Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 1798Sort Results By: Published Date | Title | Company Name
White Paper Published By: Sage     Published Date: Aug 31, 2015
An Essential Guide to Protecting Your Sales, Profits and Brand.
Tags : 
sage, emv payments, credit card processing, processing terminals, data security standards
    
Sage
White Paper Published By: Intralinks     Published Date: Aug 28, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations.
Tags : 
security, it management, knowledge management, data management
    
Intralinks
White Paper Published By: Intralinks     Published Date: Aug 28, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes.
Tags : 
security, it management, knowledge management, data management
    
Intralinks
White Paper Published By: Intralinks     Published Date: Aug 28, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin?
Tags : 
security, it management, data management
    
Intralinks
White Paper Published By: Internap     Published Date: Aug 26, 2015
This white paper will focus on public cloud Infrastructure-as-a-Service (IaaS), including virtual and bare-metal cloud solutions.
Tags : 
public cloud infrastructure, iaas, bare metal cloud solution, virtual cloud solution, cloud computing
    
Internap
White Paper Published By: Google     Published Date: Aug 26, 2015
La mobilità e il cloud oggi sono considerate le tecnologie più critiche per il luogo di lavoro. Trasformano inoltre il ruolo del CIO perché l'IT diventa un partner strategico per il business e passa da strumento per l'implementazione a motore.
Tags : 
workplace innovation, google for work, mobility, personal technology, security
    
Google
White Paper Published By: Entrust     Published Date: Aug 18, 2015
This is a guide about securing your website, online business or mail server.
Tags : 
best practics, security, vulnerabilities, ssl, tls
    
Entrust
White Paper Published By: Arcserve     Published Date: Aug 12, 2015
This survey provides insight into the Data Protection landscape across Asia Pacific. Most notably the results point to IT departments across APAC in a state of transition. While “legacy” methods for data protection are still heavily used, we see that a tipping point has been reached and in most instances the majority of users have moved to newer technologies in the data protection strategies.
Tags : 
data protection trends, arcserve, smb, data protection landscape, legacy data protection
    
Arcserve
White Paper Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : 
shadow it, hybrid cloud management, visibility, network security, cloud traffic
    
XO Communications
Case Study Published By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : 
gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy
    
XO Communications
Case Study Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : 
xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, security
    
XO Communications
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
security, it management
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology, security
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : 
mobile security, apps, cyber criminals, cyber security, trend micro
    
CDW-Trend Micro
Webinar Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : 
security solution, cyber attack, mobile devices, business security, user protection
    
CDW-Trend Micro
White Paper Published By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
The paper explores why security is being left behind or completely out of app development.
Tags : 
mobile applications, security, app development, mobile application insecurity
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.
Tags : 
app management, app security, privacy, data passing, mobile app
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
To maximize mobility, a nuanced strategy is the order of the day. For mobility’s transformative potential to be realized, IT needs to become a business partner that understands business drivers and then devises the technology roadmap to support everyone’s goals. Read this paper to learn more about mobility management.
Tags : 
enterprise mobility management, technology roadmap, mobile devices, security, it management
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
mobile device management, manufacturing, mobile devices, smartphone, tablet
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.
Tags : 
mobile device management, education, educators, students, app management
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
magic quadrant, enterprise mobility management, emm, mobility security, vendors
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
enterprise mobile management, emm, ibm, vendors, mobile management strategy
    
MaaS360 by Fiberlink
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.