secure

Results 76 - 100 of 2263Sort Results By: Published Date | Title | Company Name
By: Workplace by Facebook     Published Date: Jun 17, 2019
Workplace connects everyone in an organization using familiar Facebook features like video calling, instant messaging, posts and groups. It works with other tools you already love, providing a simple and secure way for people to share knowledge, work together and build connected communities.
Tags : 
     Workplace by Facebook
By: Cisco     Published Date: Jul 30, 2015
Transformation by securely extending the network.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 30, 2015
Know if your data is secure.
Tags : 
     Cisco
By: Cisco     Published Date: Sep 15, 2015
Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : ucs, unified computing system, infrastructure, enterprise, it barriers
     Cisco
By: Avaya     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Tags : new technology, best practices, competitive advantage, smart campus
     Avaya
By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, security
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Unsanctioned file sharing creates serious security and regulatory compliance issues. Read this infographic to learn how to sync, share and control data securely!
Tags : commvault, data security, protecting corporate data, commvault file sharing, virtual host costs, virtualization, security
     Commvault
By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Mobility, social media, analytics and the cloud are revolutionizing how data is accessed, used, and secured for small to midsize businesses. With data security threats are on the rise, keep your business running with Hewlett Packard Enterprise.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
     Hewlett Packard Enterprise
By: Samsung     Published Date: Dec 18, 2015
This paper will examine seven steps for developing a current, secure, and well-managed mobile app portfolio.
Tags : 
     Samsung
By: Dell Security     Published Date: Mar 29, 2016
With Dell™ One Identity Privileged Password Manager and Privileged Session Manager from Dell Software, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : risk management, privileged accounts, priviliged passwords, civilian agencies, dell, dell privileged session manager, dell security
     Dell Security
By: Relevance     Published Date: Mar 03, 2016
This manifesto seeks to define content promotion as an industry and to give marketers and communications professionals of all stripes the mindset, framework, and tools they need to secure support, resources, and buy-in to amplify their current content marketing activities.
Tags : relevance, marketing, content, content promotion, content marketing
     Relevance
By: Dell Security     Published Date: Mar 29, 2016
With Dell One Identity Privileged Password Manager and Privileged Session Manager, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : risk management, dell, dell privileged session manager, privileged passwords, two-factor authentication
     Dell Security
By: Cisco     Published Date: Feb 23, 2016
Cisco® Unified Access establishes a framework that securely, reliably, and seamlessly connects anyone, anywhere, anytime, using any device to any resource. This framework empowers all employees with advanced services, taking advantage of an intelligent, enterprise-wide network to increase revenue, productivity, and customer satisfaction while reducing operational inefficiencies across the business. Cisco Unified Access includes services-rich network edge systems and combines a core network infrastructure embedded with integration of productivity-enhancing advanced technologies, including IP communications, mobility, security, video, and collaboration services.
Tags : framework, network infrastructure, communications, optimization
     Cisco
By: Cisco     Published Date: Jun 21, 2016
Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment effectiveness (OEE), reduced downtime, and manufacturing flexibility can be achieved with a factory that is digitized and connected. By providing visibility to machines and processes, manufacturers can anticipate issues that create unplanned downtime. By putting in place a secure, converged and wireless-ready network, manufacturers can have a platform that enables the agility to quickly start up new machines, cells, and lines, and rapidly deliver new products.
Tags : 
     Cisco
By: Cisco     Published Date: Jun 21, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
     Cisco
By: Equinix     Published Date: May 28, 2015
This paper illustrates different perspectives on building a secure and flexible data center platform that sustains growth and innovation and delivers a serious competitive advantage.
Tags : data center, strategic business advantage, hybrid, technology, it demands, data center platform, equinix, equinix solutions, data
     Equinix
By: Lenovo and Intel     Published Date: Jan 20, 2017
It’s no secret that video is the new paradigm in law enforcement; but, with video comes the need to log, manage, store, and secure thousands of hours of content—and that makes huge demands on your data center infrastructure. In this white paper, we detail infrastructure challenges faced by state and local agencies and how they are overcoming them with powerful infrastructure solutions. Download the white paper and read more.
Tags : lenovo, it challenges, body camera, data center
     Lenovo and Intel
By: Aria Systems     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget >
Tags : 
     Aria Systems
By: Cisco     Published Date: Dec 23, 2014
Download the Cisco Mobility Solution Overview to get information on providing highly secure mobile access anytime, anywhere, building a unified platform for mobile applications, and improving relationships with customers and employees through new mobile experiences.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: Cisco     Published Date: Jan 05, 2015
The United States educational system is in the midst of transformational change due to widespread adoption of technologies, including video, mobile devices, and cloud services. Given the enormous potential of these technologies to improve educational outcomes, increase access to information and collaboration, and reduce costs, schools and libraries across the nation want to do more, not less, with technology.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: Cisco     Published Date: Jan 05, 2015
The need for high-throughput wireless access was especially acute at Ligonier Valley High School, where hundreds of students, especially those in math and science classrooms located in one wing of the building, vied for simultaneous wireless connectivity to applications such as Larson Math and Science and the ALEKS one-on-one instructional system. Whether in the math and science wing or other areas of the school, bandwidth-intensive streaming video, multicast within classrooms, is common.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: Cisco     Published Date: Jan 05, 2015
As education evolves, so does the way we teach and learn. This report focuses on one of the newest trends, still in its nascent stages—mobile learning. It describes the potential benefits of mobile learning, addresses the challenges and opportunities that introducing mobile learning presents, and provides examples from school districts that have already implemented mobile learning programs so we can learn from their best practices. The report also suggests key points to consider as you develop your plans, align your goals, and make decisions regarding mobile learning in your schools.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com