HP

Displaying 1 - 9 of 9 results

  • Comment améliorer la sécurité et la productivité et sécuriser la mobilité de vos employés

    White Papers · Jun 2019 · Provided By HP

    L’adoption et l’intégration des nouvelles technologies sont essentielles au succès de l’entreprise. Le département IT est le mieux placé pour prendre les décisions stratégiques qui sauront préparer l’avenir de l’entreprise. HP est prêt à travailler avec vous pour identifier la solution qui répond le mieux à vos besoins et aux...

    Download Now
  • Comment le modèle Device as a Service pourrait révolutionner la gestion du cycle de vie

    White Papers · Jun 2019 · Provided By HP

    Cette lettre IDC InfoBrief se penche sur un nouveau modèle d’achat et de déploiement pour les terminaux des utilisateurs finaux. Le modèle Device as a Service (DaaS) est mis en oeuvre à travers un contrat pluriannuel prévoyant la prise en charge par un seul prestataire des opérations d’acquisition, de déploiement...

    Download Now
  • 2014 Cost of Cyber Crime Study: Australia

    White Papers · Jan 2015 · Provided By HP

    The incidence and cost of cyber crime in Australia is escalating. The headlines show us that. But now the Ponemon Institute provides the numbers you need to plan and manage your investments in cyber security. One of the major findings of the 2014 Cost of Cyber Crime study for Australia...

    Download Now
  • Improve your Security in 30 days with HP TippingPoint

    White Papers · Jan 2015 · Provided By HP

    This white paper shows how you can use HP TippingPoint to materially improve your security posture in 30 days. It offers a day-by-day approach that helps you understand what a Network-Generation Intrusion Prevention System ( NGIPS) can do and includes links to background information to help you better understand the...

    Download Now
  • IT Security: Midsize Businesses Face Enterprise-Caliber Threats

    White Papers · Dec 2014 · Provided By HP

    The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize organisations often lack the sophisticated defenses of large enterprises, many fail to recognise their vulnerability and are overconfident in their ability...

    Read More
  • Does Application Security Pay?

    White Papers · Dec 2014 · Provided By HP

    Measuring the Business Impact of Software Security Assurance Solutions With the escalating number and increasing sophistication of cyber attacks, perimeter defenses are no longer enough. Enterprises must ensure application vulnerabilities don't open doors for hackers. Mainstay surveyed 12 organisations that implemented application vulnerability testing with HP Fortify. Their...

    Read More
  • Achieving Security with Cloud Data Protection

    White Papers · Nov 2014 · Provided By HP

    Today, more and more companies recognize the value and convenience of using cloud backup to protect their server data. HP Autonomy offers hosted data storage that enables you to reduce the costs, risks, and complexity of storing and protecting your business information. With a heightened focus on security, privacy, and...

    Download Now
  • Gartner Malware Newsletter

    Research · Aug 2014 · Provided By HP

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Learn More
  • Building a Better Network Security Strategy

    White Papers · Aug 2014 · Provided By HP

    In today's global, always-on world, network security is crucial. Enterprises need to ensure that employees accessing their networks are secure at all times. A comprehensive network security solution needs to include a number of factors, including • Network reliability • Resources for managing the network • Network features and...

    Read More