api security

Results 176 - 200 of 267Sort Results By: Published Date | Title | Company Name
By: Palo Alto Networks     Published Date: Sep 30, 2016
The rapid adoption of SaaS-based applications in organizations today continues at a breakneck pace. These applications provide critical functionality and enable greater productivity, but at the same time introduce potential new security and data theft risks if not properly controlled.
Tags : palo alto, saas, security, shadow it, applications
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Sep 30, 2016
Even with more advanced features and supposed higher throughput than ever before, firewalls are not able to keep up with modern demands or advanced threats. Users are more distributed than ever, and so is data. Threats are changing rapidly, and traditional defense mechanisms that rely on layered security do not work.
Tags : palo alto, enterprise network firewall, custom applications, traffic classification
     Palo Alto Networks
By: LogRhythm     Published Date: Sep 19, 2016
In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™ (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats.
Tags : cyber security, security intelligence, best practices, technology, security
     LogRhythm
By: MuleSoft     Published Date: Sep 14, 2016
This is a webinar about API security fails and how to fix them.
Tags : api, security fails, vulnerable, digital era, hacks, enterprise applications
     MuleSoft
By: Microsoft Office 365     Published Date: Sep 08, 2016
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on premise solutions.
Tags : 
     Microsoft Office 365
By: Oracle HCM Cloud     Published Date: Aug 02, 2016
Are you letting old school cloud thinking hold your institution back from capitalizing on modern cloud solutions? From security concerns to blending Human Capital Management Cloud with on-premise systems, get the realities behind the myths.
Tags : higher ed, security, higher ed cloud solutions
     Oracle HCM Cloud
By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: VMware     Published Date: Jul 01, 2016
Higher education is in the midst of fundamental changes that are reshaping the future of both the mission and the business. As technology helps campuses better reach beyond their traditional physical borders, decision-makers expect IT to offer the solutions and leadership needed to deliver better services to students, staff, and researchers while simplifying IT costs and responsibilities. This solution brief addresses how vCloud Air built on the popular vSphere virtualization platform, is helping higher education IT respond to today’s performance, manageability, and security challenges.
Tags : vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension
     VMware
By: VMware AirWatch     Published Date: May 18, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak.
Tags : data management, business practices, data center. data application, enterprise applications, security
     VMware AirWatch
By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : endpoint backups, data visability, code 42, data loss, data recovery
     Code42
By: MuleSoft     Published Date: Apr 13, 2016
New Enterprise challenge has emerged. With the number of APIs growing rapidly, managing them one-off or via Excel or corporate wiki is no longer feasible. The smartest organizations have discovered a set of best practices to design powerful APIs that leverage existing services, to effectively manage those APIs throughout their lifecycle and to scale their deployment across consumers and devices. This eBook examines the relationship between APIs and services and presents the key elements of a successful API strategy in the form of 7 habits. In this eBook you will learn: - How to leverage existing services in the API economy - Where to get started with your API strategy - Key criteria for selecting an API Management solution - Strategies to overcome API security and identity challenges - How and why to apply the fundamentals of API First Design
Tags : service management, enterprise applications, best practices, business management, business strategy
     MuleSoft
By: IBM     Published Date: Apr 04, 2016
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : ibm, security intelligence services, ibm security intelligence solution, cloud, security, enterprise applications
     IBM
By: SAP     Published Date: Mar 22, 2016
In the new digital economy, competition, consumer engagement, and operational effectiveness are fundamentally changing, and accelerating. New competitors are redefining the landscape at unprecedented rates. Building and keeping trust mean delivering exceptional brand experiences, every time, via agile processes that balance consumer needs with cost to serve. One size does not fit all. Engaging consumers and capitalizing on new opportunities depend on the capacity to identify, act on, and deliver high-value experiences and outcomes like joy, confidence, security, and control, all in the span of a moment, exactly where and when a consumer or business need arises. Miss the moment, miss the opportunity.
Tags : digital economy, value creation, sap, consumer engagement
     SAP
By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector, it management, enterprise applications
     BitSight Technologies
By: Onbase     Published Date: Feb 18, 2016
Today’s increasingly competitive global economy requires businesses to make decisions faster than ever. Businesses need instant insight into the status of their people and processes. But manual, paper-based processes undermine decision-making. Paper makes it difficult for businesses to make smart decisions about their operations and their working capital. Manual processes also are costly and inefficient, create headaches for front-line staff, introduce compliance and security risks, and stymie collaboration with trading partners.
Tags : finance, decision-making, accounts payable, business practices, finance management
     Onbase
By: MuleSoft     Published Date: Jan 25, 2016
APIs are a strategic business necessity, but with the rising cost of API security breaches, it's important to develop a security strategy alongside an API strategy. This whitepaper will lay out the top security concerns around APIs, how the IT industry is addressing them, and how Anypoint Platform, MuleSoft's enterprise application integration platform, can keep your APIs safe and secure.
Tags : security, business metrics, best practices, business intelligence, enterprise applications
     MuleSoft
By: Rackspace     Published Date: Jan 19, 2016
Industry analysts expect rapid growth in the private cloud market over the next five years as CIO’s use private clouds to transform their IT environment. This growth expectation is not surprising as private clouds provide businesses with many features of a public cloud along with the security, control, and performance of a dedicated environment. While private clouds provide many advantages, they are also exceedingly complex and are difficult to manage. They must be implemented and managed by experts who understand cloud architecture and know how to upgrade, patch, monitor, and scale a cloud environment.
Tags : rackspace, private cloud, openstack, information technology, software development, data center
     Rackspace
By: Evident.io     Published Date: Nov 19, 2015
Evident.io has a significant head start in this nascent corner of the cloud security space. Besides addressing a critical portion of the cloud's attack surface that isn't well covered by other vendors yet, Evident.io has built a platform that transcends the niche it currently addresses. The API/SDK consumption capabilities, data analytic and user workflow portions of the company's Evident Security Platform are valuable assets that it can leverage to grow into other areas in the future.
Tags : evident, cloud security, security platforms, datacenter, firewalls, public cloud, api consumption, networking
     Evident.io
By: Vectra Networks     Published Date: Nov 05, 2015
Intrusion Detection Systems have ceased to live up to their name and have lost their ability to spot today’s sophisticated intrusions. Consequently, cyber attackers are taking advantage of it by launching more evasive and strategic threats that spread rapidly within networks. And security teams are left without the proper tools or insight to identify intrusions that pose the biggest risk.
Tags : intrusion detection systems, cyber attackers, sophisticated intrusions, intrusion detection, security
     Vectra Networks
By: Dell EMC     Published Date: Nov 05, 2015
IT organizations are aggressively virtualizing their data centers, creating private cloud environments that help them reduce capital infrastructure and data center costs, improve security, and simplify management. However, potential hurdles, if left unaddressed, can get in the way of fully benefiting from a private cloud. Download this summary to learn more.
Tags : 
     Dell EMC
By: Juniper Networks     Published Date: Oct 19, 2015
In today’s rapidly evolving world, the modern enterprise has the benefit of many technologies that were unheard of just 10 years ago – the cloud, for instance. However, with every new technology – cloud included – there are new security challenges. With huge numbers of users, devices and data deployed to take advantage of the latest technologies, the enterprise is becoming increasingly vulnerable to data loss, malicious attacks and network instability.
Tags : juniper, security, network, enterprise, cloud, device, networking
     Juniper Networks
By: IBM     Published Date: Oct 02, 2015
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : cloud, security intelligence, ibm security, ibm security intelligence solution, security, it management
     IBM
By: Okta     Published Date: Aug 24, 2015
Amadeus Capital Partners needed to centrally manage employee identities to successfully deploy Dropbox for Business. See how Amadeus gained significant IT savings, end-user productivity and security benefits with Okta in this short video.
Tags : 
     Okta
By: Okta     Published Date: Jul 01, 2015
Amadeus Capital Partners needed to centrally manage employee identities to successfully deploy Dropbox for Business. See how Amadeus gained significant IT savings, end-user productivity and security benefits with Okta in this short video.
Tags : 
     Okta
By: Cisco     Published Date: Jun 29, 2015
Ron the CIO challenges IT operations to cut 70% off of the application deployment schedule. Are his application, security, and network teams up to the task? How can SDN in the data center provide a powerful answer?
Tags : cisco, cisco aci, technology, security, data center, apic, security data, cio
     Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com