HR Hero Your Employment Law Resource
 

social media security

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
If you’re a small-to-midsized business (SMB), you know that you’re operating in a fast-paced, ever-changing business environment. Customers want their demands met instantly, and increasing competition multiplies the pressure you’re under. If you can’t deliver, you can be sure somebody else will. Fortunately, the technology landscape is changing the way you do business. Mobility, social media, and Big Data are leveling the playing field and making it possible for companies like yours to access more sophisticated technology, reach bigger audiences, target their messages, and innovate in their offerings. Yet nothing has changed the landscape so much as the cloud.
Tags : 
business environment, business management, social media, information technology, data security
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Mobility, social media, analytics and the cloud are revolutionizing how data is accessed, used, and secured for small to midsize businesses. With data security threats are on the rise, keep your business running with Hewlett Packard Enterprise.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.
Tags : 
mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Die Welt ist heute digital – Cloud, Mobilität, Social Media und das Internet of Things verändern Arbeit und Freizeit für jeden. Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: Spredfast     Published Date: Aug 24, 2018
It only takes one accidental Tweet to undo years of brand reputation. It's important to understand the opportunities and risks your brand faces on social, and what you can do about them. Download this whitepaper to learn more about the risks and gain advice and tips on how to protect your brand.
Tags : 
social media risk management, risks of social media, social media compliance, social media user management, social media security, social media management tools, social media monitoring, social media governance, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, social media management software, social media marketing tools, social media monitoring tools, social media management company
    
Spredfast
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18
Published By: Clearswift     Published Date: Jun 09, 2008
Anyone who spends any time online cannot have failed to notice. People are using the Web in new ways; ways that make the 'brochureware' of the early Web experience look and feel decidedly flat. It's a new world, characterised by a wave of new jargon, brands and web based experiences. MySpace. FaceBook.  Wikipedia. Flickr. Twitter. YouTube. Mashups. Blogs. Newsfeeds. Download this white paper for a simple guide to the terms, opportunities and threats that Web 2.0 poses.
Tags : 
internet security, web 2, web 2.0, clearswift, social media, social networking, facebook, myspace, web 2.0, security, web security, clearswift
    
Clearswift
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
The incredible reach of social media can be used to nurture business relationships and nourish invaluable customer relationships. But without an enterprise-wide security strategy, your organization is susceptible to a variety of internal and external threats, including account hijackings, malware and employee errors that can lead to brand and communication crises.
Tags : 
social media, social media management, enterprise, global, security, threats, permissions, hootsuite
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Download this simple, five-step guide now, to help your brand avoid security pitfalls. Ensure that your team takes the right steps to safely unleash the power of social media.
Tags : 
social media, social media management, enterprise, social media security, security, threats
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Apr 07, 2014
Alors qu'un nombre croissant d'entreprises adopte la puissance des médias sociaux, les violations de la sécurité sont également en hausse. Piratage du Twitter de l'entreprise, salariés malhonnêtes qui usurpent le compte Facebook de l'entreprise, cadres supérieurs qui divulguent des informations confidentielles sur leurs réseaux personnels. Ces sortes de crises peuvent être catastrophiques pour votre marque. Savez-vous comment les éviter?
Tags : 
hootsuite, social relationship platforms, it leadership, social media, social media advice, success stories
    
uberVU via HootSuite
Published By: M86 Security     Published Date: Dec 01, 2010
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : 
m86 security, social media policy, web acceptable use policies, aups, email and web security
    
M86 Security
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Die Welt ist heute digital – Cloud, Mobilität, Social Media und das Internet of Things verändern Arbeit und Freizeit für jeden. Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.Diese Transformation verstärkt auch den Wettbewerb. In den Worten des Analysten Mark Raskino: „Daher revidierten alle Akteure ihre Strategien ungefähr gleichzeitig, und allen wurde die Macht der digitalen Wirtschaft etwa zur gleichen Zeit bewusst. Konkurrenz ist also unvermeidlich.“
Tags : 
    
CA Technologies EMEA
Published By: M86 Security     Published Date: Feb 09, 2011
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : 
m86 security, social media policy, web acceptable use policies, aups, email and web security
    
M86 Security
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.