operating system

Results 151 - 175 of 337Sort Results By: Published Date | Title | Company Name
By: Jamf     Published Date: Aug 06, 2019
IT administrators must not only respond quickly to security issues, but also proactively guard against them. And, while Apple has invested a great deal in its security features, no operating system is immune to security challenges. But don’t worry. Jamf put together a comprehensive Apple security guide to ensure your Mac, iPad, iPhone and Apple TV devices remain protected.
Tags : 
     Jamf
By: Jamf     Published Date: Aug 12, 2019
IT administrators must not only respond quickly to security issues, but also proactively guard against them. And, while Apple has invested a great deal in its security features, no operating system is immune to security challenges. But don’t worry. Jamf put together a comprehensive Apple security guide to ensure your Mac, iPad, iPhone and Apple TV devices remain protected.
Tags : 
     Jamf
By: Juniper Networks     Published Date: Aug 10, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : security, switching, routing, operating system, secure network, sdsn, solutions
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
As networks scale, they become difficult to manage. A different command line interface (CLI) or operating system (OS) is required for every device type in your network, such as routers, switches, and firewalls. Learning a new OS for every device is a complex task for your operations team and can slow them down—not a very efficient way to run a network.
Tags : r&d, drive innovation, automation delivery, critical networks, solutions, lifetime warranty, juniper networks
     Juniper Networks
By: Keynote     Published Date: Nov 13, 2013
As companies aggressively determine how to monetize their mobile channels, or deploy mobile applications to improve business efficiency, those tasked with quality assurance need to support these efforts for all types of devices—in an efficient and cost-effective manner.
Tags : mobile testing, mobile apps, operating systems, best practices, business efficiency, quality assurance, cost effective
     Keynote
By: KPMG     Published Date: Sep 17, 2018
The leadership of a new, marquee pharma manufacturer approached KPMG with a paradox: It was certainly marquee, but not new. As the highly publicized spin-off of a global health services conglomerate, the company began life with $18 billion in annual revenues, an established product pipeline and instant membership in the S&P 100. Reliant on the back-office functions of its parent, it needed to quickly acquire the back-office sinews of a truly stand-alone company: ERP systems and core processes for finance, operations and human resources. During an intensive three-year engagement, KPMG brought the vision of the company’s leaders to life, working towards a target operating model through the disciplined implementation of new systems, processes, training and staffing. The multidisciplinary approach eventually touched the lives of every one of the company’s 21,000 employees, in 170 countries. And as KPMG’s delivered tangible results, something intangible emerged – a new company culture, inde
Tags : 
     KPMG
By: KPMG     Published Date: Jul 11, 2018
The traditional IT organisation is struggling to meet the insatiable demand for new digital capabilities from business stakeholders. It’s time for a new IT operating model – ¬but what will it look like? Read this insight to find out: • what three new roles the future IT operating model must encompass • what new skills and positions will be required in the IT function • which integration needs the future IT function must address • what the priorities should be in terms of orchestrating the IT ecosystem. Read this insight now
Tags : 
     KPMG
By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : lenovo, xclarity, server value, system management, automated discovery, configuration management, software development, it management
     Lenovo
By: Lenovo and Microsoft     Published Date: Jan 19, 2017
Making the decision to upgrade your OS in a multi-platform environment can be scary, and worse, risky! Put your mind at ease with this detailed guide to Windows 10 and Enterprise: Upgrade the Way You Work. You'll get details on: ? All the new features ? Security upgrades ? Migration options
Tags : lenovo, operating system, multi-platform environment, efficiency
     Lenovo and Microsoft
By: Lookout     Published Date: Mar 28, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs.
Tags : cyber security, lookout, smartphone, tablet, mobile
     Lookout
By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
     Lookout
By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : mobile security, mobile risks, device attacks, network attacks, malware attack
     Lookout
By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
     Lookout
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
     Lookout
By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
     Lumension
By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : lumension security, patch management, vulnerability management, risk mitigation, best practices, operating system, patch deployment
     Lumension
By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft
     Lumension
By: Lumension     Published Date: Sep 18, 2012
With the sophistication and sheer volume of exploits targeting major applications and operating systems.
Tags : vulnerability management, lumension, best practices, patch management
     Lumension
By: Lumension     Published Date: Jun 03, 2015
Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.
Tags : security, patch, data, regulatory compliance
     Lumension
By: Lumension     Published Date: Jun 05, 2015
Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.
Tags : security, patch, data, regulatory compliance, application security, compliance, intrusion prevention, database development
     Lumension
By: Mainline Information Systems     Published Date: Oct 27, 2009
View this webcast to learn about tuning for Oracle from an AIX administrative perspective. This session covers operating system related topics including Oracle and disk; volume groups and file systems; asynchronous and concurrent I/O; and Oracle AWR.
Tags : aix, mainline information systems, oracle, tuning, disk
     Mainline Information Systems
By: Maxwell Systems     Published Date: Sep 05, 2013
Construction companies are meeting the challenge of ever-intensifying competition by refining their business operations with standardized operating practices and “visible” information that is shared among multiple departments. “Before, only owners who wanted to grow a very large company would worry about transitioning from the informal business they started to formalized, standardized business processes,” says Jim Flynn, CEO of Maxwell Systems, a leading provider of construction management software solutions, expert services, and best practices. “But in the current environment, you also have to make that transition just to stay competitive and improve your profitability.”
Tags : construction, business processes, business management, process management, operations management
     Maxwell Systems
By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
     McAfee
By: McAfee     Published Date: Feb 06, 2013
Today’s anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today’s malware developers. Hardware-assisted security products take advantage of a “deeper” security footprint.
Tags : advanced persistent threats, apts, apt attacks, rootkits, zero-day stealth attacks, stealthy malware, hardware assisted security, hardware enhanced security
     McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com