Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 1776Sort Results By: Published Date | Title | Company Name
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
Today, defending your organization’s web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today’s modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
mobile, web properties, applications, infrastructure, network devices
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
dos, denial of service, netscaler, defense, network
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
mobile, web properties, applications, infrastructure, network devices
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
Many organizations are struggling with network infrastructure that is vastly outdated, and with the rise in cloud computing, the time to upgrade is now. Cloud-based network solutions for application delivery are a great way for businesses to ensure high levels of performance, security and flexibility. This guide explores two solutions that organizations use to build a network for today's evolving enterprise and how you can fully address cloud requirements for secure application delivery. Read now for this vital information on cloud networking!
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : 
mobile, web properties, applications, infrastructure, network devices
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Nov 10, 2014
Citrix is positioned in the Leaders Quadrant for Application Delivery Controllers for the eighth consecutive year: the Gartner Magic Quadrant Report focuses on vendor's ability to solve complex application deployment challenges. Don't miss this chance to learn from Gartner's independent research. — Read the report today!  Compliments of Citrix.
Tags : 
application, deployment, research, enterprise, data center
    
Citrix Systems
White Paper Published By: McAfee     Published Date: Nov 07, 2014
Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).
Tags : 
siem, big security data, segurança do big data, informações de segurança, ameaças avançadas
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 07, 2014
Saiba como é possível evitar ataques de rede utilizando uma plataforma de SIEM que combina dados históricos com dados em tempo real de origens de rede e políticas de segurança para oferecer contexto sobre o uso de aplicativos, comportamentos dos usuários e outras operações com o objetivo de produzir relatórios otimizados e mais precisos.
Tags : 
siem, sans, terminal, endpoint, rede
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 07, 2014
De acordo com o SANS Institute, a maioria das organizações está usando dados sobre eventos de segurança para detectar e monitorar comportamentos suspeitos, auxiliar em análises periciais, bem como cumprir os requisitos regulamentares e comprovar essa conformidade. Porém, fica difícil atingir essas metas de segurança com o número cada vez maior e a natureza sofisticada dos ataques. À medida que a disputa entre a segurança e os hackers continua, a McAfee conta com os recursos de que as empresas precisam para manter seus dados seguros e identificar ataques e vulnerabilidades. De acordo com o SANS, a força do McAfee ESM vem da sua facilidade de uso, da velocidade e da flexibilidade na definição de regras e correlações.
Tags : 
siem, armazenamento de dados, análise de eventos, ataques, análise pericial
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 07, 2014
Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas
    
McAfee
White Paper Published By: McAfee     Published Date: Nov 07, 2014
A conformidade e os riscos financeiros costumavam ser as principais preocupações que motivavam a adoção de uma postura de gerenciamento de segurança e riscos. Leia o whitepaper e saiba como, atualmente, gerenciar os riscos permite compreender uma quantidade maior de dados: varreduras de vulnerabilidades, registros de aplicações e bancos de dados, fluxos, registros de acesso e de sessões, alertas e análise de tendências.
Tags : 
arquitetura de segurança conectada, big security data, big data, gerenciamento de registros, gerenciamento de logs
    
McAfee
White Paper Published By: IBM     Published Date: Nov 05, 2014
IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, ibm threat protection, security, it security, protection system
    
IBM
White Paper Published By: IBM     Published Date: Nov 05, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, security, cyber security, business intelligence, financial services
    
IBM
White Paper Published By: IBM     Published Date: Nov 05, 2014
How security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, security, cyber security, business intelligence, financial services
    
IBM
White Paper Published By: IBM     Published Date: Nov 05, 2014
A security framework is a step-by-step approach to helping an organization move from meeting its basic security requirements to providing a fully security-optimized environment. Five types of frameworks address progressive steps in security maturity as needs and capabilities change.
Tags : 
ibm, cyber security, risk management, business threats, security framework
    
IBM
Webinar Published By: IBM     Published Date: Nov 04, 2014
Dominate trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amount of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.
Tags : 
it trends, virtual environments, core application, data protection, security
    
IBM
White Paper Published By: IBM     Published Date: Nov 04, 2014
This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.
Tags : 
ibm, security, risk, byod, safeguard
    
IBM
White Paper Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations
    
Intralinks
White Paper Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology
    
Intralinks
White Paper Published By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution that’s both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, it’s even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers’ Guide provides insight into the factors you should be considering, keepi
Tags : 
enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency
    
Intralinks
White Paper Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : 
byod, device discovery, data privacy, data security, it security
    
Kaspersky Lab
White Paper Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security.
Tags : 
it risk, risk report, it security, cyber attacks, security
    
Kaspersky Lab
White Paper Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Humorist Franklin P. Jones may have said it best: “When you get something for nothing, you just haven't been billed for it yet.” These are wise words of warning for businesses counting on so-called “free” IT security software.
Tags : 
it security software, business infrastructure protection, security, it management, knowledge management
    
Kaspersky Lab
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.