Segurança

CIBER-RESILIÊNCIA: FACTOR-CHAVE PARA A SEGURANÇA DA SUA EMPRESA

Uma rápida pesquisa no Google sobre o termo “empresas resilientes” gera 44,400,000 adosem menosde um segundo. Este conceito, definido como” a capacidade de recuperar rapidamente das adversidades, ficando mais forte”, tornou-se fundamental para as empresas que enfrentam um grande número de riscos num contexto de economia global: desde ataques cibernéticos, fraudes globais e roubo de

Cognitive security

For almost a century, we’ve programmed computers to help solve complex problems. We can now simulate weather, sequence genomes and instantly share data across the world. But ask a computer to do something humans do every day—recognize an image, read a book or explain the meaning of a poem—and it’s a different story. Traditional systems fall short.

A Importância da Segurança nos Negócios

A importância e os benefícios resultantes da implementação de mecanismos de segurança da informação nos negócios é evidente podendo reduzir riscos de perda de informações confidenciais de fraudes e redução da probabilidade de fraudes, educando os utilizadores na utilização da informação de uma forma mais segura.

Enterprise mobility management, the big bang theory

The boundaries between working “in the office,” “on the road,” or “at home” have been blurred by the untethered power of smartphones, tablets, and other portable devices. Employees expect the flexibility to work on the devices they choose, and employers have come to expect always-on availability. The universe of mobility is a complex thing, and it

Best practices for mobile application lifecycle management

Mobile devices are now a reality in most organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. But to achieve these benefits, it is imperative that mobile security best practices

Internet Security Threat Report 2014

Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products

Unified Data Protection for Physical and Virtual Environments

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as

Modernizing Data Protection With Backup Appliances

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.