Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 2260Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Oct 14, 2015
If you havenít looked at enterprise search technology in a while, itís time to give it another look. This report details their findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help application development and delivery (AD&D) professionals select the right solution to grace their enterprise with the power of knowledge on demand.
Tags : 
ibm, forrester, knowledge discovery solutions, big data, enterprise
    
IBM
White Paper Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how Ciscoģ Advanced Malware Protection (AMP) is the integrated solution that provides visibility into potential threat activity and the control to rapidly contain and remediate malware.
Tags : 
cisco, malware protection, amp, advanced malware protection, global threat intelligence
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 14, 2015
The report is divided into two main areas: Threat Intelligence, which gives an overview of the latest threat research from Cisco. And, Analysis and Observations, where security industry consolidation and the emerging concept of integrated threat defense is discussed.
Tags : 
cisco, security report, cisco security report 2015, threat intelligence, network defenses
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 14, 2015
Malware knows no boundaries. Neither should your advanced malware protection solution. Cisco offers the industryís broadest portfolio of Advanced Malware Protection (AMP) products available for all enforcement points in the extended network wherever threats can manifest: endpoints, network appliances, secure content gateways, mobile devices, and virtual environments.
Tags : 
cisco, malware protection, security, nss, malware protection solution
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how to seize new business opportunities by embedding security into the intelligent network infrastructure and across the extended network.
Tags : 
cisco, cisco security, digital economy, network infrastructures, network security
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 14, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a next-generation firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise.
Tags : 
cisco, nfgw, next generation firewall, enterprise management, network visibility
    
Cisco
White Paper Published By: IBM     Published Date: Oct 13, 2015
This e-book examines todayís enterprise threat landscape and introduces IBM Securityís new endpoint solution to help stop exploits & targeted attacks.
Tags : 
ibm, zero-day, enterprise, threat, security
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in todayís threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, threat, ciso, enterprise
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
How can your organization better prepare for a security incident?
Tags : 
ibm, x-force, threat intelligence, security, cybercriminal
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper focuses on how to respond to the inevitable incident.
Tags : 
ibm, cio, security, data, cybercriminal
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : 
ibm, soc optimization, it threat, soc, security operations center
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
What truly affects the cost of a data breach? Ponemon Instituteís latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, ponemon institute, jp morgan, global analysis
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, ibm managed security services, cyber security, data, threat
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
Understanding the Deep Web and how it can endanger your organization. This paper offers a high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P.
Tags : 
ibm, security, mainstream media, deep web, dark web
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
White paper describes how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
Tags : 
ibm, security intelligence, identity assurance, intelligent iam, boost compliance
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : 
ibm, continuous compliance, reduced risk, security, threat intelligence
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe cloud, information management, security
    
IBM
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
Up to 60% of all cloud deployments stall or fail during the implementation process. Donít let your business be one of them. Read this checklist to help identify your business needs and help the cloud hosting provider identify what services are best suited for your business to avoid a failed cloud.
Tags : 
cloud, hosting, managed hosting, managed cloud, migration
    
INetU Managed Hosting
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
We have created the Ultimate Guide to Understanding the Cloud to help you better decipher the many aspects of cloud computing. Download the eBook and understand what the cloud is and the various service and deployment models available to you.
Tags : 
cloud, hosting, managed hosting, disaster recovery, saas
    
INetU Managed Hosting
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
By moving to the cloud technology company, VIIAD, reduced its costs by 50%. Read this Cloud Computing article to see how you can do the same by learning the 6 lessons that were learned when moving applications to the cloud.
Tags : 
cloud, hosting, managed hosting, private cloud, roi
    
INetU Managed Hosting
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
The way attackers are going after corporate data and infrastructure these days means that itís not a matter of if, but when youíll be forced to buy a ticket for the post-breach rollercoaster. But a little preparation and planning can go a long way toward making the ride as manageable and inexpensive as possible. This eBook walks you through how to get started on planning and executing an incident response for your business.
Tags : 
data breach, cyber-attack, cloud, post-breach, breach
    
INetU Managed Hosting
White Paper Published By: IBM MaaS360     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
fiberlink, ciso, security, mobile, mobilephobia
    
IBM MaaS360
White Paper Published By: Cisco     Published Date: Oct 08, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.
Tags : 
security, cisco, hacking, malware, attackers
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats, security
    
Cisco
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.