All resources sponsored by:

Unisys

16 Matches
Micro-Segmentation: A Demonstration
sponsored by Unisys
VIDEO:This video illustrates how to micro-segment a network. Discover ways micro-segmentation cryptographically isolates your valuables down to the smallest levels, and organizes them into functional communities so that only the right people can do the right things.
Posted: 26 May 2016 | Premiered: 09 Nov 2015
Get This Now


What's Driving the State of Cybersecurity
sponsored by Unisys
WHITE PAPER:The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.
Posted: 23 May 2016 | Published: 23 May 2016
Get This Now


Identity-Driven Micro-Segmentation Everywhere you Work
sponsored by Unisys
RESOURCE:Discover how micro-segmentation can defend your data in public and private clouds, so you can securely expand your business. Access now and you'll also learn how cryptography can cloak your data and servers from dangerous cyber-attacks.
Posted: 23 May 2016 | Published: 23 May 2016
Get This Now


Public or Private, Instances in the Cloud Need Protection
sponsored by Unisys
VIDEO:Explore capabilities that conceal your instances in both private and public cloud environments.
Posted: 18 May 2016 | Premiered: 18 May 2016
Get This Now


Enterprise Security Innovation on the AWS Cloud
sponsored by Unisys
WHITE PAPER:One security leader optimized its offerings to give AWS customers a fast and convenient way to protect their data and applications against evolving threats. Discover ways to easily integrate additional protection, comply with regulations, and micro-segment off your virtual machines from neighbors when working on the cloud.
Posted: 17 May 2016 | Published: 19 Jan 2016
Get This Now


Cloud Security: Advanced, Efficient, and Trusted
sponsored by Unisys
WHITE PAPER:Yesterday's security has fallen behind the needs of today. Here are better ways to address threats by keeping security up to speed with the cloud.
Posted: 17 May 2016 | Published: 17 May 2016
Get This Now


Security without Limits: Extending Enterprise-Grade Security from your Data Center to the Cloud
sponsored by Unisys
WHITE PAPER:Need the ability to quickly and securely shift workloads back forth between the data center and the cloud? Access this white paper and discover ways cryptographic micro-segmentation can seamlessly protect data center workloads against unauthorized access.
Posted: 16 May 2016 | Published: 16 May 2016
Get This Now


A Comprehensive, Innovative Approach to Cloud Security
sponsored by Unisys
WHITE PAPER:The use of roles -- rather than IP addresses -- significantly reduces the risk of configuration errors that leave your applications exposed to unauthorized users. Discover ways cloud security tools can mirror your on-premise application infrastructure with identical security policy definitions for both environments.
Posted: 16 May 2016 | Published: 16 May 2016
Get This Now


Why Traditional Data and Network Security is Not Good Enough
sponsored by Unisys
WHITE PAPER:Learn now about a security innovation that can eliminate the tradeoff between cost and risk, improve agility by strengthening data protection, and reduce reliance on physical technology infrastructure.
Posted: 13 May 2016 | Published: 13 May 2016
Get This Now


Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems
sponsored by Unisys
WHITE PAPER:Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.
Posted: 13 May 2016 | Published: 13 May 2016
Get This Now


PCI Compliance: Risks that Financial Institutions can't Afford to Ignore
sponsored by Unisys
WHITE PAPER:In this guide, you'll discover the steps to reducing the scope of audit while providing end-to-end data protection and reducing costs associated Payment Card Industry Data Security Standard (PCI DSS) compliance.
Posted: 04 Dec 2015 | Published: 30 Nov 2015
Get This Now


The State of Security Today: What Needs to Change
sponsored by Unisys
VIDEO:This video discusses the state of security and what needs to change in order to keep our enterprises safe in today's environment. Watch now to learn how micro segmentation can minimize the damage of vicious threats and attacks.
Posted: 20 Nov 2015 | Premiered: 09 Nov 2015
Get This Now


Traditional Security is Dead. Long Live Micro-Segmentation.
sponsored by Unisys
WHITE PAPER:This white paper outlines micro-segmentation's power to tip the balance of power back to IT and away from cybercriminals. Discover how to easily divide your physical networks into hundreds or thousands of logical micro networks, (analogous safe deposit boxes, rather than every network in a vulnerable vault).
Posted: 19 Nov 2015 | Published: 11 Nov 2015
Get This Now


How Do You Secure Financial Transaction Data Across Multiple Retail Locations?
sponsored by Unisys
CASE STUDY:In this white paper, learn how one major Brazilian supermarket chain closed network and access security vulnerabilities to become PCI DSS compliant. Read on and discover the benefits of micro-segmentation.
Posted: 18 Nov 2015 | Published: 30 Sep 2015
Get This Now


Encrypted Network Security Solutions - Infographic
sponsored by Unisys
RESOURCE:Learn about an innovative approach to securing your network in this infographic.
Posted: 18 Nov 2015 | Published: 04 Nov 2015
Get This Now


Control Scan
sponsored by Unisys
WHITE PAPER:Access this white paper now to get the full results of ControlScan's test of one vendor's top security solution. Discover the strengths and weaknesses of this platform and discover if it is a viable option for your organization.
Posted: 09 Nov 2015 | Published: 09 Nov 2015
Get This Now


Five Things Your IT Resources Should Be Telling You - And Aren't
sponsored by Unisys
WHITE PAPER:This whitepaper describes the types of information IT managers should expect to gain from leading-edge IT resource governance tools.
Posted: 22 Jan 2009 | Published: 22 Jan 2009
Get This Now


16 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement