security enhancements

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: May 07, 2015
Protect against hackers by upgrading to new desktops featuring Intel’s hardware-enhanced security and supporting software. Innovative hardware enhancements, built into Intel®-powered desktops since mid-2013, “harden” key information and commands normally executed in software, giving your business maximum protection. Read this paper to learn what your organization can do to overcome security challenges.
Tags : 
     Dell
By: Q2 eBanking     Published Date: Jul 30, 2017
Banks and credit unions face multiple challenges to operational efficiency: tightening budgets, limited headcount, a challenging regulatory climate, ongoing security concerns and others. Efficiency and process enhancements can limit the impact these challenges could have on your institution. The following five questions—and your responses—may help your financial institution (FI) as you look to drive operational efficiencies, improve compliance and security, keep account holders happy and attract new ones.
Tags : 
     Q2 eBanking
By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : microsoft, security, best practices, data
     LogRhythm
By: Dell Windows Server     Published Date: Jan 16, 2009
New virtualization tools, Web technologies, and security enhancements help save time and reduce costs, and provide you with high availability and increased flexibility for your changing business needs. Central to IT simplification is streamlining maintenance and maximizing availability — and by running Windows Server 2008 on Dell servers, you can do both.
Tags : dell, ws08, new virtualization, web technologies, security enhancements, windows server 2008, security, platforms
     Dell Windows Server
By: Bitium     Published Date: Jan 22, 2014
Selecting the right single sign-on solution (SSO) for your organization can be a daunting task. Competing solutions offer varying levels of application support, management overhead, and potentially confusing (and counter- productive) cost structures. But the upside in terms of improved security, manageability and user productivity enhancements provided by the right SSO solution can be dramatic. The questions contained within are intended to help you collect and organize the critical information you need to make a well-informed decision for your organization. Please use them as a guide during your due diligence and vendor selection process. Please download the white paper to learn more.
Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, it management, enterprise applications
     Bitium
By: Dropbox for Business     Published Date: Jun 09, 2014
Protecting your data isn’t a feature on a checklist, something to be tacked on as an afterthought. Security is at the heart of Dropbox for Business, informing not only how we approach new features and enhancements, but also how we’ve designed the product itself. Download here to find out how we’ve built Dropbox for Business to keep data safe for all our users.
Tags : dropbox, business, data, protect, security, data management, data center
     Dropbox for Business
By: IBM     Published Date: Mar 04, 2009
Download IBM® Lotus® Sametime® Standard V8.0, a platform for unified communications and collaboration that combines security features with an extensible, open solution including integrated Voice over IP, geographic location awareness, mobile clients, and a robust Business Partner community offering telephony and video integration. Lotus Sametime Standard V8.0 expands on the existing instant messaging, Web conferencing, VoIP, point-to-point video, mobile clients, external IM gateway, and extensible client with additional platform support and enhancements to the end user experience, administration, and performance.
Tags : ibm, lotus, sametime, communications and collaboration, instant messaging, web conferencing, voip, point-to-point video, mobile clients, external im gateway, extensible client, enterprise applications
     IBM
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com