Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 1358Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Oct 14, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, it security, resilience investments, enhanced brand value, security
    
IBM
White Paper Published By: Centrify Corporation     Published Date: Oct 13, 2014
The amount of apps, passwords, and identities that your employees need to manage every day can really stunt productivity. IT doesn’t like it either. After all, they’re just trying to ensure the security of your enterprise but they’re often burdened with password retrieval activities when they could be focused on more value-added tasks. Because your employee have work to do, and they’re suffering from password fatigue, they resort to using passwords that circumvent security practices—inviting hackers into your enterprise data. Solutions to solve the problem are often cumbersome making a complicated problem…well, more complicated.
Tags : 
service solution, it productivity, idaas, security practices, password fatigue
    
Centrify Corporation
White Paper Published By: CenturyLink     Published Date: Oct 10, 2014
Doing Big Data and NoSQL in the public cloud sounds great, but at some point, someone has to write a check to make it happen. Is there a strong financial argument for making this move? Can you start small and grow larger easily? This paper answers this question with a detailed Total Cost of Ownership (TCO) analysis for open source data management in the public cloud. Contrasting cloud deployments on the standard vs hyperscale CenturyLink Cloud stack Powered by Intel Cloud Technology, versus the on-premise analogue, the paper models the relative financial merits of each approach. The paper considers the best potential use cases for on-premise versus cloud and walks through an example use case to show the impact to business outcomes (time to results, cost, TCO). Cost factors compared include:
Tags : 
total cost ownership, big data, public cloud, security, protection
    
CenturyLink
White Paper Published By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
identity access management, dynamic iam solution, public-facing, secure, business enabler
    
ForgeRock
White Paper Published By: IBM     Published Date: Oct 07, 2014
A comprehensive study by Solitaire Interglobal Ltd. (SIL) on the business impact of security incursions in today's IT environment. This ground-breaking research, based on 64,200 client data points explores how the vulnerabilities in today's virtualized, internet-connected, cloud-oriented environment can affect your businesses.
Tags : 
ibm, security, cloud, cloud security, solitaire interglobal
    
IBM
White Paper Published By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : 
damballa, frost and sullivan, network based threats, detection, advanced threats
    
Damballa
White Paper Published By: Damballa     Published Date: Oct 03, 2014
The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence
Tags : 
damballa, esg lab, hp tippingpoint, arcsight, network security
    
Damballa
White Paper Published By: Damballa     Published Date: Oct 03, 2014
Damballa’s Q2 2014 “State of Infections” report discussed the state of the enterprise under attack and trends in threats seen in the second quarter of 2014. Key findings include: • The rise of ransomware • The relationship between the size of an enterprise and its infection rate.
Tags : 
damballa, state of infection, enterprise, attacks, reduce risk
    
Damballa
White Paper Published By: Damballa     Published Date: Oct 03, 2014
In this paper, the SANS Institute reviews how Damballa Failsafe can be the last line of defense to alert you when devices have been compromised. • Eight detection engines produce fidelity in True Positives • Risk engines priorities response to infections that matter most
Tags : 
damballa, advanced threats, failsafe, true positives, risk engines
    
Damballa
White Paper Published By: Singlehop     Published Date: Oct 01, 2014
DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.
Tags : 
ddos attacks, it security, data breaches, security, it management
    
Singlehop
White Paper Published By: Singlehop     Published Date: Oct 01, 2014
As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.
Tags : 
cloud security, infrastructure threats, security data, chp infrastructure, security
    
Singlehop
White Paper Published By: OpenText     Published Date: Oct 01, 2014
Interactions with technology and customers have evolved to new heights. Organizations that create a rich and consistent digital presence across many channels will thrive in the global marketplace. The challenge is to extract value from managed content, optimize, and personalize that content delivery, and bridge the chaotic interactive world with the secure data repositories that reside behind the firewall. In today's customer-centric era, brands must deliver compelling and engaging experiences fueled by a contextual understanding of their global customers, all while adhering to established information governance policies and standards.
Tags : 
opentext, cem, omni-channel, adaptive content, secure data
    
OpenText
White Paper Published By: OpenText     Published Date: Oct 01, 2014
Customer experiences have evolved tremendously over the years. Technology has made buyers smarter and more empowered; with online reviews and mobile web access, customers know more about a company's products, services, competitors, and pricing than the organization may know itself. Today's consumers expect tailored, engaging experiences and rich content delivered seamlessly across a variety of touch points.
Tags : 
opentext, cem, digital asset management, onmi channel, rich media
    
OpenText
White Paper Published By: Sourcefire, LLC     Published Date: Sep 30, 2014
Download this infographic today to gain a better understanding of integrated threat defense and the visibility to discover and protect against socially engineered exploits.
Tags : 
cisco, sourcefire, network security, integrated threat defense, big data analysis
    
Sourcefire, LLC
White Paper Published By: Sourcefire, LLC     Published Date: Sep 30, 2014
As threats continue to penetrate networks, organizations need to find new ways to defend against them. NSS Labs recently conducted the most rigorous next-generation firewall (NGFW) testing to date. Cisco ASA with FirePOWER Services excelled as compared to other tested products. Download this Data Sheet now to find out how Cisco ASA with FirePOWER Services excels in NSS Labs Testing.
Tags : 
cisco, sourcefire, network security, firewall security, next-generation firewall
    
Sourcefire, LLC
White Paper Published By: Sourcefire, LLC     Published Date: Sep 30, 2014
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.
Tags : 
cisco, sourcefire, network security, threat centric, security model
    
Sourcefire, LLC
White Paper Published By: Foxit     Published Date: Sep 18, 2014
IT organizations are being asked do to more with less, as tight budgets get stretched ever tighter. Companies of all sizes are being challenged to find savings that can be reinvested in new money-saving or revenue-generating technologies. From storage to security, every cost is being scrutinized in the search for savings, yet many organizations overlook one area—document management—where significant savings can be readily had. Now is definitely the time to take a close look at your PDF solution, and ask a basic question: Can you get the same capabilities from new PDF solution but at much lower cost?
Tags : 
foxit, document management strategy, revenue generated technology, storage, security
    
Foxit
White Paper Published By: Centrify Corporation     Published Date: Sep 16, 2014
A single, unified solution for managing Macs and mobile devices, Centrify User Suite, Mac Edition, helps you meet the challenges of consumerization and an increasingly mobile workforce. While most solutions require setup of a parallel infrastructure for managing Macs, Centrify provides seamless, centralized management of Macs from Active Directory, letting your IT department leverage existing expertise, tools and processes. By managing user identity and authentication in Active Directory, Centrify User Suite, Mac Edition, extends Group Policy-based security management to Mac and mobile users. In addition, the solution supports smart-card login to Active Directory by Mac users. Your employees reap the rewards that come with effortless access to information, applications and services. And the enterprise benefits from a unified, integrated management solution that maximizes security, streamlines operations and reduces cost.
Tags : 
parallel infrastructure, enterprise, centralized management, user identity and authentication, active directory
    
Centrify Corporation
Case Study Published By: Sourcefire, LLC     Published Date: Sep 10, 2014
Maintaining a standard software configuration for all workstations across its organization has been a challenge for this large, multinational manufacturer, who runs each location as an independent unit. Recently, the company decided to launch a new security program to better protect its 16,000 workstations from malware infection. Since the existing endpoint protection software wasn’t offering enough information for security analysts to understand questionable events, as well as to distinguish routine activity from potential threats, the company’s security operations team chose to implement a new anti-malware solution. With the deployment of Sourcefire’s FireAMP, the company’s security analysts now have greater visibility into endpoint activity, and can quickly identify and contain suspicious events before workstations become infected. This has both increased employee productivity and has allowed the team to better protect critical corporate data.
Tags : 
cisco, sourcefire, network security, spot threats, fireamp
    
Sourcefire, LLC
Webinar Published By: HP     Published Date: Sep 08, 2014
Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and security. When such a shift occurs, legacy servers rapidly become obsolete, dragging down enterprise productivity and agility. Fortunately, each new server shift also brings its own suite of enabling technologies, which deliver new economies of scale and entire new computational approaches. In this interview, long-time IT technologist Mel Beckman talks to HP Server CTO for ISS Americas Tim Golden about his take on the latest server shift, innovative enabling technologies such as software-defined everything, and the benefit of a unified management architecture. Tim discusses key new compute technologies such as HP Moonshot, HP BladeSystem, HP OneView and HP Apollo, as well as the superiority of open standards over proprietary architectures for scalable, cost-effect
Tags : 
servers, innovative, management, mobility, security
    
HP
White Paper Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
Not everyone loves a good story. Shocking media reports about intentionally-leaked classified information have commanded the public’s attention in recent years, but they are certainly not entertaining to those of us responsible for safeguarding the data. Clearly we can do more to better protect our nation’s federal agencies and classified information. What’s needed is a threat-centric approach to security that lets agencies and department leaders tackle the most pressing issues first with superior visibility, continuous control, and advanced threat protection – to defend against both insider and external threats.
Tags : 
sourcefire, network security, cisco, security report, cyber attack
    
Sourcefire, LLC
White Paper Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure. These advanced attacks are very difficult to detect, remain in networks for long periods of time, and amass network resources to launch attacks elsewhere. Traditional methods that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum – before, during, and after an attack.
Tags : 
sourcefire, cisco, security report, cyber attack, malware
    
Sourcefire, LLC
White Paper Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
This Advanced Endpoint and Server Protection paper will dig into protecting devices against advanced attackers. We will highlight a number of new alternatives for preventing and detecting advanced malware, and examine new techniques and tools to investigate attacks and search for indicators of compromise within your environment.
Tags : 
securosis, sourcefire, cisco, endpoint protection, server protection
    
Sourcefire, LLC
Case Study Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
Making threat protection more intelligent and more accurate
Tags : 
network security, sourcefire, cisco, security report, cyber attack
    
Sourcefire, LLC
White Paper Published By: Sourcefire, LLC     Published Date: Sep 04, 2014
The goal of this paper is to give security managers information to facilitate focusing their investments on the areas that are mostly likely to impact their organizations and customers over the next several years.
Tags : 
cisco, network security, sourcefire, security report, cyber attack
    
Sourcefire, LLC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.