Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 2177Sort Results By: Published Date | Title | Company Name
White Paper Published By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing, security
    
SAS
White Paper Published By: Xangati     Published Date: Feb 04, 2016
MBSI was providing approximately 800 virtual desktops to their employees using VMware Horizon with View and 8 VMware ESXi hosts and they were running an additional 140 virtual servers using 5 VMware ESXi hosts – all on a Tegile Hybrid SAN. “It was shortly after we converted from ICD-9 diagnosis codes to ICD-10 codes that performance for the VDI desktops began to suffer noticeably,” explained Shawn Wood, Assistant Manager of Systems Administration, MBSI. “We have relied on Xangati for a number of years now to help us quickly see where bottlenecks are in a short period of time. It's an important part of maintaining the integrity of our infrastructure.” Read more to learn how Xangati helped MBSI address this problem.
Tags : 
xangati, medamerica, mbsi, case study, security
    
Xangati
White Paper Published By: DLT Solutions     Published Date: Feb 04, 2016
Managing email is one of the fundamental building blocks that every agency must consider when laying out their information governance foundation. An agency’s email management strategy affects stakeholders across the entire organization from legal, Freedom of Information Act (FOIA), records management, and IT, to the agency’s independent internal investigators.
Tags : 
dlt solutions, amazon, web services, information governance, veritas
    
DLT Solutions
White Paper Published By: DLT Solutions     Published Date: Feb 04, 2016
In the federal government, perhaps more than any other entity in the country, data is growing at an unprecedented rate. And that includes not only documents but images, video, audio, sensor data, email, social media files, and more. Without structure, data becomes virtually impossible to find when it’s required for eDiscovery, Freedom of Information Act (FOIA) requests, and compliance with retention mandates. It also becomes much more difficult to apply the type of sophisticated analytics necessary to unlock the true value of that data. Finally, lack of structure also makes it difficult to ensure that data is fully secure in compliance with federal regulations.
Tags : 
dlt solutions, information governance, veritas, data, foia
    
DLT Solutions
White Paper Published By: DLT Solutions     Published Date: Feb 04, 2016
You know the facts. Information is exploding at a rate greater than 40% year-over-year. This is not news. The term information explosion has been around since the 1960’s and for the past 50 years, organizations have been focused on improving their approach for storing information. In the 1970’s, government regulations forced many organizations to establish enterprise-wide records management programs that would ensure the systematic retention of information for set periods of time. Once these new rules were in place, the “store everything” mentality was born As digital began to replace paper and Moore’s Law became a reality, legacy concerns regarding physical storage limitations started to fade. Information Managers finally felt they had the ability to store all of their digital information…so they did. This is where the story gets interesting.
Tags : 
dlt solutions, information governance, data, data curveenterprise, security
    
DLT Solutions
White Paper Published By: DLT Solutions     Published Date: Feb 03, 2016
Application security champions are the main audience for this e-book.
Tags : 
dlt solutions, web application, application security, data, threat
    
DLT Solutions
Webinar Published By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : 
cybersecurity, security risk, acquisition target, security ratings, risk-based conversations
    
BitSight Technologies
White Paper Published By: VCE     Published Date: Jan 27, 2016
In the spring of 2015, the IDC organized a study on the business value Vblock systems bring VCE customers. The organizations that took part in this study ranged from 400 employees to 200,000 employees, with an average employee count of 27,113. These organizations represent a wide array of industries and countries. The results of this study were published in the VCE-sponsored IDC white paper entitled, “The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility, May 2015”. This report identifies the challenges faced by financial services industry today and how VCE’s Vblock Systems are being used to address them.
Tags : 
vce, vblock systems, idc analysis, innovation, customer experience
    
VCE
White Paper Published By: IBM     Published Date: Jan 27, 2016
This paper describes how predictive analytics can play a critical role in your threat and risk strategy.
Tags : 
ibm, threat, risk, management, security
    
IBM
White Paper Published By: IBM     Published Date: Jan 27, 2016
This white paper reveals seven strategic objectives that can be attained to their full potential only by employing predictive analytics.
Tags : 
ibm, analytics, predictive, strategy, competitive advantage
    
IBM
White Paper Published By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : 
rackspace, cloud, application, software development, security
    
Rackspace
White Paper Published By: Rackspace     Published Date: Jan 19, 2016
In this whitepaper, we will illustrate some of the factors an organization needs to consider when contemplating a migration to the cloud.
Tags : 
rackspace, cloud, economics, private cloud, public cloud
    
Rackspace
White Paper Published By: Rackspace     Published Date: Jan 19, 2016
Containers are certainly a hot topic. The OpenStack® User Survey indicates over half of the respondents are interested in containers in conjunction with their OpenStack clouds for production uses. Thanks to new open source initiatives, primarily Docker, containers have gained signicant popularity lately among Developer and Ops communities alike.
Tags : 
rackspace, containers, openstack, cloud, data
    
Rackspace
White Paper Published By: Rackspace     Published Date: Jan 19, 2016
Rackspace® Private Cloud Powered by OpenStack® is backed with our results-obsessed service known as Fanatical Support.® Our exceptional customer service means we’re in it with you every step of the way. From initial design to ongoing management for your production environment, we manage your cloud so you can focus on your core business.
Tags : 
rackspace, cloud, information technology, security, data center
    
Rackspace
White Paper Published By: Rackspace     Published Date: Jan 19, 2016
San Francisco-based RockYou purchases the rights to existing social video games, then incorporates in-game ads, and rebrands them as RockYou games.Delivering interactive media content to engaged audiences online, RockYou boasts a portfolio of free-to-play games including dozens of company-owned and partner titles across key platforms, genres and demographics.
Tags : 
rackspace, social gaming, private cloud, data, rockyou
    
Rackspace
Webinar Published By: Pluralsight     Published Date: Jan 19, 2016
Are you ready for AngularJS 2.0? How will this potentially major overhaul impact you and your business? In this on demand webinar, Pluralsight author Joe Eames will cover what’s different with 2.0, what’s staying the same and how you can begin experimenting with it today.
Tags : 
pluralsight, webinar, angularjs 2.0, joe eames, security
    
Pluralsight
White Paper Published By: Mimecast     Published Date: Jan 15, 2016
Learn Office 365™ Migration Risks and How to Avoid a SaaS Monoculture.
Tags : 
mimecast, migration, microsoft office 365, storage, cloud backup
    
Mimecast
White Paper Published By: CDW     Published Date: Jan 15, 2016
Even with the latest devices, your mobile workforce may not have what they need to get the job done. Without a strategy to provide them with data and applications, they’re forced to work without them or find workarounds that can compromise security. Today’s workers are constantly on the move, and IT departments are scrambling to keep up. Access to email is not enough. You must address the legacy applications that your employees can’t easily access from their mobile devices, knowing that app development can be cost prohibitive and complex. And you have to have a strategy in place to secure and manage every application in use.
Tags : 
cdw, client virtualization, mobile workforce, mobile strategy, best practices
    
CDW
White Paper Published By: CDW     Published Date: Jan 15, 2016
A growing number of organizations are realizing the benefits of mobile devices, including increased productivity, enhanced efficiency and speedier response times. Yet while the use of mobile devices typically leads to lower costs and additional revenue opportunities, it also brings challenges associated with device and application procurement, data connections, service costs, content management and — most important — security.
Tags : 
cdw, effective mobile policy, mobile devices, revenue opportunities, application procurement
    
CDW
White Paper Published By: Code42     Published Date: Jan 13, 2016
BACKUP ISN’T JUST A COPY IN THE CLOUD. IT’S THE ANTIDOTE TO EVERYTHING. Be it user error, natural disaster, hardware failure, malware, theft or litigation—there’s a countermeasure to restore your business to normal. Skeptical? Click through the eBook to ?nd out how backup makes the enterprise impervious.
Tags : 
code42, endpoint backup, cloud storage, data migration, data storage solutions
    
Code42
White Paper Published By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : 
code42, data protection, payment data, data protection, corporate data security
    
Code42
White Paper Published By: Code42     Published Date: Jan 13, 2016
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : 
code42, best practices, platform-specific data, endpoint backup, data migration
    
Code42
White Paper Published By: Code42     Published Date: Jan 13, 2016
Read this white paper to learn how the common approaches to e-Discovery miss the mark and how endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : 
code42, e-discovery, endpoint backup, e-discovery methods, data collection
    
Code42
White Paper Published By: Intel Security     Published Date: Jan 12, 2016
This Tech Target research report summarizes a new survey of IT and security professionals that identifies what organizations are doing to combat advanced targeted attacks, and how they feel about their current preparedness to handle both detection and remediation of endpoint breaches due to these attacks.
Tags : 
advanced threat defense, endpoint security, tech target research, security, it management
    
Intel Security
White Paper Published By: Intel Security     Published Date: Jan 12, 2016
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analysts Peter Firstbrook and Neil MacDonald have created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
Tags : 
gartner, buyers guide, endpoint security, security, it management
    
Intel Security
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.