security management

Results 351 - 375 of 1275Sort Results By: Published Date | Title | Company Name
Published By: Forrester Research     Published Date: Apr 27, 2015
Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Forrester Research
Published By: Mimecast     Published Date: Jan 11, 2017
Organizations that work with the personal data of European Union residents need to overhaul business processes to avoid the risks of violating the General Data Protection Regulation, which takes effect in May 2018. Penalties for non-compliance could cost your organization upwards of €20 million or 4% of total annual worldwide revenue, whichever is higher. Mimecast provides numerous ways to help simplify GDPR compliance. Learn how Mimecast Targeted Threat Protection helps ward against impersonation attacks, weaponized attachments, and malicious URLs – offering a comprehensive front-line defense for the personal data entrusted to you when it is attacked via the email vector.
Tags : 
mimecast, security, gdpr compliance, gspr risk management
    
Mimecast
Published By: Blue Coat     Published Date: Feb 04, 2016
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic **Protect user privacy **Allow you to control SSL’s use.
Tags : 
    
Blue Coat
Published By: LogicNow     Published Date: Mar 10, 2016
Layered Security in less than 10 minutes. All from a single, easy to use dashboard. Try MAX free for 30-days!
Tags : 
msp, layerd security, web protection, antivirus, patch management, software, web security, bandwidth, security, it management, enterprise applications, data management, business technology, data center
    
LogicNow
Published By: Oracle     Published Date: Feb 21, 2018
As Mobile is the new normal for users to connect and consume content, you need to consider apps, mobile integration,security, analytics, development tools, life-cycle management, various mobile stakeholders, and the overall enterprise mobile ecosystem.
Tags : 
    
Oracle
Published By: Staples Business Advantage     Published Date: May 24, 2016
Today, many enterprises are struggling to manage their printing environments to ensure efficiency, security, and control. This problem has created one of the fastest-growing trends in printing today: managed print services (MPS). While keeping data safe is a growing concern for all companies, MPS software has no access to the content being printed, faxed, or scanned. Read this white paper to learn how MPS helps to protect and control printed assets and can play a big role in ensuring sensitive documents don't end up in the wrong hands.
Tags : 
it security, managed print services, outsourced print services, print management, print costs, business technology
    
Staples Business Advantage
Published By: VMware     Published Date: May 10, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware
Published By: Jamf     Published Date: Jun 07, 2018
The Center for Internet Security (CIS) benchmark for iOS is widely regarded as a comprehensive checklist for organizations to follow to secure iPad and iPhone devices. This white paper explains how to implement the independent organization’s recommendations and walks you through: • CIS and iOS management basics • Securing institutionally-owned devices • Securing personally-owned devices
Tags : 
    
Jamf
Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: Oracle     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: Designed for scale-out and cloud infrastructures SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: Continuously provides real-time results. Processes more complex workload stacks. Optimizes usage of per-core software licenses Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle
Published By: Intel Security     Published Date: Feb 23, 2015
This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture, siem, security event management, infrastructure, infrastructure management
    
Intel Security
Published By: Intel Security     Published Date: Feb 23, 2015
This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.
Tags : 
gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information, event management, database security, infrastructure
    
Intel Security
Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking, cyber-attacks, database security
    
Intel Security
Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.
Tags : 
security information, security connected framework, big security data, big data, log management, siem, security event management, data quality, database security
    
Intel Security
Published By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : 
byod, device, security, enterprise, mobility, policy
    
Absolute Software
Published By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : 
device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management, network intelligence, ip networks, network management
    
BlueCat
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, cloud computing
    
Brainloop
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management
    
Brainloop
Published By: Brainloop     Published Date: Nov 09, 2011
This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.
Tags : 
brainloop, security, compliance risks, sharing information, security management, data protection, database security
    
Brainloop
Published By: Websense     Published Date: Oct 18, 2010
Data Loss Prevention (DLP) solutions are moving targets. They keep changing to meet evolving regulatory requirements and business needs. It's tough to select the best DLP solution. This white paper from leading information security research firm Securosis gives you an overview of the DLP industry, technologies, and architectures.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing, database security
    
Websense
Published By: Websense     Published Date: Apr 16, 2010
Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing, secure gateways, database development
    
Websense
Published By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor, change management, configuration management, solidcore, fortrex, security
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management, configuration management, solidcore, fortrex, infrastructure, risk management
    
Solidcore
Published By: Winshuttle     Published Date: Apr 18, 2017
How can a finance and/or controller professional access SAP FICO data leveraging Microsoft Excel in a highly usable and interoperable fashion while respecting all of the SAP core security and governance controls? In order to fully explore this question, this white paper highlights five valuable ways to leverage Microsoft Excel to reduce Finance & Controller operational costs while making your SAP FICO systems implementation, management and maintenance life easier.
Tags : 
    
Winshuttle
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.