Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 1619Sort Results By: Published Date | Title | Company Name
White Paper Published By: Bit9     Published Date: Aug 06, 2014
This eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.
Tags : 
bit9, pci, dss, security gaps, endpoint monitoring
    
Bit9
White Paper Published By: Bit9     Published Date: Aug 06, 2014
As a result of the recent spate of high-profile data breaches at brand name retailers, compromising credit and debit card and other personally identifiable information for hundreds of millions of consumers in the process, data security has become priority No. 1 for many retailers in 2014. And for good reason: The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few. With retailers recently testifying before Congress that they’re facing increasingly sophisticated threats from cyber criminals, and no end to those in sight, it’s become apparent that your company needs to implement strategies that will protect itself from a costly data breach. Here are 10 ways you can more easily achieve that goal while maintaining required PCI compliance (all of these tips fall within one of five buckets — visibility; asset control; enforcement; trust policy; advance measurement.)
Tags : 
bit9, pci, dss, security gaps, endpoint monitoring
    
Bit9
White Paper Published By: IBM     Published Date: Aug 06, 2014
Download here to learn how security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, insurance, reputational risk, security
    
IBM
White Paper Published By: IBM     Published Date: Aug 06, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, banking, business, fraud-prevention, fraud
    
IBM
White Paper Published By: IBM     Published Date: Aug 06, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
ibm, banking, cybercrime, prevention, solution
    
IBM
White Paper Published By: EMC Corporation     Published Date: Aug 05, 2014
Security operations centers need advanced analytical tools that can quickly collect and shift through security data. This brief looks at the latest options and processes to speed up detection of advanced threats.
Tags : 
security, analytics, threats, security operations centers, security data
    
EMC Corporation
White Paper Published By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : 
big data, data management, security threats, advanced analytics, security management
    
EMC Corporation
White Paper Published By: EMC Corporation     Published Date: Aug 05, 2014
Roland Cloutier, CISO of ADP, describes how the largest single payer in the US tax system leverages RSA Security Analytics as the foundation of their Trusted Platform Security Initiative.
Tags : 
case study, adp, best practices, security analytics, rsa
    
EMC Corporation
White Paper Published By: EMC Corporation     Published Date: Aug 05, 2014
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management
    
EMC Corporation
White Paper Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management
    
EMC Corporation
White Paper Published By: VSS Monitoring     Published Date: Aug 05, 2014
Learn how VSS Monitoring was able to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks and see how your organization can do the same thing.
Tags : 
security software, security integrity, high speed networks, upgrades, deployments
    
VSS Monitoring
White Paper Published By: Kaspersky Lab     Published Date: Jul 31, 2014
Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe. Download the whitepaper now to learn what you need to create a resilient infrastructure to guard against targeted attacks.
Tags : 
kaspersky, security, cyber attacks, cybersecurity, targeted attacks
    
Kaspersky Lab
White Paper Published By: Symantec     Published Date: Jul 30, 2014
This Symantec paper shows how SSL technology can help a start-up build its business online.
Tags : 
ssl technology, start up security, case study, symantec, norton
    
Symantec
White Paper Published By: Symantec     Published Date: Jul 30, 2014
A survival guide by Symantec to help beat cybercrime.
Tags : 
cybercrime, survival guide, beating cybercrime, symantec guide, security
    
Symantec
White Paper Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats
    
Symantec
White Paper Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec
White Paper Published By: Symantec     Published Date: Jul 30, 2014
A survival guide by Symantec to help beat cybercrime.
Tags : 
cybercrime, survival guide, beating cybercrime, symantec guide, security
    
Symantec
White Paper Published By: Symantec     Published Date: Jul 30, 2014
A paper on 6 things that can kill your website and how to stop them.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec
White Paper Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats
    
Symantec
White Paper Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec
White Paper Published By: Symantec     Published Date: Jul 30, 2014
A survival guide by Symantec to help beat cybercrime.
Tags : 
security
    
Symantec
White Paper Published By: Soonr     Published Date: Jul 30, 2014
Soonr takes a holistic approach towards security, incorporating a variety of structures and mechanisms at various layers within the Soonr service architecture. The following descriptions convey the breadth and depth of security considerations that have become a cornerstone of the Soonr Workplace service.
Tags : 
soonr, security architecture guide, security, workplace service, it management
    
Soonr
White Paper Published By: Soonr     Published Date: Jul 30, 2014
Today’s worker is more mobile than ever. As a result, practices for file sharing and document collaboration have changed dramatically over the past year. This study examines how mobility affects today’s workplace including the devices used to access business files, how files are being accessed, and from where.
Tags : 
soonr, mobile, workers, employees, mobility
    
Soonr
White Paper Published By: Symantec     Published Date: Jul 30, 2014
A paper on 6 things that can kill your website and how to stop them.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec
White Paper Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats
    
Symantec
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.