Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 1682Sort Results By: Published Date | Title | Company Name
White Paper Published By: OpenText     Published Date: Oct 01, 2014
Customer experiences have evolved tremendously over the years. Technology has made buyers smarter and more empowered; with online reviews and mobile web access, customers know more about a company's products, services, competitors, and pricing than the organization may know itself. Today's consumers expect tailored, engaging experiences and rich content delivered seamlessly across a variety of touch points.
Tags : 
opentext, cem, digital asset management, onmi channel, rich media
    
OpenText
White Paper Published By: Bit9     Published Date: Sep 30, 2014
As a retail security professional, you are challenged with maintaining a constant state of PCI compliance and keeping your infrastructure safe using best-of-breed security solutions that help, rather than hinder, your quest to validate your systems. Endpoint protection that is based on detecting known malware is demonstrably ineffective —and has the potential to create numerous inefficiencies across your organization. In addition, constant updating of security patches and antivirus software libraries can slow response times and leave endpoints vulnerable to APT attacks. Besides potential breaches of your customers’ personal information, as well as damage to your brand, a lack of endpoint control can also put you at risk for steep PCI noncompliance and regulatory penalties—fines that can range anywhere from $10,000 to $100,000 per month.
Tags : 
retail security, pci compliance, infrastructure security, endpoint protection, security
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 30, 2014
Recent high-profile data breaches at brand name retailers, highlight the need to protect your company’s reputation and your customer’s personal information. The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few.
Tags : 
data breach protection, it security, infrastructure protection, pci compliance, security
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 30, 2014
Retailers and other covered organizations face increasing pressure to not only comply with PCI DSS 3.0, but to also protect servers and endpoints from evolving security threats. This new white paper explains how a positive security solution can help you achieve both goals, and avoid the costs and risks of non-compliance and/or a security breach.
Tags : 
pci compliance, endpoint monitoring, dss security, security solutions, security
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 30, 2014
Most organizations must comply with multiple standards covering privacy, corporate financial data, Protected Health Information and credit card data. Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure. However, GRC requirements do not exist in a vacuum. Organizational objectives must also be supported. Critical functions can be disrupted if business needs are not considered when establishing compliance activities. In addition, providing evidence that the appropriate controls are in place and enforced is a requirement of any audit. Investing in selecting the right policies, controls and solutions leads to more successful audits and security that is more reliable.
Tags : 
security controls, risk compliance, it auditor, security, it management
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 30, 2014
This new eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.
Tags : 
it security, pci compliance, industry regulations, security solutions, security
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 30, 2014
For enterprises, relying on perimeter defenses as well as traditional endpoint protection is no longer suitable to combat today’s threats. There is a good reason for that, since solutions including signature-based antivirus have not kept pace in combating advanced threats or zero-day attacks leaving devices defenseless.
Tags : 
endpoint protection, server security, perimeter defenses, security
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 30, 2014
In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.
Tags : 
server security, virtual servers, data breaches, targeted attacks, security
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 30, 2014
In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.
Tags : 
data center security, server security, targeted attacks, data breaches, security
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 30, 2014
Regardless of how they initially enter the organization, most attackers today still aim to compromise internal servers to steal user credentials, steal sensitive data, and turn compromised servers into hosting platforms used to help attackers steal even more assets. This SANS whitepaper discusses the methodology of internal and external attacks on data center servers and the applications running on them. It also discusses why, even with our layers of security in place today, servers are still vulnerable, and how organizations can leverage application controls to permit what is known and trusted while denying everything else.
Tags : 
server security, platform protection, data center servers, server vulnerability, security
    
Bit9
White Paper Published By: Bit9     Published Date: Sep 30, 2014
In this whitepaper Microsoft MVP, Brien M Posey, outlines the mechanisms available to IT administrators in Windows 8.1 and Windows Server 2012 R2 looking to lock down endpoint devices and servers against advanced threats and why those measures alone are insufficient to ensure strong application control posture in your environment.
Tags : 
application control, endpoint devices, it administrators, application control, security
    
Bit9
White Paper Published By: CradlePoint     Published Date: Sep 30, 2014
While short outages are common, longer service disruptions – due to weather, human error or even squirrels – can be catastrophic, paralyzing business operations. Your organization can feel the consequences long after the connection has been repaired. This white paper explores the benefits of using 4G LTE as a back up solution to maximize revenue and minimize business risk downtime can have on your brand. You’ll learn how a 4G wireless solution has benefits over wired backup solutions for business continuity. Please download the whitepaper to learn more!
Tags : 
failover, security risks, crisis communications, security breaches, compromising customer data
    
CradlePoint
White Paper Published By: Foxit     Published Date: Sep 18, 2014
IT organizations are being asked do to more with less, as tight budgets get stretched ever tighter. Companies of all sizes are being challenged to find savings that can be reinvested in new money-saving or revenue-generating technologies. From storage to security, every cost is being scrutinized in the search for savings, yet many organizations overlook one area—document management—where significant savings can be readily had. Now is definitely the time to take a close look at your PDF solution, and ask a basic question: Can you get the same capabilities from new PDF solution but at much lower cost?
Tags : 
foxit, document management strategy, revenue generated technology, storage, security
    
Foxit
White Paper Published By: Arbor     Published Date: Sep 17, 2014
Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables
Tags : 
firewall, firewall protection, it security, cyber defense, security
    
Arbor
White Paper Published By: Arbor     Published Date: Sep 15, 2014
This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management
    
Arbor
White Paper Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure
    
Cisco
White Paper Published By: Cisco     Published Date: Sep 12, 2014
Adversaries spend 100 percent of their time finding weak links and using them to their advantage. And as the Internet of Things accelerates and our dependence on the connected environment continues to expand, so do opportunities for attackers. Download the Cisco 2014 Midyear Security Report to learn about the different types of vulnerabilities that exist in the systems we rely upon, including the Internet itself, and what can be done to reduce their number and impact.
Tags : 
adversaries, weak, link, internet, dependence
    
Cisco
White Paper Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize
    
Cisco
Webinar Published By: Bit9     Published Date: Sep 11, 2014
Enterprises are entering into a continuous state of compromise, and within this volatile risk market, consequences for organizations that fail to meet their regulatory security guidelines are feeling the pain all the way up the corporate ladder. Within this environment, traditional security controls are no longer sufficient to fully protect your organization. Therefore, IT risk and audit professionals need to understand that simply meeting compliance controls does not equal complete security coverage. By neglecting to pay attention to emerging advanced threat protection solutions and capabilities, a compliant company can still be a vulnerable one. Join Christopher Strand, senior director of compliance at Bit9 + Carbon Black, to understand: • The risks and liability organizations and auditors face by not going beyond compliance • How to meet and exceed compliance standards with emerging security controls • Evaluating emerging security controls within the IT audit process
Tags : 
bit9, pci, dss, security gaps, endpoint monitoring
    
Bit9
Webinar Published By: HP     Published Date: Sep 08, 2014
Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and security. When such a shift occurs, legacy servers rapidly become obsolete, dragging down enterprise productivity and agility. Fortunately, each new server shift also brings its own suite of enabling technologies, which deliver new economies of scale and entire new computational approaches. In this interview, long-time IT technologist Mel Beckman talks to HP Server CTO for ISS Americas Tim Golden about his take on the latest server shift, innovative enabling technologies such as software-defined everything, and the benefit of a unified management architecture. Tim discusses key new compute technologies such as HP Moonshot, HP BladeSystem, HP OneView and HP Apollo, as well as the superiority of open standards over proprietary architectures for scalable, cost-effect
Tags : 
servers, innovative, management, mobility, security
    
HP
White Paper Published By: Riverbed     Published Date: Sep 05, 2014
This white paper details the current challenges organizations face with respect to their evolving IT requirements, growing storage needs, and more extensive data protection requirements. It focuses on an expanding set of cloud-based storage offerings and the buying considerations of those who want to improve the data management metrics associated with data protection services such as backup and recovery. The paper also takes a closer look at the solutions offered by Riverbed Technology that allow organizations to integrate cloud-based storage withing solutions that address a growing set of data protection demands.
Tags : 
cloud, enterprise storage, data protection, it requirements, metrics
    
Riverbed
White Paper Published By: CradlePoint     Published Date: Sep 04, 2014
Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
Tags : 
security risks, crisis communications, security breaches, compromising customer data, security
    
CradlePoint
Case Study Published By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : 
soonr, cloud, sync and share, security, solutions
    
Soonr
White Paper Published By: Alert Logic     Published Date: Sep 03, 2014
As more organizations consider a move to the cloud, security remains a top concern. Learn how Alert Logic’s suite of security solutions are designed to provide infrastructure and application security and compliance through a cloud-native model that takes advantage of the AWS business model and elastic scaling capabilities.
Tags : 
alert logic, amazon web security solutions, aws business model, security
    
Alert Logic
White Paper Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.