security

Results 6426 - 6450 of 6519Sort Results By: Published Date | Title | Company Name
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : account security, data management, network protection, secure systems, application security, network performance, network diagnostics
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 22, 2017
Hybrid cloud is your IT platform of the present. Juniper Unite Cloud helps you win the race to the hybrid cloud because it offers the flexibility of hybrid cloud and hybrid operations models while effectively confronting and addressing the overabundance of variables in hybrid IT technologies. Juniper’s product portfolio offers the ultimate flexibility, so that you can seamlessly integrate cloud stacks and unify policy in and across today’s and tomorrow’s private and public clouds. Contact your Juniper Networks representative to learn more about this hybrid cloud solution.
Tags : cloud computing, cloud mobility, cloud security, esignature, digital signature, transaction security, financal security
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 29, 2017
The ongoing success of 7ticks depends on having an IT infrastructure that adapts and scales to unforgiving reliability, performance, and transparency requirements. To support the torrid growth of data, 7ticks needed to expand the IP/MPLS network connecting its data centers to 40 Gbps—and have an immediate path to 100 Gbps and beyond. Within its data centers, 7ticks needed network and security solutions that would keep pace—and would simplify service management and support automation. “Our biggest challenge is performance at scale,” says Scott Caudell, founder of the 7ticks business and vice president of IT infrastructure at Interactive Data. “IT is our business. The 7ticks infrastructure helps customers get a lower time to market and faster execution speeds at a cost that’s sustainable for their businesses.”
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx, vsrx
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
Intelligent Security Everywhere Simple Centralized Management Lower TCO Investment Protection Programmability
Tags : security, management, lower tco, investment, protection, programmability
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : security, switching, routing, operating system, secure network, sdsn, solutions
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
A Scalable Data Center Network for the Data Tsunami Digital Transformation and other changes drive vast and innumerable new data flows through the business, and increase pressure on IT to continually, quickly, and efficiently address a broad array of new demands. IT needs a network that empowers the business but is too often hampered by it instead. Network management as most practice it now is too complex and inefficient. The solution is automation.
Tags : digital transformation, virtual infrastructure, network, data, automation, security, nemertes
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
     Juniper APAC DWA Cloud Leads July 2017
By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
     Q2 eBanking
By: Google     Published Date: Aug 09, 2017
This document gives an overview of how security is designed into Google’s technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google.
Tags : cloud, cloud computing, security, infrastructure
     Google
By: Google     Published Date: Aug 09, 2017
This document gives an overview of how security is designed into Google’s technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google.
Tags : cloud, cloud computing, security. infrastructure
     Google
By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
     CA Technologies EMEA
By: Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : economic, cylance, roi, enterprises
     Cylance
By: Oracle Security Solutions     Published Date: Oct 16, 2017
Leveraging cloud technology enables your enterprise to be more agile and competitive while significantly reducing costs. However, there are risks associated with these benefits. Getting new capabilities quickly is worth far less if it means exposing vulnerabilities that result in regulatory compliance violations and fees, loss of intellectual property (IP), loss of customer data, or damage to your reputation, brand, and future business.
Tags : 
     Oracle Security Solutions
By: Oracle Security Solutions     Published Date: Oct 16, 2017
Enterprises often treat information security technology as an insurance policy against the potentially devastating costs of not deploying it. From that perspective, your security technology’s ROI is determined by the time it takes for a breach—one with costs equal to or greater than your investment—to occur. Your ROI could be immediate. Or it could be longer term. With that in mind, it is hard to justify yet another security technology, but a move to the cloud suggests that you should.
Tags : 
     Oracle Security Solutions
By: Oracle Security Solutions     Published Date: Oct 16, 2017
Cloud adoption promises the benefit of increased flexibility and significant cost savings. Hence, migrating business-critical applications to the cloud is becoming a growing priority for companies of all sizes. A recent survey of more than 250,000 information security professionals revealed that more than 77 percent of organizations have already adopted cloud services and 10 percent of those companies using cloud services describe themselves as heavy users.
Tags : 
     Oracle Security Solutions
By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
     Gigamon
By: Insight     Published Date: Nov 16, 2017
With the mobile worker population on track to exceed 105 million by 2020, organizations in all industries are in a critical race to accommodate a new breed of worker. Comprised of millennials and Gen Xers alike, this new workforce expects seamless work experiences from device to desktop to laptop, anywhere, anytime. They demand to be fully equipped with the apps they need to do their best work — all without a hitch in the back-end systems and security that power and support them.
Tags : digital workforce, mobile worker, insight's connected workforce, intune, modern devices, end-user experiences
     Insight
By: Dell and VMWare     Published Date: Oct 26, 2017
Dell EMC PowerEdge servers with Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
     Dell and VMWare
By: Dell and VMWare     Published Date: Oct 26, 2017
Optimizing IT infrastructures with regularly refreshed, best-in-class servers enables organizations to increase agility, improve efficiency, and reduce operational expenses. Dell EMC PowerEdge portfolio with Platinum processors delivers greater automation, scalability and security to ensure IT infrastructures run their best. Learn more about our newest generation of PowerEdge servers. Flexible financing options available through Dell Financial Services.
Tags : 
     Dell and VMWare
Start   Previous    247 248 249 250 251 252 253 254 255 256 257 258 259 260 261    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com