Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 2325Sort Results By: Published Date | Title | Company Name
White Paper Published By: VMware     Published Date: Nov 12, 2015
Il y a moins d’un an, les prévisions des analystes avaient laissé croire aux fervents défenseurs de la mobilité qu’une catastrophe allait toucher de plein fouet le secteur de la gestion des terminaux mobiles. Lors d’un événement réservé aux analystes qui s’est tenu en 2013, un panel de spécialistes indiquait que l’utilisation des terminaux personnels allait aboutir à une réduction des prix et faire chuter les ventes. Ils annonçaient la mort de cette industrie. « La gestion des terminaux mobiles est actuellement totalement chaotique et je pense que ce marché est en train de mourir, » déclarait l’analyste Gartner John Girard (CRN.com). John Girard avait prédit une nouvelle orientation dans la gestion de terminaux personnels qui consiste à gérer uniquement les applications pour répondre à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware
White Paper Published By: VMware     Published Date: Nov 12, 2015
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware
White Paper Published By: VMware     Published Date: Nov 12, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen. Auf einer Veranstaltung im Jahr 2013 verkündete ein Ausschuss von Analysten, dass das BYOD-Phänomen (Bring Your Own Device) zu stark herabgesetzten Preisen führen würde, was wiederum Umsatzeinbußen und schlussendlich den Untergang der gesamten Branche zur Folge haben könnte. "Die Mobile Device Management-Branche befindet sich in einem chaotischen Zustand und ich denke, dieser Markt wird untergehen“, teilte Gartner-Analyst John Girard (laut Bericht von CRN.com) dem Publikum mit. Girard prognostizierte einen Trend zum Management auf Anwendungsebene, verursacht durch das BYOD-Phänomen und die ablehnende Haltung von Mitarbeitern gegenüber dem Management ihrer persönlichen Geräte.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware
White Paper Published By: RingCentral     Published Date: Nov 10, 2015
Many businesses feel the pain of living with a phone system that lacks the capabilities and flexibility to support rapid growth or business agility.
Tags : 
ringcentral, pbx, cloud system, location management, security
    
RingCentral
White Paper Published By: RingCentral     Published Date: Nov 10, 2015
This Network Guide explains the challenges, benefits, and unknowns of replacing dated technology.
Tags : 
ringcentral, network, cloud, voip, wireless
    
RingCentral
White Paper Published By: RingCentral     Published Date: Nov 10, 2015
Mobility and Bring Your Own Device (BYOD) have transformed the idea of a 9-to-5 workplace. Employees now check their email first thing in the morning and expect to stay connected whenever and wherever they go throughout the day.
Tags : 
ringcentral, cloud, phone system, mobile, workforce
    
RingCentral
White Paper Published By: Adobe     Published Date: Nov 10, 2015
Download this white paper to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, data security, mobile device, enterprise
    
Adobe
Webinar Published By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : 
ibm, document management, data security, productivity, enterprise
    
Adobe
White Paper Published By: Dyn     Published Date: Nov 10, 2015
Read this Gartner Research Report and learn why without properly functioning external DNS, Internet-based resources may "disappear" without warning.
Tags : 
dyn, dns, digital business, gartner, internet-based
    
Dyn
White Paper Published By: Okta     Published Date: Nov 09, 2015
Many companies believe Active Directory Federation Services (ADFS) is the best choice for applications to integrate with AD. After all, both Active Directory and ADFS are from Microsoft and ADFS is 'free,' so that should be the best choice, right? Not quite. Read this whitepaper and learn what to examine when integrating cloud applications to AD via ADFS.
Tags : 
okta, adfs, microsoft, active directory, hidden costs
    
Okta
White Paper Published By: Okta     Published Date: Nov 09, 2015
You’re moving towards Office 365 and you want true single sign-on and secure authentication using AD for users. Read this eGuide to learn the top three reasons to consider Okta instead of Microsoft’s ADFS.
Tags : 
okta, office 365, okta vs microsoft, adfs, secure authentication
    
Okta
White Paper Published By: Okta     Published Date: Nov 09, 2015
Today, 61% of North American and European enterprise information workers are choosing their smartphones for work either on their own or from a company-approved list. According to Forrester’s Business Technographics® Global Devices And Security Workforce Survey, 2014, 53% of employees are unwilling to make any kind of sacrifice to their user experience in the interest of heightened security. Read this report to learn more about the results.
Tags : 
okta, user identity data, mobile security, forrester's business technographics, security
    
Okta
White Paper Published By: Okta     Published Date: Nov 09, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits. Read this report to learn more.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders
    
Okta
White Paper Published By: Okta     Published Date: Nov 09, 2015
This Forrester report outlines the future IT environment for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. Read this report to learn more.
Tags : 
okta, forrester, identity and access management, it environment, security and risk
    
Okta
White Paper Published By: Vectra Networks     Published Date: Nov 05, 2015
Intrusion Detection Systems have ceased to live up to their name and have lost their ability to spot today’s sophisticated intrusions. Consequently, cyber attackers are taking advantage of it by launching more evasive and strategic threats that spread rapidly within networks. And security teams are left without the proper tools or insight to identify intrusions that pose the biggest risk.
Tags : 
intrusion detection systems, cyber attackers, sophisticated intrusions, intrusion detection, security
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss
    
Vectra Networks
White Paper Published By: EMC     Published Date: Nov 03, 2015
This white paper details how the EMC Isilon OneFS architecture provides high availability and data protection needed to meet the challenges organizations face as they deal with the deluge of digital content and unstructured data and the growing importance of data protection.
Tags : 
emc, data protection. isilon, nas, digital content, security
    
EMC
White Paper Published By: EMC     Published Date: Nov 02, 2015
Learn about Workload Awareness findings documented in a recent worldwide IDC survey of 683 enterprise IT decision makers.
Tags : 
emc, enterprise, hybrid, cloud, strategy
    
EMC
White Paper Published By: EMC     Published Date: Nov 02, 2015
Read IDC’s Flash Survey and learn about how the digital transformation for industries, governments and economies is based on the three key enterprise IT mega trends: the modernization of IT legacy; harnessing cloud, mobile, big data analytics and social business; and innovation acceleration.
Tags : 
emc, idc, flash, digital, enterprise
    
EMC
White Paper Published By: Tenable Network Security     Published Date: Oct 27, 2015
This Buyer’s Guide is for security professionals who are considering cloud-based solutions for cyber security, specifically for vulnerability management.
Tags : 
cloud-based solutions, cloud, security professionals, vulnerability management, business applications
    
Tenable Network Security
White Paper Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection
    
Venafi
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : 
mcafee, intel, security, virtual, cloud
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : 
mcafee, intel, security, windows, server
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
mcafee, intel, security, data, center
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
mcafee, intel, security, data, cloud
    
Intel Security
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.