastructure. At the heart of this modern IT infrastructure is the server. Choosing the right server that fits both the current and future needs is critical. PowerEdge is introducing its new line of award winning servers that is custom - built for the modern IT infrastructure. Since b usiness face fierce competition and dynamic customer needs, the Scalable Business Architecture from PowerEdge enables an enterprise to scale efficiently and adapt quickly to address this dynamic business & workload needs. With Intelligent Automation in new PowerEdge , you can automate more routine tasks and free up skilled resources for business - critical tasks. Finally, w e all know how important security is for all operations. PowerEdge protects businesses and their customers with its sophisticated Integrated Security fea
Tags : 
    
Dell SB
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Telecom Italia (TIM) Headquarters: Milan, Italy Users: 600,000 Objective: As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider TIM sought an innovative solution to effectively and efficiently protect the network and data of its business users. Solution: Cisco Umbrella for Service Providers (SPs) Impact: • Rolled out TIM Safe Web to more than 600,000 customers, with less than 1 in 10,000 customers opting out of the service • Provided TIM with a unique competitive differentiator • Created an incremental revenue stream for TIM
Tags : 
    
Cisco Umbrella EMEA
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of Session Border Controllers on the market. Sangoma’s Vega Enterprise SBC VM/Hybrid provides full-featured protection and easy interconnection.
Tags : 
vega sbc, enterprise, vm hybrid, data sheet, easy to use, cost effective, sbc solution
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication
    
Sangoma
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analyst’s findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: • How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster • How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
    
CrowdStrike
Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix
    
Vision Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.