All resources sponsored by:

Unisys

1 - 25 of 26 Matches
A Comprehensive, Innovative Approach to Mobile Security
sponsored by Unisys
WHITE PAPER:Because of new mobile threat vectors, security at the device-level is no longer enough. Discover how to strengthen your mobile endpoints from the inside-out with software-defined security, securing mobile data along the entire path to the destination server.
Posted: 20 Jun 2016 | Published: 30 Sep 2015
Get This Now


Making PCI Compliance Manageable
sponsored by Unisys
WHITE PAPER:While organizations implement data encryption to comply with PCI security requirements, most struggle with an increasing scope to manage their CDE with evolving business requirements. Uncover ways to mitigate resultant compliance expenses by reducing your audit scope.
Posted: 17 Jun 2016 | Published: 17 Jun 2016
Get This Now


How Tech-Savvy Workers are Affecting Enterprise Security
sponsored by Unisys
RESOURCE:Rising cybercrime attacks are costing the global economy a fortune. Learn more about what leading experts have to say about the impact that the digitally-enabled workers has on IT infrastructure and the enterprise at large.
Posted: 14 Jun 2016 | Published: 14 Jun 2016
Get This Now


Isolate and Protect your Mission Critical Systems after Support Ends
sponsored by Unisys
WHITE PAPER:When it comes to security concerns for a tool's end-of-life, companies are left with the flight or fight response. Learn what you can do to stay defensive after support expires for Windows products, and ways to reduce the attack surface for the entire enterprise.
Posted: 14 Jun 2016 | Published: 14 Jun 2016
Get This Now


The World Sees 80,000 New Malware Threats Each Day -- Don't Be a Victim
sponsored by Unisys
WHITE PAPER:Micro-segmentation, paired with advanced analytics, can help you manage malware and other risks. Learn now about multi-dimensional cyber-attack detection through machine learning and predictive algorithms, for definable security analysis to determine who your organization can trust.
Posted: 13 Jun 2016 | Published: 13 Jun 2016
Get This Now


A Smart Way to Protect Windows Server 2003
sponsored by Unisys
WHITE PAPER:Explore ways to protect data with endpoint-to-endpoint encryption while you make Windows Server 2003 and other endpoints elusive to hackers.
Posted: 13 Jun 2016 | Published: 30 Jun 2014
Get This Now


Secure the Network On-Premise, Site-to-Site, and in the Cloud
sponsored by Unisys
WHITE PAPER:Whether on-promise or remote, devices that find their way into your organization's communication paths should be cautiously welcomed at best. Explore micro-segmentation and endpoint protection strategies for cloud-based businesses.
Posted: 05 Jun 2016 | Published: 05 Jun 2016
Get This Now


Simplify Compliance while Reinforcing Data Security Best Practices
sponsored by Unisys
RESOURCE:Learn more about the Payment Card Industry Data Security Standard (PCI DSS), and why your scope of it must be reduced. Access this resource so you can conceal communication endpoints, make them undetectable to all unauthorized parties, and more.
Posted: 02 Jun 2016 | Published: 02 Jun 2016
Get This Now


An Innovative Approach to Managing Security in the Cloud
sponsored by Unisys
WHITE PAPER:Unlock the primary components of a secure cloud computing business environment including micro-segmentation, endpoint protection, and more.
Posted: 02 Jun 2016 | Published: 02 Jun 2016
Get This Now


Micro-Segmentation: A Demonstration
sponsored by Unisys
VIDEO:This video illustrates how to micro-segment a network. Discover ways micro-segmentation cryptographically isolates your valuables down to the smallest levels, and organizes them into functional communities so that only the right people can do the right things.
Posted: 26 May 2016 | Premiered: 09 Nov 2015
Get This Now


What's Driving the State of Cybersecurity
sponsored by Unisys
WHITE PAPER:The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.
Posted: 23 May 2016 | Published: 23 May 2016
Get This Now


Identity-Driven Micro-Segmentation Everywhere you Work
sponsored by Unisys
RESOURCE:Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.
Posted: 23 May 2016 | Published: 23 May 2016
Get This Now


Public or Private, Instances in the Cloud Need Protection
sponsored by Unisys
VIDEO:Explore capabilities that conceal your instances in both private and public cloud environments.
Posted: 18 May 2016 | Premiered: 18 May 2016
Get This Now


Enterprise Security Innovation on the AWS Cloud
sponsored by Unisys
WHITE PAPER:One security leader optimized its offerings to give AWS customers a fast and convenient way to protect their data and applications against evolving threats. Discover ways to easily integrate additional protection, comply with regulations, and micro-segment off your virtual machines from neighbors when working on the cloud.
Posted: 17 May 2016 | Published: 19 Jan 2016
Get This Now


Cloud Security: Advanced, Efficient, and Trusted
sponsored by Unisys
WHITE PAPER:Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.
Posted: 17 May 2016 | Published: 17 May 2016
Get This Now


Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud
sponsored by Unisys
WHITE PAPER:Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.
Posted: 16 May 2016 | Published: 16 May 2016
Get This Now


A Comprehensive, Innovative Approach to Cloud Security
sponsored by Unisys
WHITE PAPER:The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.
Posted: 16 May 2016 | Published: 16 May 2016
Get This Now


Why Traditional Data and Network Security is Not Good Enough
sponsored by Unisys
WHITE PAPER:Learn now about a security innovation that can eliminate the tradeoff between cost and risk, improve agility by strengthening data protection, and reduce reliance on physical technology infrastructure.
Posted: 13 May 2016 | Published: 13 May 2016
Get This Now


Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems
sponsored by Unisys
WHITE PAPER:Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.
Posted: 13 May 2016 | Published: 13 May 2016
Get This Now


PCI Compliance: Risks that Financial Institutions can't Afford to Ignore
sponsored by Unisys
WHITE PAPER:In this guide, you'll discover the steps to reducing the scope of audit while providing end-to-end data protection and reducing costs associated Payment Card Industry Data Security Standard (PCI DSS) compliance.
Posted: 04 Dec 2015 | Published: 30 Nov 2015
Get This Now


The State of Security Today: What Needs to Change
sponsored by Unisys
VIDEO:This video discusses the state of security and what needs to change in order to keep our enterprises safe in today's environment. Watch now to learn how micro segmentation can minimize the damage of vicious threats and attacks.
Posted: 20 Nov 2015 | Premiered: 09 Nov 2015
Get This Now


Traditional Security is Dead. Long Live Micro-Segmentation.
sponsored by Unisys
WHITE PAPER:This white paper outlines micro-segmentation's power to tip the balance of power back to IT and away from cybercriminals. Discover how to easily divide your physical networks into hundreds or thousands of logical micro networks, (analogous safe deposit boxes, rather than every network in a vulnerable vault).
Posted: 19 Nov 2015 | Published: 11 Nov 2015
Get This Now


How Do You Secure Financial Transaction Data Across Multiple Retail Locations?
sponsored by Unisys
CASE STUDY:In this white paper, learn how one major Brazilian supermarket chain closed network and access security vulnerabilities to become PCI DSS compliant. Read on and discover the benefits of micro-segmentation.
Posted: 18 Nov 2015 | Published: 30 Sep 2015
Get This Now


Encrypted Network Security Solutions - Infographic
sponsored by Unisys
RESOURCE:Learn about an innovative approach to securing your network in this infographic.
Posted: 18 Nov 2015 | Published: 04 Nov 2015
Get This Now


Control Scan
sponsored by Unisys
WHITE PAPER:Access this white paper now to get the full results of ControlScan's test of one vendor's top security solution. Discover the strengths and weaknesses of this platform and discover if it is a viable option for your organization.
Posted: 09 Nov 2015 | Published: 09 Nov 2015
Get This Now


1 - 25 of 26 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement