secure platform

Results 151 - 175 of 185Sort Results By: Published Date | Title | Company Name
By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
     VMware
By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
     VMware
By: Symantec Corporation     Published Date: Feb 25, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : symantec, stuxnet, cyber-attack, security, certificate authority
     Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : symantec, mobile, mobile applications, security
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 24, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : security, code signing, software, private keys, software development
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 24, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : security, software, mobile, mobile application, malware, code signing, software development
     Symantec Corporation
By: Jobvite     Published Date: May 15, 2017
If you’re ready to invest in a recruiting platform, then you know you’re in for countless weeks, or maybe months of due diligence—tireless research, vendor comparisons, wading through user testimonials, and reviews. But perhaps just as important as finding the right recruiting platform is getting executive buy-in for investing in your platform of choice. It pays to rally support and start the buy-in process early.
Tags : 
     Jobvite
By: Thawte     Published Date: Aug 08, 2013
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : thawte, ssl certificate, application, web server, data collection, technology, networking, security
     Thawte
By: PKWARE     Published Date: Aug 21, 2009
The Butler Group provides a technology audit on PKWARE's SecureZIP cross-platform data file security software.
Tags : data security, security audit, auditing, compression, data compression, zip file, zip, compress
     PKWARE
By: Quocirca     Published Date: Feb 23, 2009
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading. End users benefit through improved device uptime, and manufacturers and their service partners can build proactive service relationships which can drive greater customer loyalty.
Tags : quocirca, printers, networked printers, multifunction peripherals, secure remote monitoring, document output devices, remote monitoring, managed print service (mps)
     Quocirca
By: SpringCM     Published Date: Dec 06, 2006
SpringCM forms the basis for GE Medical’s secure document management platform that connects main office staff with field-based technicians and outside contractors.
Tags : document management, case study, content management, cms, content management system, document security, collaboration, springcm
     SpringCM
By: Okta     Published Date: Jul 01, 2015
Cloud-based applications need to be secure and Okta is an identity network and platform that allows you to safely scale these tools overtime. Read this white paper to learn how you can prepare for customer and employee growth and cloud identity management.
Tags : 
     Okta
By: HP     Published Date: Jan 26, 2015
Knowing how customers use the products and services you provide helps you improve what you offer, which helps you retain more customers, and attract new ones. This vital knowledge requires the analysis of traditional business data, machine data, and human information.
Tags : big data, hp haven, scalable, secure data platform, ecosystem, security
     HP
By: IBM     Published Date: Apr 06, 2015
Far from being out of date, mainframes are used around the world to build robust, trusted clouds. Increasingly, organizations are turning to cloud computing to improve their IT responsiveness and to reduce costs. And for enterprise workloads, which require highly reliable and secure platforms to meet demanding service levels, many companies are building their clouds using a mainframe.
Tags : ibm, cloud computing, cost reduction, next generation mainframe
     IBM
By: MobileIron     Published Date: Apr 13, 2015
Enterprises around the world have been searching for a way to securely enable Android™ devices for work, but have shied away from the platform due to ongoing security and fragmentation concerns. Delayed or non-existent Android security patches, malicious app store activity, and other security gaps have led organizations to distrust the platform, particularly those in industries with tight security and compliance requirements. This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
     MobileIron
By: MobileIron     Published Date: Mar 21, 2017
Modern enterprises are rapidly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services. As a result, these organizations are quickly outgrowing basic mobile device management (MDM) capabilities and apps like email and calendar. Building a secure mobile and cloud architecture now requires a comprehensive approach to enterprise mobility management (EMM). It requires a unified platform with defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
     MobileIron
By: MobileIron     Published Date: Feb 26, 2018
Enterprises are increasingly expected to support Macs as corporateapproved devices. In order to be in compliance, it is imperative that all devices accessing sensitive corporate and customer data be fully secured and managed. MobileIron delivers a new model for authentication and identity to Macs and enables enterprises to unify Apple mobile and desktop operations using a common security and management platform. MobileIron’s layered security can be extended to not only corporate-owned Macs, but to employee-owned devices as well. And, IT organizations can bring Macs under management across the organization with unparalleled speed and at scale thanks to seamless integration with Apple’s Device Enrollment Program (DEP) and Volume Purchase Program (VPP).
Tags : 
     MobileIron
By: VMware AirWatch     Published Date: Dec 13, 2016
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with AirWatch by VMware, as well as conduct a Q&A session.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Dec 13, 2016
In this 60-minute webinar, discover how VMware AirWatch, the world’s leader in Enterprise Mobility Management, enables end users with a digital workspace and empowers IT with a unified and secure mobility platform. Recently recognized as the leader in the 2016 Gartner Magic Quadrant for Enterprise Mobility Management for the sixth consecutive year, AirWatch is at the forefront of the Enterprise Mobility Management space. Watch now to learn more about our comprehensive Enterprise Mobility Management platform and the VMware AirWatch solutions.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Dec 15, 2016
Unified endpoint management (UEM) enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. AirWatch is the first leading platform to unify these endpoints together and the benefits organizations are seeing is tremendous.
Tags : 
     VMware AirWatch
By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai makes online business fast, reliable and secure. We earned our global reputation by building the world’s fastest and largest cloud-enabled delivery platform, which is backed by the most scalable, distributed security solution available. Learn about the security solutions that help protect companies in every industry be secure online.
Tags : akamai, cloud security, cloud security solutions, cybersecurity, cloud, cloud delivery platform, networking, security
     Akamai Technologies
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
     AWS
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com