network

Results 1 - 25 of 4860Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
    
Here Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Learn about routing, switching, security, wireless and IP telephones
Tags : 
    
Cisco EMEA
Published By: Emarsys - APAC     Published Date: Jun 12, 2019
Omnichannel isn’t just another buzzword you can ignore. In fact, today’s most successful marketing strategies all take an omnichannel track that puts customers at the center of a diverse network of interactions and engagements. In this white paper, you’ll learn: • How email can serve as the foundation of your omnichannel strategy • How Artificial intelligence marketing (AIM) can make it possible to not only achieve true 1:1 personalization, but also scale it • How to apply a step-by-step roadmap to your brand’s pursuit of omnichannel excellence
Tags : 
    
Emarsys - APAC
Published By: Intel     Published Date: Apr 15, 2019
There’s never been a more urgent need for comprehensive security and surveillance solutions. GeoVision Inc. has built its business on helping meet this need, providing digital and networked video surveillance solutions to customers in 110 countries. To succeed in its highly competitive and fast-changing industry, GeoVision must always be on the lookout for ways to give its customers leading-edge performance. Find out how GeoVision is working closely with Intel to maximize the performance of the hardware using the tools in Intel® System Studio, a comprehensive development tool suite to optimize the computer vision and deep learning workloads.
Tags : 
    
Intel
Published By: Gigamon     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
Need powerful visibility and insights into network traffic while reducing risk, complexity and costs? Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats. Learn how to see, control and secure what matters -- download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 10, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon reduces false positives by 70%, decreases the cost of security personnel by 50%, eliminates redundant systems and tools and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can secure business, enable new ideas and facilitate growth. And, see why ESG believes the Gigamon Visibility Platform is a critical tool for success in today’s digital age.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Apr 11, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon increases NetFlow performance by 100%, reduces hardware and tooling costs by 50%, decreases network downtime by 30% and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can help business and enable new ideas and growth. See why ESG believes the Gigamon Visibility Platform is a critical tool for network success in today’s digital age.
Tags : 
    
Gigamon
Published By: Intel     Published Date: Mar 14, 2019
One of the challenges of introducing Network Functions Virtualization (NFV) is the complexity of implementation and integration at three points.
Tags : 
    
Intel
Published By: Here Technologies     Published Date: Mar 29, 2019
Today’s assets, including equipment, vehicles, and shipping containers, move via multiple transportation modes at varying speeds across a range of distances and geographies. The journeys of these assets are fraught with problems, including lost and stolen goods, delayed shipments, and damage from incorrect environmental conditions. HERE is looking to solve the problems of keeping track of things, both outdoors and indoors. IoT deployments rely on location tracking to function effectively. With the significant cost of delayed, lost and stolen goods – location tracking offers a huge market opportunity. ISG Research had an extensive briefing with to analyze the company’s ambitions to reach deeper into the IoT and Asset Tracking market. Download to learn more about active tracking of high value products and how to enhance your tracking solutions.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Every good story needs a villain — and the world of network security has plenty of them. We’ve got a fun new diversion for you for when you need a break from fighting the bad guys. Test your malware IQ (and your knowledge of fairy tales) by taking our quiz, Malware or Maleficent?
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Do you know DNS Security? Users are working off-hours, off network and off VPN. Are you up on all the ways DNS can be used to secure them? Test your knowledge.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
If you’re not protected, it can cost you in all kinds of ways. Find out how to protect your network and your valuable resources in this e-book.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptocurrency’s market volatility could make it much more lucrative than ransomware. Find out who they’re targeting and how to protect your network.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Learn how to defend your organization from illicit cryptomining with the Cisco security portfolio.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
To gain better insight into today’s work practices and risks, IDG Research Services surveyed IT security decision-makers (ITSDMs) as well as end users to gauge VPN usage. Download the white paper to learn several security capabilities identified by IDG that, if available, could prove extremely valuable in reducing the risk of off-network laptop usage.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Your CISO is faced with two dilemmas: Too much malware reaches you and perimeter security is often blind. Our solution is to use DNS as the first layer of always-on network security.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
As a secure internet gateway, Cisco Umbrella helps you tackle the challenges of mobility, SaaS, and branch transformation by offering a single platform that secures access to and use of the cloud, SaaS applications, branch offices, and endpoints. It's your first line of defense against threats -- anytime and anywhere your users access the internet, traffic goes through Umbrella first. To understand how a secure internet gateway provides 360-degree security for access to and use of the cloud, read the ebook.
Tags : 
    
Cisco Umbrella EMEA
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking, knowledge management, enterprise applications, business technology
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution, networking, knowledge management, enterprise applications, business technology
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication, networking, knowledge management, data management, business technology
    
Sangoma
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.