Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 1757Sort Results By: Published Date | Title | Company Name
White Paper Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers, security
    
Duo Security - Nethawk
White Paper Published By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide.
Tags : 
two-factor authentication, integration issues, security concerns, it security decision-makers, security
    
Duo Security - Nethawk
White Paper Published By: OnBase by Hyland     Published Date: Jun 29, 2015
Unstructured content annoys clinicians and staff. They have to find it. They have to wait for it. They have to worry about whether it’s been lost or misplaced. Turn that source of annoyance into a point of efficiency with enterprise content management (ECM) technology. Learn how to find your unstructured content, capture it and make it work for you.
Tags : 
user experience, enterprise content management, productivity, security, compliance
    
OnBase by Hyland
White Paper Published By: OnBase by Hyland     Published Date: Jun 29, 2015
With so many enterprise content management (ECM) vendors, choosing one can be overwhelming. Learn how to research ECM vendors, use the RFP process to narrow the playing field and evaluate not only the software, but also the vendor, in a product demo. Read on to ensure you pick the solution and vendor best-suited to meet your organization’s specific needs.
Tags : 
enterprise content management, ecm, vendors, magic quadrant, security
    
OnBase by Hyland
White Paper Published By: OnBase by Hyland     Published Date: Jun 29, 2015
Clinicians and staff want to perform better, produce more and enjoy higher levels of satisfaction. Close the gap between a user’s experiences with technology as a consumer and her experiences with technology at work to maximize the impact on your organization’s bottom line.
Tags : 
healthcare it, roi, optimization, return of investment, security
    
OnBase by Hyland
White Paper Published By: OnBase by Hyland     Published Date: Jun 29, 2015
Manage medical imaging and documentation better by presenting patient information – in context – in one location. Read on to see how a flexible, enterprise patient viewer helps healthcare IT ensure patient and clinician satisfaction while supporting the market’s healthcare delivery and payment system initiatives.
Tags : 
medical imaging, patient information, enterprise patient viewer, healthcare it, security
    
OnBase by Hyland
White Paper Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails
    
Mimecast
White Paper Published By: Verisign     Published Date: Jun 03, 2015
Defending an enterprise today is a more complex and challenging task than ever before. Download this white paper to learn what you need to know to protect your network and data.
Tags : 
point-of-scale systems, cyber crime, banking trojans, downloaders, hacktivist activity
    
Verisign
White Paper Published By: Verisign     Published Date: Jun 03, 2015
This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services and the security research of Verisign iDefense Security Intelligence Services in the 1st Quarter of 2015. It represents a unique view into the attack trends unfolding online for the quarter, including attack statistics and behavioral trends.
Tags : 
ddos, attack mitigation, attack trends, attack statistics, behavioral trends
    
Verisign
White Paper Published By: Arcserve     Published Date: May 29, 2015
The traditional taxonomy of data protection appliances – also known as Purpose Built Backup Appliances (PBBAs) – covers two primary categories: • Backup Appliances • Deduplication Appliances Let’s explore this taxonomy and market dynamics.
Tags : 
data protection appliances, purpose built backup appliances, deduplication, market dynamics, security
    
Arcserve
Webinar Published By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : 
data protection appliances, appliance adoption, arcserve, security, it management
    
Arcserve
White Paper Published By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : 
backup infrastructure, legacy systems, overload infrastructure, cloud, security
    
Arcserve
White Paper Published By: Aruba Networks     Published Date: May 27, 2015
Aruba Networks global security study, reveals that businesses are ill prepared for the new #GenMobile workforce; highlighting some alarming findings directly linked to user demographics, industry & geography. Download the report to determine best practices and your security risk.
Tags : 
global security, #genmobile workforce, user demographics, security risk, security
    
Aruba Networks
White Paper Published By: Aruba Networks     Published Date: May 27, 2015
The Internet of Things (IoT) is comprised of stationary and mobile devices and machines that we use to shape, harness, control, explore, and share the world around us. But how can you ensure that the decision making and business intelligence is secure and trusted? Download our IoT White Paper.
Tags : 
iot, stationary and mobile devices, business intelligence, trust-based internet, business-critical applications
    
Aruba Networks
White Paper Published By: Mimecast     Published Date: May 27, 2015
White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.
Tags : 
mimecast, migration, microsoft office 365, storage, cloud backup
    
Mimecast
White Paper Published By: IBM     Published Date: May 27, 2015
This white paper from a leading analyst, VDC Research, outlines some of the key opportunities and challenges facing companies that make the "things" that comprise the Internet of Things.
Tags : 
internet of things, product development, time to market, data analysis, security
    
IBM
White Paper Published By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : 
cybersecurity, misconfiguration, patch management, passwords, mobile devices
    
ThreatTrack Security
White Paper Published By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : 
phishing, next-generation malware, security, email, it management
    
ThreatTrack Security
White Paper Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense, it management
    
ThreatTrack Security
White Paper Published By: ThreatTrack Security     Published Date: May 21, 2015
Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.
Tags : 
advanced protection, cyberthreat, security, incident response team, threatsecure
    
ThreatTrack Security
White Paper Published By: ThreatTrack Security     Published Date: May 21, 2015
Download this white paper to learn how to add value through malware analysis.
Tags : 
malware, security threat, cyberattack, cyberthreat, malware analysis
    
ThreatTrack Security
Webinar Published By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : 
security challenges, mid-market security, cyber-extortion, cyberthreat, security
    
ThreatTrack Security
Webinar Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar to learn how to win the battle against Advanced Persistent Threats.
Tags : 
persistent threats, cyberattacks, security, data breach, it management
    
ThreatTrack Security
Webinar Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : 
targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity
    
ThreatTrack Security
Webinar Published By: ThreatTrack Security     Published Date: May 21, 2015
This presentation will look at the various motivations of attackers, explore why they don’t matter at the time of attack and focus on mitigation tactics as a way to best defend your organization.
Tags : 
threattrack, cyber security, attacks, protection, security
    
ThreatTrack Security
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.