Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 1525Sort Results By: Published Date | Title | Company Name
White Paper Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To comply with todayís government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, rackspace, log management, automated log management, pci
    
Alert Logic and Rackspace
White Paper Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industryís only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches
    
Alert Logic and Rackspace
White Paper Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : 
alert logic, rackspace, pci, dss, compliance
    
Alert Logic and Rackspace
White Paper Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security
    
Alert Logic and Sungard Availability Services
White Paper Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, sungard, pci, pci dss, payment security
    
Alert Logic and Sungard Availability Services
White Paper Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To comply with todayís government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, sungard, log management, automated log management, pci
    
Alert Logic and Sungard Availability Services
White Paper Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industryís only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches
    
Alert Logic and Sungard Availability Services
White Paper Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : 
alert logic, sungard, pci, dss, compliance
    
Alert Logic and Sungard Availability Services
White Paper Published By: Cyveillance     Published Date: Jun 20, 2014
In todayís ever-evolving business world, cyber security is becoming more important than ever to prevent against malicious attacks and the loss of intellectual property and data. In this whitepaper, we review the trends that shaped the Information Security threat landscape in 2013, including DDoS attacks, data breaches, insider threats, as well as the outlook for 2014 and beyond. Learn how you can protect your business with recommendations to reduce the risks from these ongoing issues.
Tags : 
cyveillance, security, attacks, security threats, cybercriminals
    
Cyveillance
White Paper Published By: Cyveillance     Published Date: Jun 20, 2014
Learn how cyber criminals are adapting to the newest mobile technologies, and how they have figured out how to create ďrogueĒ applications that leverage a brandís logo, slogan, or other intellectual property to commit fraud, theft or other crime.
Tags : 
cyveillance, mobile apps, cyber security, mobile security, cyber criminals
    
Cyveillance
White Paper Published By: NETIQ     Published Date: Jun 20, 2014
Recently, industry analysts have focused on new authentication methods; however, maybe passwords arenít dead. In todayís world, passwords are still a big part of life but resetting them still drains the life from IT productivity. Slay that monster.
Tags : 
netiq, passwords, enterprise security, username, password
    
NETIQ
White Paper Published By: NETIQ     Published Date: Jun 20, 2014
CyberEdge provides insight on both the current state of cyberthreat defense and projections for the future.
Tags : 
netiq, cyberthreat, cyberedge, cyber security, cyberthreat
    
NETIQ
White Paper Published By: NETIQ     Published Date: Jun 20, 2014
Contractors entail a unique challenge for businesses and for IT. Theyíre necessary, but provisioning them correctly and deprovisioning them at the right time is difficult. Read this paper to learn to minimize risk and streamline provisioning for contractors and others.
Tags : 
netiq, it contractors, security, enterprise security, risk issues
    
NETIQ
White Paper Published By: NETIQ     Published Date: Jun 20, 2014
On the one hand, you have the increased productivity that goes along with BYOD. On the other hand, you have all the security risks and usersí concerns about giving IT visibility or control of a personal device. Learn how to solve this puzzle.
Tags : 
netiq, byod, mobile access, autonomy, privacy
    
NETIQ
White Paper Published By: NETIQ     Published Date: Jun 20, 2014
Having identity and access management solutions is a must these days. But what happens when someone gets around your solution?
Tags : 
netiq, api, hijacking, cyberthreats, insider credentials
    
NETIQ
White Paper Published By: Symantec Corporation     Published Date: Jun 18, 2014
Compliance is a fast-moving target, and itís getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards. Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 18, 2014
This white paper will present the lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, why poor management is potentially dangerous to the enterprise, and how the right SSL certificate management tool can help enterprises keep track of and manage SSL certificates more effectively.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 18, 2014
This guide provides five simple steps for IT professionals to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates throughout their lifecycle.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 18, 2014
"Although many IT professionals believe that using self-signed SSL certificates can help their organizations lower security costs, the real numbers tell a different story. From data center infrastructure and physical security, to the hardware and software required, to the personnel needed to manage the certificate lifecycle, the true costs of self-signed SSL security can become very expensive, very fast. This paper explores the true total cost of ownership (TCO) for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. Before a company decides to use self-signed certificates, these issues deserve careful consideration."
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 18, 2014
Web-based systems are essential tools for running business processes and delivering services to customers. However, phishing and online fraud undermine customer confidence. In addition, Web security remains a top concern because of constantly evolving threats. Learn more about mitigating these web security risks with SSL Certificates in this IDC Technology Spotlight white paper
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 18, 2014
Information security professionals who want to want to understand how to protect their systems from Heartbleed vulnerability should read this paper!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
White Paper Published By: distilnetworks     Published Date: Jun 13, 2014
In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.
Tags : 
block bot, block bots, data protection, distil networks, online trust
    
distilnetworks
White Paper Published By: Alert Logic     Published Date: Jun 12, 2014
Alert logicís cloud-powered solutions help organizations that process, store or transmit credit card data eliminate the burden of PCI compliance. This product brief outlines Alert Logicís solutions and the unique benefits offered.
Tags : 
pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic
White Paper Published By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : 
cloud security, vulnerability management, vulnerabilities, patching, patch management
    
Alert Logic
White Paper Published By: Alert Logic     Published Date: Jun 12, 2014
In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is not whether the cloud is part of their infrastructure plans, but which applications and workloads to move to the cloud and when. But even as the benefits of cloud and hosted models have become apparent, concerns persist about security, and an assumption lingers that the cloud is inherently less secure than an enterprise data center environment.
Tags : 
cloud security, public cloud, amazon web services, cloud pci, secure cloud
    
Alert Logic
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.