Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 1582Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Feb 24, 2015
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : 
ibm, data discovery, data classification, big data, risk mitigation
    
IBM
White Paper Published By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : 
bitsight technologies, security, cyber attacks, monitoring, third party security monitoring
    
BitSight Technologies
White Paper Published By: Bit9     Published Date: Feb 20, 2015
You can’t open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise. Bit9 + Carbon Black reached out to a series of experts to collect their thoughts and advice on dealing with data security incidents or breaches.
Tags : 
breach preparation, data breaches, bit9, it data security, security
    
Bit9
White Paper Published By: Bit9     Published Date: Feb 20, 2015
Businesses need to view security as a process and leverage solutions that can proactively collect data, apply aggregated threat intelligence, reduce the cost and complexity of incident response and evolve, adapt and learn from your investigation. This eGuide will cover how a continuous approach to response can resolve these challenges and put your organization in a better security posture by proactively preparing for a breach.
Tags : 
it threat intelligence, aggregated data, bit9, security solutions, incident response
    
Bit9
White Paper Published By: Bit9     Published Date: Feb 20, 2015
Most organizations have not proactively prepared for a breach. In fact, a majority of incident responders (52 percent) say they lack the necessary visibility into endpoint vulnerabilities. Without continuous data collection at the endpoint, preparing and responding to a breach is exponentially hampered. Download the SANS Institute’s latest industry survey to understand these key findings.
Tags : 
endpoint data, bit9, ir capabilities, siem integration tools, security
    
Bit9
White Paper Published By: Bit9     Published Date: Feb 20, 2015
With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.
Tags : 
advanced attacks, bit9, endpoint data, it threat intelligence, it security solutions
    
Bit9
White Paper Published By: Docusign     Published Date: Feb 19, 2015
La société américaine DocuSign, spécialiste des outils de signature électronique, permet des signatures numériques conformes aux normes de l'Union Européenne et va permettre à un plus grand nombre d’entreprises d’accéder plus vite aux avantages d’une activité 100% numérique avec des transactions dans le cloud rapides et sécurisées.
Tags : 
docusign sécurise, signature électronique, security
    
Docusign
Case Study Published By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation, security
    
F5 Networks Inc
White Paper Published By: F5 Networks Inc     Published Date: Feb 18, 2015
SSL is the set of cryptographic protocols that secure data in transit. Today SSL is often the only tool standing between your organization and the bad actors. Read this whitepaper to learn how your organization can properly embrace a higher security posture to protect SSL.
Tags : 
ssl, cryptographic protocols, data security, higher security posture, security
    
F5 Networks Inc
White Paper Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies, security
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : 
ibm security, access management solutions, mobile channel security, advanced threats, byod
    
IBM
White Paper Published By: Mimecast     Published Date: Feb 10, 2015
Download this whitepaper to learn 4 critical risks facing Microsoft Office 365 implementations.
Tags : 
mimecast, migration, microsoft office 365, data protection, storage
    
Mimecast
White Paper Published By: MaaS360 by Fiberlink     Published Date: Feb 09, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
ibm, fiberlink, mobile content management, mcm, enterprise mobility management
    
MaaS360 by Fiberlink
White Paper Published By: Windstream     Published Date: Feb 09, 2015
Windstream brings you the latest Nemertes report on how to use network security to create more business opportunities and remove stumbling blocks to progress.
Tags : 
windstream, solutions, smart, personalized, service
    
Windstream
White Paper Published By: Windstream     Published Date: Feb 09, 2015
The Path to Value in the Cloud, by Oxford Economics and Windstream, brings together the latest insights, tactics and strategies C-suite respondents are using to make the cloud work for them.
Tags : 
windstream, solutions, smart, personalized, service
    
Windstream
White Paper Published By: MaaS360 by Fiberlink     Published Date: Feb 09, 2015
The time to implement a mobile device management (MDM) strategy is now! But where should you begin? Download this guide to learn the 12 best practices of Mobile Device Management.
Tags : 
ibm, fiberlink, mobile device management, mdm, mobile
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Feb 05, 2015
Smart companies are realizing a vital part of any mobile device management strategy is to mitigate risk by sealing these security holes in document sharing and finding new ways to enhance information sharing across the enterprise in a secure and compliant manner.
Tags : 
mobile device management, mobile document sharing, risk mitigation, document security, byod
    
MaaS360 by Fiberlink
White Paper Published By: Symantec     Published Date: Feb 04, 2015
Seventy percent of Americans are seriously concerned about identity theft. More than two thirds of online shoppers don’t complete their purchase because of price. In the world of e-commerce, you need a targeted marketing strategy to ensure you’re offering customers the reassurance and guarantees they need to browse and buy confidently. Symantec’s Norton Shopping Guarantee gives you just that. Online stores are seeing a dramatic return on investment when they use it. For merchants and customers alike, it’s satisfaction guaranteed.
Tags : 
e-commerce, identity theft, targeted marketing strategy, reassurance and guarantee, return on investment
    
Symantec
White Paper Published By: IBM     Published Date: Feb 03, 2015
Find out how banks are increasing customer profitability, improving operational efficiency and managing risk more effectively with IBM Business Analytics software.
Tags : 
customer profitability, operational efficiency, business analytics, banking, risk management
    
IBM
White Paper Published By: IBM     Published Date: Feb 03, 2015
Learn how the IBM Customer Profitability solution can help banks maximize the value of their customer base by understanding the interconnected factors that influence profitability through a single, at-glance-view.
Tags : 
business analytics, customer profitability, customer base solutions, profitability analytics, customer lifecycle
    
IBM
White Paper Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.
Tags : 
risk management, security ratings, compliance mandates, executive reporting, security risk assessments
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Feb 03, 2015
In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.
Tags : 
security ratings, it risk mitigation, cyber risk, performance metrics, network security risk
    
BitSight Technologies
White Paper Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Cybersecurity Is Essential for M&A Due Diligence" to learn how Security Ratings can help you examine the risk your latest target poses to your information security (and potentially your bottom line).
Tags : 
cybersecurity, security ratings, acquistion target, cybersecurity assessment, information security
    
BitSight Technologies
Webinar Published By: BitSight Technologies     Published Date: Feb 03, 2015
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : 
cybersecurity, security risk, acquisition target, security ratings, risk-based conversations
    
BitSight Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.