Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 2240Sort Results By: Published Date | Title | Company Name
White Paper Published By: BitSight Technologies     Published Date: May 26, 2016
Does your organization have sensitive data stored across the globe? Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Tags : 
bitsight, data security, risk management, cybersecurity, vrm practices
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: May 26, 2016
With this guide, you’ll never have to wonder about that again. You’ll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management
    
BitSight Technologies
White Paper Published By: Verisign     Published Date: May 26, 2016
DDoS attacks can cripple your network, reduce productivity and decrease revenue. This quarterly report represents a unique view into the attack trends including attack statistics and behavioral trends.
Tags : 
verisign, service trends, ddos, behavioral trends, attack trends
    
Verisign
White Paper Published By: VMware     Published Date: May 18, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. This
Tags : 
data management, business practices, data center. data application, enterprise applications, security
    
VMware
White Paper Published By: Black Duck Software     Published Date: May 18, 2016
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, security, security testing tools, software
    
Black Duck Software
White Paper Published By: Black Duck Software     Published Date: May 18, 2016
Read this report to learn the results from our open source security audits: - How much open source is typically in use - How many commercial applications contain security vulnerabilities in open source - How many open source component vulnerabilities are in each application
Tags : 
black duck, open source, software, security, security report
    
Black Duck Software
White Paper Published By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : 
black duck, application security, security, open source, code
    
Black Duck Software
Case Study Published By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : 
black duck, open source, security, security testing tools, software
    
Black Duck Software
White Paper Published By: Verisign     Published Date: May 11, 2016
Drawing on Verisign’s expertise and experience, this paper identifies key requirements of a flexible security framework, and explores how enterprises can use APIs to extract signals and use a mix of security components on premise and in the cloud to enhance their existing security ecosystem.
Tags : 
cybersecurity, threat landscape, security tools, security and flexibility, breaches and attacks
    
Verisign
White Paper Published By: Verisign     Published Date: May 11, 2016
Learn about the cyberthreats that can cripple your business. Cyber crime, hacktivism and vulnerabilities - the cyber security dangers that face your company are greater than ever. Educate yourself with this FREE report. You'll get: • An in-depth look at the latest in digital crime trends • A look at how specific threats target different lines of business • Information on how current trends could lead to future threats
Tags : 
cyberthreats, digital crime trends, specific threats, current trends, future threats
    
Verisign
White Paper Published By: SAP Ariba     Published Date: May 05, 2016
Executive Summary of the CFO.com Webinar
Tags : 
sap, ariba, e-payments, b2b, security
    
SAP Ariba
White Paper Published By: Rsam     Published Date: Apr 28, 2016
The University of Rochester Medical Center (URMC) is of the nation’s top academic medical centers. Their InfoSec team wanted to implement a program that could withstand constant shifts in regulatory requirements while protecting the sanctity of patient health information. Learn why the selected Rsam and the results of their successful implementation.
Tags : 
rsam, university of rochester, security incident response, successful implementation, security
    
Rsam
Webinar Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment, security
    
Rsam
Webinar Published By: Pluralsight     Published Date: Apr 27, 2016
Are you ready for AngularJS 2.0? How will this potentially major overhaul impact you and your business? In this on demand webinar, Pluralsight author Joe Eames will cover what’s different with 2.0, what’s staying the same and how you can begin experimenting with it today.
Tags : 
pluralsight, webinar, angularjs 2.0, joe eames, security
    
Pluralsight
Webinar Published By: Pluralsight     Published Date: Apr 27, 2016
In this webinar, security expert and Pluralsight author Troy Hunt shares 10 examples of recent online attacks, assesses what went wrong, and tells you how each system could have been built to be resilient to the attack. The lessons learned in this webinar will help you better secure your systems by learning from the mistakes of those who have gone before you.
Tags : 
network management, network secuirty, network optimization, prevention practices, business optimization
    
Pluralsight
White Paper Published By: Mimecast     Published Date: Apr 21, 2016
Download the new E-book, Email Security Uncovered: The Five Faces of IT Preparedness, to learn the latest trends in email security and tips on how you can boost your security confidence.
Tags : 
email, security, trends, cyber attacks, threats
    
Mimecast
White Paper Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats
    
Mimecast
White Paper Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW-HPE Servers
White Paper Published By: IBM     Published Date: Apr 04, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, ibm bigfix, ibm security qradar, risk management, endpoint intelligence
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
ibm, ibm bigfix, risk management, data security, security
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x-force, ibm security portfolio, threat intelligence, security
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
Tolly Group evaluated the security and performance of the IBM Security Network IPS GX7800 vs. a standard signature-based platform.
Tags : 
ibm, ibm security network, ips gx7800, security, knowledge management
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, network protection, ibm security network protection, network security, security
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : 
ibm, managed security services, hybrid it operations, security, knowledge management
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats, security
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.