HIT Consultant Insightful coverage of healthcare innovation
 

user security

Results 251 - 275 of 504Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Are you trying to secure cloud applications, while reducing user friction? With the right technology, IT/Security professionals can empower employees to work securely and efficiently anywhere, anytime. Office 365 is the world’s most used enterprise cloud application, but it’s just one of many applications and services a company might need to authenticate. This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications. Learn how to achieve high assurance with a solution that is invisible to your users when you download the white paper, Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
LogRhythm
Published By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : 
idm, identity management, user monitoring, identityview, enterpriseview, logs, siem, event logs
    
ArcSight
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Hundreds of organizations around the world use Microsoft® SharePoint® with  over 80 million implementations, allowing them to develop intelligent portals that seamlessly connect users, teams, and knowledge. With the release of Microsoft Offi ce SharePoint Server 2007, F5 has specifi cally developed and tested a comprehensive Application Ready infrastructure that enhances the security, availability and performance of SharePoint deployments, whether it’s over the LAN or across a global WAN.
Tags : 
application ready network guide, microsoft office sharepoint 2007, sharepoint deployments. wan, tcp, roi, sharepoint, portal, microsoft
    
F5 Networks Inc
Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
    
Symantec.cloud
Published By: Aberdeen Group     Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
Tags : 
aberdeen, ev ssl server certificate, extended validation, key management solution, encryption, security investment, scg, ssl
    
Aberdeen Group
Published By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2015
App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2016
Simple, secure ways to deliver a great experience for remote users. As mobile workstyles transform the way people and businesses work, remote access is becoming more important than ever. In enabling people to work anywhere, on any device, you need to meet IT’s requirements for security and manageability—but it’s just as important to consider user experience. Citrix, a leader in mobile workstyles, has long recognized that remote access has to address the needs of users as well as IT. With an entire team dedicated to user experience, Citrix has developed secure-by-design remote access solutions that make it simple for people to work the way they choose, anywhere and on any device, to deliver optimal productivity and business impact for their organizations
Tags : 
network management, network secuirty, network optimization, information technology, best practices
    
Citrix Systems
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: McAfee     Published Date: Jul 30, 2013
Today's faster, newer and greatly improved malicious user requires a faster, newer and greatly improved response. Smarter attackers require more intelligent countermeasures, including faster and more reliable analysis, to react to security issues.
Tags : 
security, protection, attacks, mcafee, streamline, technology, speed
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Published By: VMware, Inc     Published Date: Dec 05, 2013
Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware® Horizon View™ (formerly VMware View), IT professionals can implement a VDI infrastructure to help drive down operational costs, enhance security, and support a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, virtual desktops, vdi, datacenter
    
VMware, Inc
Published By: Cisco     Published Date: May 14, 2015
Depuis la naissance de l'informatique, la technologie a connu d'importantes évolutions. Dans les années 60, le modèle de calcul dominant reposait sur des unités centrales, lesquelles ont été remplacées une décennie plus tard par les mini-ordinateurs.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco has acknowledged the need to address our customers’ array of employee and consumer mobility requirements with a full set of mobility solutions.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
To leapfrog the competition, businesses must act immediately to capitalize on mobility.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Cisco
Published By: QTS Data Centers     Published Date: Mar 31, 2015
One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders
    
QTS Data Centers
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.