Sentences with phrase «enterprise security applications»

Not exact matches

Developers of an AI platform with the accuracy and security features necessary for enterprise applications
Given that enterprise (read non-SAP) applications and end users will have direct access to critical data in SAP HANA, it is critical to design and administer its security model adequately.
The two have complementary interests when it comes to investing, Ms. Gouw said — Ms. Fonstad has focused on enterprise and mobile applications, application services and health - care IT, while Ms. Gouw, a former engineer, has focused on consumer, social commerce and security companies.
Hewlett Packard Enterprise Introduces Application Security Solutions to Secure the Software Development Lifecycle for DevOps
«These include AI - powered applications for the cognitive enterprise, edge intelligence, security, and smart machines.»
Burlington, MA, USA About Blog Level up your appsec knowledge with research, news, and guidelines for enterprise application security programs from the world - class minds at Veracode.
Chicago, Illinois About Blog Integrigy Corporation is a leader in application security for enterprise mission - critical applications.
Burlington, MA, USA About Blog Level up your appsec knowledge with research, news, and guidelines for enterprise application security programs from the world - class minds at Veracode.
The Ohio Department of Education requests that candidates use its online system, the Security Application for Enterprise (SAFE) web portal, for all new applications.
Along with Samsung's usual business features, such as its Enterprise grade security and BYOD management layer, Knox, the Pro tablets come with Samsung's Remote PC access application, a 6 - month WebEx free trial and a full copy of
Along with Samsung's usual business features, such as its Enterprise grade security and BYOD management layer, Knox, the Pro tablets come with Samsung's Remote PC access application, a 6 - month WebEx free trial and a full copy of Hancom Office for working with Microsoft Office docs.
Enterprise - grade security is all well and good, but a tablet still demands content and applications.
Here, you'll see what makes the cloud so compelling to enterprises; with which applications you should start your cloud journey; how your organization will change, and how skill sets will evolve; how to measure progress; how to think about security, compliance, and business buy - in; and how to exploit the ever - growing feature set that the cloud offers to gain strategic and competitive advantage.
BlackBerry Enterprise Service 10 re-invents RIM's EMM by bringing together device management, industry leading security (i), and mobile applications management for BlackBerry (R) smartphones, BlackBerry (R) PlayBook (TM) tablets, and new BlackBerry 10 smartphones in a consolidated solution.
* Access to up to 10 supported email accounts (including most popular ISP email accounts such as Yahoo! (R), Windows Live (TM) Hotmail (R), AOL (R) and Gmail (TM)-RRB-, plus BlackBerry (R) Enterprise Server support offering advanced security and IT administration capabilities for corporate deployments * Built - in GPS and Wi - Fi (R)(802.11 b / g) * 3.2 MP camera with flash, variable zoom, image stabilization, autofocus and video recording * Advanced media player for enjoying pictures, video and music * 512 MB Flash memory and an expandable memory card slot that supports up to 32 GB microSDHC cards, with a 2 GB microSD card included * 3.5 mm stereo headset jack * Support for the Bluetooth (R) stereo headsets (A2DP / AVCRP) * Sprint Music Store, Sprint Navigation, Sprint TV (R), Sprint Football Live and NASCAR Sprint Cup Mobile * BlackBerry (R) App World (TM) for access to thousands of applications
Burlington, MA, USA About Blog Level up your appsec knowledge with research, news, and guidelines for enterprise application security programs from the world - class minds at Veracode.
Chicago, Illinois About Blog Integrigy Corporation is a leader in application security for enterprise mission - critical applications.
Samsung Business Services offers a comprehensive suite of services to enterprise customers encompassing mobility support, enterprise mobility management (EMM) and value added services for deployment, security, applications and device care.
There are plenty of new security improvements for consumers and enterprises, with Windows Device Application Guard, Exploit Protection and more.
Windows 10 will also have industry - leading security and identity protection for enterprises, so they can deploy new Windows 10 devices with hardware necessary to use Windows Hello, enabling enterprise - grade protection of the device and more secure password - free authentication to enterprise line of business applications.
This distinguished status confirms that HUAWEI Mate 10 Series, HUAWEI P10 Series, and HUAWEI P smart meet the rigorous benchmarks and thorough testing process set by Google, including an elevated device baseline; availability of bulk Android deployment including zero - touch enrollment; delivery of security updates within 90 days of release by Google; consistent application experience in managed profiles and managed devices; enterprise - focused features; and behaviors designed to meet the needs of the most challenging and diverse business environments.
Google has introduced a broad array of security enhancements for its cloud platform to help assure enterprises that they can move critical data and applications to the cloud with confidence.
From supplier credit to inventory management, Eximchain is developing a Blockchain that combines privacy, accessibility, and security to support enterprise - ready applications.
On the security front, Windows Defender Application Guard (WDAG) on the Windows 10 Enterprise edition sees an improvement in its launch time via a «lighter and faster» start process.
In an announcement today, Credit Suisse said it completed the live securities lending transaction with Dutch bank ING, adopting a collateral - lending blockchain application co-developed by a financial resource management firm HQLAX and enterprise blockchain consortium R3.
Windows Defender Application Guard is a popular security feature among the enterprise.
Tags for this Online Resume: Alignment of Business and IT Missions & Strategies, Analytics, Application Development, Asset Management, Asset Valuations, Best Practices, Big Data, Business Development, Business Intelligence, Business Process Reengineering, BPR, Business Strategy, Change Management, Cloud Computing, Consultative Sales, Consulting, Cross-Functional Team Leadership, Customer Relationship Management, CRM, Due Diligence, Enterprise Application Integration, EAI, Enterprise Architecture, Enterprise Resource Planning, ERP, Enterprise Software, Financial Analysis, Forecasting, IT Service Management, ITSM, IT Strategy, Investment Analysis, Investment Strategy, Key Performance Indicators, KPI, Knowledge Management, Managed Service Provider, MSP, Mergers and Acquisitions, M&A, Operations, Operational Efficiency, Operational Excellence, Operations Management, Organizational Development, Portfolio Management, Private Equity, Profit and Loss, P&L, Program Management, Project Management, Regulatory Compliance, ROI, Sales, Salesforce, Sales Management, Security - Oriented Architecture, SOA, Staff Development, Staff Management, Supply Chain, Systems Integration, Training and Development, Training Delivery, Account Management, Client Management, Client Relations, Client Relationship Management, Crisis Communications, Crisis Intervention, Crisis Management, IaaS, Key Account Management, Major Account Management, National Account Management, PaaS, Public Speaking, Risk Assessment, Risk Management, Risk Mitigation, SaaS, Solutions Selling, Strategic Business Planning, Strategic Communications, Strategic Partnerships, Strategic Planning
Well - versed in enterprise - level network connectivity and security, data communications, operating systems and applications, and project coordination wh...
Chicago, Illinois About Blog Integrigy Corporation is a leader in application security for enterprise mission - critical applications.
Your cyber security analyst resume should communicate your ability to erect first line of defense protection of enterprise applications and data.
Navy ERP / SAP User 3/2009 — 3/2012 Navy Enterprise Resource Planning (ERP) / Systems, Applications and Products Data Processor (SAP) Provided information and interpreted standard organizational budgetary and accounting regarding Lines of Accounting, Invoicing, National Security Personnel System (NSPS) purchase orders and purchase requisitions (PO / PR's), Expenditures and consumption within Navy Enterprise Resource Planning (ERP.)
Burlington, MA, USA About Blog Level up your appsec knowledge with research, news, and guidelines for enterprise application security programs from the world - class minds at Veracode.
Establish and monitor formal certification programs regarding enterprise security standards relating to the planned acquisition and / or procurement of new applications or technologies.
Solve security related issues in regards to: User profile and permissions in Active Directory, proxy functions, new systems / applications added to enterprise's network, physical access permissions, mobile security.
Tags for this Online Resume: Management, Applications, Consulting, Enterprise Applications, Oracle, Security, Accounting, Acquisitions, Audit, Budgetary
Tags for this Online Resume: Management, Microsoft, Amazon Web Services, Applications, Infrastructure, Software, VMWare, Architect, EMC, Foundry, Cloud, AWS, Azure, Enterprise Architect, Systems Engineer, Cloud Architect, Cloud Security, Data center, Google cloud, Disaster Recovery, AZure, AWS, Google, CLoud
Tags for this Online Resume: PMO, Program Director, Project manager, Project Management, Senior Project Manager, SharePoint, Sharepoint Technologies, Support, Workbench, Business Intelligence, Database, Enterprise Resource Planning, Functional Specs, Hyperion, Java Programming Language, Oracle, Oracle Database, Systems Architect, Data Security, Data Quality, Organizational Change Management, Vendor Relations, agile, Applications Development, CRM, c++, html, c#, it jobs, linux, java, sql, software
Tags for this Online Resume: Applications, Database, Encryption, Enterprise Manager, GOLDEN GATE, Oracle, Oracle Database, Oracle Database Administration, Oracle Enterprise Manager, Security
About Blog For over 40 years MTI has been a global leader in mobile device display technologies, developing solutions that deliver the highest level of merchandising security for consumer electronics and mobile enterprise applications allowing products, sales and service to be the focus, while security operates efficiently in the background.
Tags for this Online Resume: North Puget Sound, Information Security, Configure, Structured Query Language, Infrastructure, Microsoft Technologies, Asset Management, Quality Assurance, Management, Security, Audit, Managed Security, Quality, Procurement, Hardware Replacement, Application Distribution, Enterprise Systems Management, sql, it jobs, html, software
Professional Summary * Proficient in Oracle 11g and 12c Database Administration * Proficient in Oracle Enterprise Manager (OEM) * Strong in RMAN, Backup and Recovery * Proficient in Data Pump utility * Database Upgrade and Patch Application * Performance Tuning and Capacity Monitoring * Database Security * Oracle RAC & ASM Administration / Installation * Data Guard Administration
Experience Summary: Over 19 years of experience in software design and development of web sites and web based enterprise applications, B2B, security and client - server applications using Microsoft technologies C#, ASP.NET, MVC (Razor), VC + +, COM, and SQL server, Oracle and Sybase databases.
Tags for this Online Resume: Apache Tomcat, Automation, Management, Security, Apache Maven, Linux, Maven, Apache Web Server, Application Server, Java 2 Enterprise Edition (J2EE)
Tags for this Online Resume: Applications, Enterprise Applications, Help Desk, Information Technology, Infrastructure, Integrate, Inventory, Itil, Leadership, Management, automation, Security, Incident Management, Change Management, Release Management, Configuration Management, Request Management, Service Management, Coaching, Team Building, Knowledge Management, Workflows, Orchestration
Tags for this Online Resume: Hibernate, Security, Spring, AJAX, Apache Web Server, Applications, Cascading Style Sheets, CSS, HyperText Markup Language, Java 2 Enterprise Edition (J2EE)
Information Technology Security Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicaSecurity Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicaSecurity policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technicasecurity audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technical skills
IT Project Manager — Professional Highlights Serve multinational corporations in a variety of technology based strategic planning and administration roles Offer expertise as a consultant, programmer, engineer, business analyst, and database administrator Lead technology projects for NASA, U.S. Customs, American Express, and General Electric Design and implement reporting, customer service, marketing, sales, and financial management software Responsible for network and database design, administration, and security Oversee enterprise - wide hardware and software upgrades resulting in increased efficiency Minimize operational and manpower costs through effective technology solutions Serve as forecast budget analyst for Joint Project Management Operations at Kennedy Space Center Develop reporting application tool using crystal reports engine on CD throughout Kennedy Space Center and Cape Canaveral Air Station resulting in $ 500,000 savings on user licensing fees Create detailed project plan with well - defined tasks, milestones, client sign - offs, test cycles, and specifications which served to communicate project progress to management Develop visual basic application for financial banking Institution using crystal reports to reduce the company's response time resulting in initial reporting from 2 - 3 hours to just 45 seconds Oversee multimillion - dollar software implementation for Miami Air from a consultancy level Upgrade Great Plains software platform and administered security access for Miami internal databases Write over 200 SQL stored procedures from access databases for financial institutions Compose business correspondence and prepared statistical spreadsheet analysis for Kennedy Space Center Recognized by colleagues and superiors for outstanding job performance, reliability, and efficiency Conduct surveys of operations to assess needs and identify high priority improvements Complete major product releases meeting very aggressive schedules and budgets Serve as a member of the International Cyber Threat Task Force Utilize fluencies in English, Portuguese, Arabic, French, and German to communicate with a diverse clientele Continually study emerging technologies and industry best practices Perform all duties with positivity, professionalism, and integrity
General Electric (Stamford, CT) 2007 — 2008 Corporate Consultant — Infrastructure Systems & Network • Designed, developed, and engineered GE Treasury system's development, QA, Production, and DR environment • Hardware: Sun Fire V220, V480, V880, V1290, V6140, V6800, V6920; Sun Enterprise T2000, T5120 (Solaris 10: LDOMS, ZFS, RAID, Zoans, Containers), E10K, E15K, E25, M4000, M8000, M9000; HP ProLiant with Linux 5.0 (EMC and 3 PAR SAN) • Built servers from racking, cabling (Ethernet / fiber), connecting to network, setting serial connection to Avocent ports, and setting up server to the network through DNS • Performed massive installation of Solaris servers using both Jumpstart and Blade Logic and Red Hat using both PXE boot and BladeLogic servers to global distributed network of more than 6000 servers • Installed and configured Solaris 10 OS, recommended patches, hardening software, LDOMS, ZFS, and Container on Sun server • Installed and configured Emulex LPFC, EMC Power path, Navisphere, Veritas Volume Manager, Veritas Cluster Server, Veritas Volume Replicator, and Veritas Net Backup in heterogeneous environment • Partitioned and mirrored disks using Solaris LVM, disk suites, Veritas VxVM, mirrored root file system and set up alternate boot device and dump device • Installed application software for ITG, IDM, and Tibco etc. • Created and adjusted Oracle projects on oracle 9i and 10g • Configured operating systems, LDOMS, ZFS, RAID, network Multi Pathing, Cisco Switch 6309, Brocade Switch, EMC DS41000 fiber switch, EMC, 3 PAR and HITACHI SAN, DNS, NIS, NIS plus, LDAP • Created LUNs for EMC, 3 PAR, HITACHI SAN and set up RAIDS • Created zoning of Cisco 6309 switch • Provided connectivity of Ethernet ports and fiber channel by patching Ethernet ports from server panel to switch, and by patching fiber from server to Brocade switch then to EMC DS41000 switch through Cisco switch6300, 6309, Big IP • Performed alternate boot testing, crush dump testing and cluster testing • Vendor liaison for Cisco, HP, IBM, EMC, Symantec, Oracle Sun, and Red hat Linux resolving hardware and software issues • Scheduled changes and upgrades communicating with business owners and support team • Architected Disaster Recovery System conducted testing and resetting the systems as needed • Performed zoning and provisioning configured EMC / Power path LUNs on UNIX servers upon client's request • Resolved issues with NIS, NIS +, DNS, VxVM and VCS among other SA tasks • Created network topology of the internet and intranet security environment using Visio 7.5
Tags for this Online Resume: Infrastructure, Nuance, Security, ACD, Automatic Call Distribution, Airlines, Banking Industry, Intelligent Call Management, Management, Operating Systems, Contact Center, Cisco, Avaya, Genesys, Cloud, Aspect, I3, Workforce Management WFM, Omni Channel, Multi Media, Telecommunications, Managed Services, Operations, Sales, Executive Management, Sales Management, Operations Management, Consulting, Enterprise Architecture, Data Analysis, Reporting, Big Data, Digital Media, Software Development, Application Development, Program Management, Project Management, NICE, Verint, Zoom, Calabrio, eGain, CafeX, Upstream Works, eMail, Web Collaboration, Web Chat, Social Media, SMS, Outbound, BPO, Outsourcing, Healtcare, Retail, Engineering
Chicago, Illinois About Blog Integrigy Corporation is a leader in application security for enterprise mission - critical applications.
a b c d e f g h i j k l m n o p q r s t u v w x y z