Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 2251Sort Results By: Published Date | Title | Company Name
White Paper Published By: OpenDNS - now a part of Cisco     Published Date: Jun 20, 2016
Network (firewall) and endpoint (antivirus) defenses react to malicious communications and code after attacks have launched. Learning all the steps of an attack is key to understanding how OpenDNS can bolster your existing defenses.
Tags : 
security, best practices, prevention, antivirus
    
OpenDNS - now a part of Cisco
White Paper Published By: OpenDNS - now a part of Cisco     Published Date: Jun 20, 2016
How and why to consider adding new layers to your network security stack. See why Fortune 50 enterprises and small businesses are realizing the security multiplier effect by using DNS to complement existing security measures.
Tags : 
security, best practices, prevention, antivirus
    
OpenDNS - now a part of Cisco
Webinar Published By: OpenDNS - now a part of Cisco     Published Date: Jun 20, 2016
OpenDNS Investigate now includes threat intelligence about malware files from Cisco AMP Threat Grid. Now, you can easily pivot between domains, IPs and associated malware. Save time. Work smarter.
Tags : 
security, best practices, prevention, analysis, data
    
OpenDNS - now a part of Cisco
Webinar Published By: EMC Converged Platforms     Published Date: Jun 16, 2016
VxRail is aiding in Land Rover BAR’s quest for the America’s Cup.
Tags : 
data center, data application, network performance, data virtualization, optimization
    
EMC Converged Platforms
Webinar Published By: EMC Converged Platforms     Published Date: Jun 15, 2016
In this video, ESG analyst Colm Keegan discusses the new VCE VxRail. He explains the rationale for the product, where it fits in the VCE’s portfolio, and addresses the growing demand for HCI systems.
Tags : 
vce, esg, vxrail. hyper-converged, hci systems, security
    
EMC Converged Platforms
White Paper Published By: Flexera Software     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics
    
Flexera Software
White Paper Published By: SAS     Published Date: Jun 10, 2016
Understanding security analytics can be a daunting job. It is more than just analyzing log files but it is less than a full-blown information security platform. In fact, according to Anton Chuvakin, research vice president for security and risk management at Gartner, it is not yet even a “market,” but rather still just a ”concept” that has yet to define best practices.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
SAS
White Paper Published By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : 
mimecast, whaling, phishing, email attacks, email security
    
Mimecast
Webinar Published By: Mimecast     Published Date: Jun 02, 2016
Join Howard M. Cohen, Senior Resultant, Tech Channel Partners Results and Orlando Scott-Cowley, Cybersecurity Strategist, Mimecast for this webcast and hear from industry experts regarding the latest email phishing and whaling schemes penetrating the market and the steps needed to protect your employees and organization.
Tags : 
mimecast, phishing, whaling, internet security, email security
    
Mimecast
White Paper Published By: BitSight Technologies     Published Date: May 26, 2016
Does your organization have sensitive data stored across the globe? Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Tags : 
bitsight, data security, risk management, cybersecurity, vrm practices
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: May 26, 2016
With this guide, you’ll never have to wonder about that again. You’ll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management
    
BitSight Technologies
White Paper Published By: Verisign     Published Date: May 26, 2016
DDoS attacks can cripple your network, reduce productivity and decrease revenue. This quarterly report represents a unique view into the attack trends including attack statistics and behavioral trends.
Tags : 
verisign, service trends, ddos, behavioral trends, attack trends
    
Verisign
White Paper Published By: VMware     Published Date: May 18, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak.
Tags : 
data management, business practices, data center. data application, enterprise applications, security
    
VMware
White Paper Published By: SAP Ariba     Published Date: May 05, 2016
Executive Summary of the CFO.com Webinar
Tags : 
sap, ariba, e-payments, b2b, security
    
SAP Ariba
White Paper Published By: Rsam     Published Date: Apr 28, 2016
The University of Rochester Medical Center (URMC) is of the nation’s top academic medical centers. Their InfoSec team wanted to implement a program that could withstand constant shifts in regulatory requirements while protecting the sanctity of patient health information. Learn why the selected Rsam and the results of their successful implementation.
Tags : 
rsam, university of rochester, security incident response, successful implementation, security
    
Rsam
Webinar Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment, security
    
Rsam
Webinar Published By: Pluralsight     Published Date: Apr 27, 2016
Are you ready for AngularJS 2.0? How will this potentially major overhaul impact you and your business? In this on demand webinar, Pluralsight author Joe Eames will cover what’s different with 2.0, what’s staying the same and how you can begin experimenting with it today.
Tags : 
pluralsight, webinar, angularjs 2.0, joe eames, security
    
Pluralsight
Webinar Published By: Pluralsight     Published Date: Apr 27, 2016
In this webinar, security expert and Pluralsight author Troy Hunt shares 10 examples of recent online attacks, assesses what went wrong, and tells you how each system could have been built to be resilient to the attack. The lessons learned in this webinar will help you better secure your systems by learning from the mistakes of those who have gone before you.
Tags : 
network management, network secuirty, network optimization, prevention practices, business optimization
    
Pluralsight
White Paper Published By: Mimecast     Published Date: Apr 21, 2016
Download the new E-book, Email Security Uncovered: The Five Faces of IT Preparedness, to learn the latest trends in email security and tips on how you can boost your security confidence.
Tags : 
email, security, trends, cyber attacks, threats
    
Mimecast
White Paper Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats
    
Mimecast
White Paper Published By: IBM     Published Date: Apr 04, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, ibm bigfix, ibm security qradar, risk management, endpoint intelligence
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
ibm, ibm bigfix, risk management, data security, security
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x-force, ibm security portfolio, threat intelligence, security
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
Tolly Group evaluated the security and performance of the IBM Security Network IPS GX7800 vs. a standard signature-based platform.
Tags : 
ibm, ibm security network, ips gx7800, security, knowledge management
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, network protection, ibm security network protection, network security, security
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.