Búsqueda

Top four ways to increase security return on investment

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20200037118</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20201120114900.0</controlfield>
    <controlfield tag="008">200420s2020    esp||||       ||| ||spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">922.114</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Top four ways to increase security return on investment</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">Tel Aviv</subfield>
      <subfield code="b">Check Point Software Technologies </subfield>
      <subfield code="c">2020</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">9 p.</subfield>
    </datafield>
    <datafield tag="490" ind1="0" ind2=" ">
      <subfield code="a">Check Point Infinity</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">While most organizations understand that IT security is complex and vitally important, they are also under pressure to control IT costs. However it is next to impossible to control costs when a wide variety of products and services need to be deployed, integrated, operated, and maintained. Check Point Infinity helps organizations of all sizes rationalize their security budgets and staffing by consolidating equipment, services, management and support into a single, operationally efficient framework that can more easily be integrated with the broader IT infrastructure and processes. Therefore, Infinity should be given strong consideration by any busine.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20110017286</subfield>
      <subfield code="a">Retorno de la inversión</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080623791</subfield>
      <subfield code="a">Tecnología de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591229</subfield>
      <subfield code="a">Gestión de empresas</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080603724</subfield>
      <subfield code="a">Seguridad empresarial</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080623517</subfield>
      <subfield code="a">Protección de la información</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20200008286</subfield>
      <subfield code="a">Check Point Software Technologies </subfield>
    </datafield>
    <datafield tag="830" ind1=" " ind2="0">
      <subfield code="0">MAPA20200022893</subfield>
      <subfield code="a">Check Point Infinity</subfield>
    </datafield>
  </record>
</collection>