Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 2238Sort Results By: Published Date | Title | Company Name
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
The way attackers are going after corporate data and infrastructure these days means that it’s not a matter of if, but when you’ll be forced to buy a ticket for the post-breach rollercoaster. But a little preparation and planning can go a long way toward making the ride as manageable and inexpensive as possible. This eBook walks you through how to get started on planning and executing an incident response for your business.
Tags : 
data breach, cyber-attack, cloud, post-breach, breach
    
INetU Managed Hosting
White Paper Published By: IBM MaaS360     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
fiberlink, ciso, security, mobile, mobilephobia
    
IBM MaaS360
White Paper Published By: Cisco     Published Date: Oct 08, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.
Tags : 
security, cisco, hacking, malware, attackers
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats, security
    
Cisco
Webinar Published By: IBM     Published Date: Oct 08, 2015
This 30-minute webcast is about analytics because without end-to-end analytics, organizations have little to no insight into what’s really happening with their mobile apps.
Tags : 
ibm, mobile, security, app, analytics
    
IBM
White Paper Published By: IBM     Published Date: Oct 08, 2015
Download the white paper now and learn how to make your network "Ready for Mobile."
Tags : 
ibm, mobilefirst, network, security, data
    
IBM
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
ibm, fiberlink, app security, mobile application, app development
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
This discusses the unique risks associated with mobile devices and capabilities to consider when building their road map to a secure mobile enterprise.
Tags : 
ibm, fiberlink, maas360, mobile, enterprise
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : 
ibm, fiberlink, maas360, mobile, malware
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
ibm, mobile, financial services, device management, android
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
ibm, retail, mobile device management, data security, android
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
ibm, fiberlink, maas360, android, google
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : 
ibm, fiberlink, maas360, apple, ios
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
ibm, fiberlink, maas360, forrester, mobile
    
IBM MaaS360
White Paper Published By: Thawte     Published Date: Oct 06, 2015
The cost of cybercrime in the UK has reached a staggering £27bn – but what’s the actual threat to your business? From data breaches, phishing and spam, to identity theft, malware and vulnerabilities - learn how they can damage your business and the steps you can take to protect yourself.
Tags : 
cybercrime, business threats, phishing and spam, identity theft, security
    
Thawte
White Paper Published By: Thawte     Published Date: Oct 06, 2015
40% der deutschen Unternehmen sind in den vergangenen zwei Jahren Opfer von Internetkriminalität geworden. Doch wie genau wird Ihr Unternehmen bedroht? Von Datenlecks, Phishing und Spam bis hin zu Identitätsdiebstahl, Malware und Schwachstellen: Informieren Sie sich über die möglichen Auswirkungen dieser Bedrohungen auf Ihr Unternehmen und geeignete Schutzmaßnahmen in unserem neuen Leitfaden von Thawte.
Tags : 
cybercrime, business threats, phishing and spam, identity theft, security
    
Thawte
White Paper Published By: Thawte     Published Date: Oct 06, 2015
Au Royaume-Uni, le coût de la cybercriminalité a atteint le chiffre record de 27 milliards de livres. Mais quelle est la menace réelle pour votre entreprise? Violations de données, usurpation d’identité, phishing, spams, malwares, vulnérabilités... découvrez l’ampleur du risque et les mesures à prendre pour vous protéger.
Tags : 
cybercrime, business threats, phishing and spam, identity theft, security
    
Thawte
White Paper Published By: Thawte     Published Date: Oct 06, 2015
Domain Validation (DV), Organisation Validation (OV) and Extended Validation (EV) SSL certificates offer completely different levels of authentication - but what does that mean? The right certificate for you depends on your business type and what you are using the certificate for. To discover which level of validation wins for your needs, download our quick reference guide now.
Tags : 
domain validation, organisation validation, extended validation, ssl certificates, levels of authentication
    
Thawte
White Paper Published By: Thawte     Published Date: Oct 06, 2015
SSL-Zertifikate mit Domänenvalidierung (DV), Unternehmensvalidierung (OV) und Extended Validation (EV) bieten völlig unterschiedliche Validierungsniveaus – aber was heißt das genau? Welches Zertifikat für Sie das Richtige ist, hängt von Ihrem Unternehmen ab und wofür Sie es verwenden wollen. Laden Sie jetzt unsere Kurzübersicht herutner, um zu erfahren, welches Validierungsniveau für Sie das beste ist.
Tags : 
domain validation, organisation validation, extended validation, ssl certificates, levels of authentication
    
Thawte
White Paper Published By: Thawte     Published Date: Oct 06, 2015
Les certificats SSL de validation de domaine (DV), d’entité (OV) et étendue (EV) offrent des niveaux d’authentification complètement différents. Mais comment cela se traduit-il dans les faits En pratique, le certificat adapté à vos besoins dépendra de votre type d’activité et de l’utilisation que vous en ferez. Pour découvrir le niveau de validation qu'il vous faut, téléchargez vite notre guide de référence rapide.
Tags : 
domain validation, organisation validation, extended validation, ssl certificates, levels of authentication
    
Thawte
White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
ibm, zero trust model, zero trust, information security, intrusion prevent systems
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security
    
IBM
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.