Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 1427Sort Results By: Published Date | Title | Company Name
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security
    
Symantec
White Paper Published By: Onapsis     Published Date: Nov 24, 2014
Business-critical platforms such as SAP and Oracle have been in place for more than a decade, however a majority of firms using these applications currently have gaps in their security program. There are many reasons for these security gaps ranging from a reliance on generic security tools, to IT teams lacking complete understanding of how application platforms work. Securing Enterprise Applications, takes a focused look at the major facets in an enterprise application security program, and makes practical suggestions on how to improve efficiency and effectiveness of an organizations security program. This research paper discusses specific security and compliance use cases for large enterprise applications, highlight gaps, and explain some application-specific tools to address these issues. Securing Enterprise Applications spotlights common deficiencies with the core pillars of security controls and products.
Tags : 
platform security, application platforms, it security tools, enterprise application security, security
    
Onapsis
Webinar Published By: Onapsis     Published Date: Nov 19, 2014
Join Analyst & CTO of Securosis, Adrian Lane, and Julie Ford, SAP Security & Cybersecurity Subject Matter Expert for Broadhawk Consulting, for the archived presentation of “State of Enterprise Application Security.” During this presentation they covered current security challenges facing the SAP landscape, the need for business-critical application security, and what can be done to effectively secure SAP systems. This “no fluff” webcast will provided real-world views and discussions around SAP security challenges facing your organization and the best approach on how to build an enterprise application security program.
Tags : 
onapsis, security, enterprise application security, sap
    
Onapsis
Webinar Published By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : 
ibm, bluemix, cloud-computing, middleware, security
    
IBM
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security
    
Symantec
White Paper Published By: Nasuni     Published Date: Nov 19, 2014
In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices.
Tags : 
employee habits, corporate it systems, dropbox, it infrastructure, security
    
Nasuni
White Paper Published By: Actiance, Inc.     Published Date: Nov 13, 2014
The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!
Tags : 
actiance, gartner, magic quadrant, enterprise information archiving, cagr
    
Actiance, Inc.
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses the Office 365 platform, its applicability for organizations of all sizes, and the need for third-party solutions which complement the platform to maintain a strong security posture.
Tags : 
office 365, osterman research, security for office 365, security
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.
Tags : 
osterman research, cybercriminals, cybercrime, email-based malware, spearphishing
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This brief discusses how hybrid email protection can address your privacy concerns while still gaining the benefits of cloud-based email security.
Tags : 
hybrid email security, mcafee email protection, security, it management
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This infographic outlines the results of the McAfee Phishing Quiz.
Tags : 
mcafee email phishing quiz, email phishing, spear phishing, security, it management
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
Gartner recognizes McAfee as a visionary in the Gartner Magic Quadrant for Secure Email Gateways, as published on July 1, 2014.
Tags : 
gartner magic quadrant, secure email gateways, security, it management
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Secure Web Gateways.
Tags : 
gartner magic quadrant, secure web gateways, mcafee web gateway, advanced threat defense, security
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This white paper guides you through the pros and cons of direct vs. transparent proxies and makes recommendations that will help you secure your company and your users more effectively.
Tags : 
secure web gateway, direct or transparent proxy, security, it management
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This white paper describes a wide range of Internet-based attack methods and explains how Web Protection technology protects against them.
Tags : 
secure web gateway, web protection, gateway anti-malware engine, advanced threat defense, application control
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This paper characterizes web threats and explains why most security solutions in place today are ineffective.
Tags : 
web security, web protection, mcafee web gateway, mcafee saas web protection, mcafee data loss prevention
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 12, 2014
This report takes a look at the state of “shadow IT” in companies worldwide and reveals some surprising results.
Tags : 
shadow it, frost & sullivan, security, it management
    
McAfee
White Paper Published By: IBM     Published Date: Nov 05, 2014
IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, ibm threat protection, security, it security, protection system
    
IBM
White Paper Published By: IBM     Published Date: Nov 05, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, security, cyber security, business intelligence, financial services
    
IBM
White Paper Published By: IBM     Published Date: Nov 05, 2014
How security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, security, cyber security, business intelligence, financial services
    
IBM
White Paper Published By: IBM     Published Date: Nov 05, 2014
A security framework is a step-by-step approach to helping an organization move from meeting its basic security requirements to providing a fully security-optimized environment. Five types of frameworks address progressive steps in security maturity as needs and capabilities change.
Tags : 
ibm, cyber security, risk management, business threats, security framework
    
IBM
White Paper Published By: IBM     Published Date: Nov 04, 2014
This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.
Tags : 
ibm, security, risk, byod, safeguard
    
IBM
White Paper Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations
    
Intralinks
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.