> Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 1256Sort Results By: Published Date | Title | Company Name
By: Soonr     Published Date: Jul 31, 2014
Level 10 Construction is a full-service general contractor with an unwavering dedication to integrity and a commitment to innovation and cost-effective building processes. The Level 10 leadership has built more than 20 million square feet of construction projects and has been at the forefront of constructing in every major market in the San Francisco Bay Area – commercial, technology, education and healthcare. Download to learn more.
Tags : soonr, mobile, workers, employees, mobility
     Soonr
By: Kaspersky Lab     Published Date: Jul 31, 2014
Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe. Download the whitepaper now to learn what you need to create a resilient infrastructure to guard against targeted attacks.
Tags : kaspersky, security, cyber attacks, cybersecurity, targeted attacks
     Kaspersky Lab
By: Soonr     Published Date: Jul 30, 2014
Soonr takes a holistic approach towards security, incorporating a variety of structures and mechanisms at various layers within the Soonr service architecture. The following descriptions convey the breadth and depth of security considerations that have become a cornerstone of the Soonr Workplace service.
Tags : soonr, security architecture guide, security, workplace service, it management
     Soonr
By: Soonr     Published Date: Jul 30, 2014
Today’s worker is more mobile than ever. As a result, practices for file sharing and document collaboration have changed dramatically over the past year. This study examines how mobility affects today’s workplace including the devices used to access business files, how files are being accessed, and from where.
Tags : soonr, mobile, workers, employees, mobility
     Soonr
By: Soonr     Published Date: Jul 30, 2014
For more than 12 months, ESG has engaged with vendors of business-oriented online file sharing and collaboration (OFS) solutions to understand their offerings, intellectual property, and business models. Based on the many questions we've received from IT professionals, vendors, and end-users, earlier this year, ESG decided to undertake a hands-on test drive of these products to uncover strengths, areas for improvement; and distinctive capabilities. The overall goal of the ESG OFS Test Drive program was to obtain a real-world point of view on the established and emerged business-oriented OFS solutions from the perspective of IT administrators and end-users alike.
Tags : soonr, esg, cloud storage, online file sharing, ofs
     Soonr
By: Soonr     Published Date: Jul 30, 2014
The need for a well-rounded secure file sharing and collaboration service that is embraced by users and endorsed by IT is crucial now more than ever. Soonr Workplace™ is purpose-built for the business and users.
Tags : soonr, dropbox, file sharing, collaboration model, sync
     Soonr
By: Kaspersky     Published Date: Jul 29, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage.
Tags : protect, advanced threats, cyberattacks, sensitive information, financial profit
     Kaspersky
By: Global Knowledge     Published Date: Jul 29, 2014
This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.
Tags : global knowledge, ibm, tivoli, monitor, infrastructure
     Global Knowledge
By: Global Knowledge     Published Date: Jul 29, 2014
There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process, requirements, and options for upgrading to vSphere 5.5.
Tags : global knowledge, vcenter, server, esxi, host
     Global Knowledge
By: Global Knowledge     Published Date: Jul 29, 2014
Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We will review these concerns and discuss how the industry dealt with them, and then explore how these same concerns can be mitigated with a proper cloud strategy.
Tags : global knowledge, iaas, public clouds, cloud, security
     Global Knowledge
By: Barracuda     Published Date: Jul 25, 2014
This research paper by Info-Tech evaluates 10 competitors in the NGFW market to help you choose the right vendor and products for your enterprise needs.
Tags : ngfw, next generation firewall, evaluation of security providers, security vendor comparison, security
     Barracuda
By: Entrust     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : enterprise authentication, securing identities, evolving environment, attacks, mobile platforms
     Entrust
By: Entrust     Published Date: Jul 21, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security.
Tags : identity guard, cloud services, trust foundation, communication, transactions
     Entrust
By: Entrust     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : identity guard, enterprise, securing identities, corporate network, mobile platforms
     Entrust
By: Entrust     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : identity guard, cloud service, smart credentials, authentication, multipurpose
     Entrust
By: Entrust     Published Date: Jul 21, 2014
As various types of digital certificates are introduced to an organization, they become more difficult to track and manage — particularly if they’re issued from different certification authorities.
Tags : identity guard, cloud service, certificate discovery, management solution, security
     Entrust
By: Entrust     Published Date: Jul 21, 2014
The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency.
Tags : identity guard, cloud services, secure, mobile devices, business efficiency
     Entrust
By: Entrust     Published Date: Jul 21, 2014
Entrust IdentityGuard Cloud Services PKI establishes and manages certificate-based security across an organization through a reliable, customizable and flexible hosted public key infrastructure (PKI).
Tags : identity guard, cloud services, pki, secure, mobile identities
     Entrust
By: Entrust     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : device certificates, identity, authentication, mobile world, information technology
     Entrust
By: Entrust     Published Date: Jul 21, 2014
To help protect access to this sensitive information, a strict set of security controls is defined in the FBI’s CJIS Security Policy and must be adhered to by organizations that access CJIS information.
Tags : authentication, cjis, compliance, sensitive information, security
     Entrust
By: Entrust     Published Date: Jul 21, 2014
This white paper explores those guidelines and looks into which specific critical infrastructure solutions are required to avoid non-compliance.
Tags : solution, infrastructure protection, avoid non-compliance, cyberattack, security
     Entrust
By: Entrust     Published Date: Jul 21, 2014
As an expert in multifactor and identity authentication, Entrust provides capabilities to healthcare organizations that far surpass the regulations.
Tags : authentication, healthcare, medicine, identity, security
     Entrust
By: Entrust     Published Date: Jul 21, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly.
Tags : identity guard, cloud service, ssl, management, digital certification
     Entrust
By: Entrust     Published Date: Jul 21, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions.
Tags : ssl, digital certifications, discovery, management, solutions
     Entrust
By: Entrust     Published Date: Jul 21, 2014
Within the enterprise realm, two-factor authentication has become more than just an option — it’s now an indispensable asset.
Tags : mapping, two-factor authentication, indispensable asset, cybersphere, identities
     Entrust
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search