security applications

Results 326 - 350 of 403Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 07, 2016
This infographic shows the key points on the path to a secure mobile enterprise, and how holistic protection from IBM can help organizations move beyond device security and extend protection to sensitive content, applications and transactions.
Tags : 
ibm, security, mobile, enterprise, application, wireless
    
IBM
Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless phones
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, security, cloud applications, cloud, cloud-based threats, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: May 08, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : 
application security, software applications, cybersecurity
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: IBM     Published Date: Jun 09, 2010
Learn how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle with this free IBM white paper.
Tags : 
software delivery, data security, ibm, data protection, it security, web applications, application security, internet security
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
The Cisco Intelligent WAN (IWAN) solution provides design and implementation guidance for organizations looking to deploy wide area network (WAN) transport with a transport-independent design (TID), intelligent path control, application optimization, and secure encrypted communications between branch locations while reducing the operating cost of the WAN. IWAN takes full advantage of cost-effective transport services in order to increase bandwidth capacity without compromising performance, reliability, or security of collaboration or cloud-based applications.
Tags : 
cisco, wan, iwan, network transport, path control, cloud computing, infrastructure, network architecture, network management, network performance, network performance management, wireless application software, wireless hardware, wireless infrastructure, wlan
    
Cisco
Published By: CBeyond     Published Date: Jul 22, 2014
This guide was created to offer a preliminary understanding of Cloud computing, so that business owners and managers will be better positioned to make the move toward Cloud services sooner, rather than later.
Tags : 
cbeyond, cloud computing, cloud applications, cloud security, virtual applications, business software, business applications, small business networks, backup and recovery, web service security, enterprise software, it spending, server virtualization
    
CBeyond
Published By: NEC     Published Date: Nov 12, 2014
In this webinar an expert panel will examine the security and visibility needs of mesh SDN networks by examining the security challenges faced by businesses in distributed SDN environments. The webinar will also present real-world case studies of companies who excelling at providing a superior customer experience for their applications and their sites.
Tags : 
nec, software defined networking, sdn, lan, land area network, wifi, wireless network, network management, business network, network security, fibre channel, infrastructure, internetworking hardware, wide area networks, network attached storage, internet security, wlan, server virtualization, data center design and management
    
NEC
Published By: Microsoft Office 365     Published Date: Apr 05, 2016
Take a guided tour of the new Office 365. It’s a quick and easy way to test drive new enterprise capabilities, including advanced collaboration, analytics, and security features. Step through common enterprise scenarios to see how Office 365 can support your business needs See the latest in-product experience with the most up-to-date versions of the Office applications you use every day as well as the new advanced features Explore the top features and advanced capabilities available for email and calendar management, collaborative meetings, analytics, and security
Tags : 
    
Microsoft Office 365
Published By: Cisco     Published Date: Feb 16, 2016
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable.
Tags : 
data, business practices, data management, data security, software, applications, network management, network performance, security management, application integration, application performance management, best practices, productivity
    
Cisco
Published By: Microsoft Office 365     Published Date: Apr 14, 2016
Take a guided tour of the new Office 365. It’s a quick and easy way to test drive new enterprise capabilities, including advanced collaboration, analytics, and security features. Step through common enterprise scenarios to see how Office 365 can support your business needs See the latest in-product experience with the most up-to-date versions of the Office applications you use every day as well as the new advanced features Explore the top features and advanced capabilities available for email and calendar management, collaborative meetings, analytics, and security
Tags : 
    
Microsoft Office 365
Published By: IBM     Published Date: Jan 29, 2015
Mobility is no longer an IT trend: It is the new reality for how technology is deployed for business benefit. Research and consulting firm Forrester refers to this tidal wave of change as the “mobile mind shift” and emphasizes that it is more important than ever for enterprises to get it right the first time. But getting it right means more than just launching a customer app, implementing enterprise mobile policies, improving mobile device security or creating campus-wide hot spots. It means developing and continuously delivering mobile applications that truly make a difference for employees, business partners and customers. Increasingly, that means adopting new ways of thinking about how best to develop and manage mobile applications.
Tags : 
mobile mind shift, it trends, mobility policies, mobile device security, security, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.
Tags : 
ibm, saas, mission-critical, security, apps, growth, apm, cloud, monitoring, tco, middleware, database development, productivity, service management
    
IBM
Published By: Symantec     Published Date: Jan 10, 2013
Transport Layer Security, widely known as Secure Socket Layer or SSL is the most popular application of public key cryptography in the world. Sometimes, TLS can give illusion of security when it is not. This paper explains TLS and its best uses.
Tags : 
tls, ssl, transport layer security, secure socket layer, best practices, applications, symantec, networking, security, data management
    
Symantec
Published By: Sophos     Published Date: Jan 10, 2013
Evaluating the many components that make up an endpoint security solution may seem overwhelming. This buyers guide is designed to help. We’ve provided you with independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : 
sophos, security applications, web protection, spyware, secure data, antispam, network security, anti spam, anti virus, application security, intrusion detection, intrusion prevention, it spending, data protection
    
Sophos
Published By: Rapid7     Published Date: Mar 19, 2014
This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.
Tags : 
rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection, network security, firewalls, intrusion prevention, data protection, vulnerability management
    
Rapid7
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security, anti spam, anti spyware, anti virus, application security, identity management, internet security, policy based management, security management, security policies, web service security
    
McAfee
Published By: SAS     Published Date: Jun 10, 2016
Understanding security analytics can be a daunting job. It is more than just analyzing log files but it is less than a full-blown information security platform. In fact, according to Anton Chuvakin, research vice president for security and risk management at Gartner, it is not yet even a “market,” but rather still just a ”concept” that has yet to define best practices.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications, analytics, prevention, network management, business activity monitoring, business analytics, business management
    
SAS
Published By: Citrix     Published Date: Jul 17, 2014
This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : 
citrix, xenapp, mobile workers, mobile workforce, desktop management, virtual desktop, virtualization, roi, storage virtualization, smart phones, return on investment, server virtualization
    
Citrix
Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security, visibility, management, support, migration, services, applications, improve, proactive, protection, data management
    
Cisco
Published By: Nativeflow     Published Date: Jun 06, 2014
Download the solution brief to learn more about protecting your organization’s enterprise data.
Tags : 
nativeflow, healthcare, enterprise app, physicians, mobile app, doctors, healthcare solutions, data encryption, data security, user experience, enterprise mobile applications
    
Nativeflow
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.