Compliance Week
> Research Library > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 376 - 400 of 2277Sort Results By: Published Date | Title | Company Name
White Paper Published By: Resilient Systems, Inc.     Published Date: Nov 25, 2015
How does your business’s cyber resilience compare to other European organisations?
Tags : 
resilient, incident response, enterprise, security, enterprise applications
    
Resilient Systems, Inc.
White Paper Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
It’s practically impossible to be completely prepared for a security incident – invariably something happens that best laid plans don’t address. But that doesn’t mean organizations shouldn’t try.
Tags : 
resilient systems, cyber security, incident response, plan, guide
    
Resilient Systems, Inc.
White Paper Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
Maintaining a discipline of strong cybersecurity has become increasingly difficult at enterprise organizations.
Tags : 
resilient systems, incident response, platform, cybersecurity, security
    
Resilient Systems, Inc.
White Paper Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
With cyber attacks growing increasingly frequent and complex, cybersecurity strategies are shifting: while prevention is still important, it is more about prevailing.
Tags : 
resilient systems, threat, cybersecurity, security, data center
    
Resilient Systems, Inc.
White Paper Published By: Box     Published Date: Nov 24, 2015
Organizations are struggling to ensure their content is appropriately secure, while remaining easily searchable, accessible and shareable both inside and outside of the enterprise.
Tags : 
box, business, enterprise, information governance, content
    
Box
White Paper Published By: Box     Published Date: Nov 24, 2015
One of the biggest problems with any organization is complete alignment among all teams. A lot of this breakdown is due to outdated methods of sharing important documents and information. Teams function best when they are able to access and collaborate on critical documents, presentations and files. Download this whitepaper to learn the top five ways any business can benefit from Box and see how it will allow your organization to operate faster across all departments to ensure everyone is aligned while driving growth to maintain security of your files to keep your projects running smoothly.
Tags : 
sharing documents, driving growth, maintain security, sharing files, security
    
Box
White Paper Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs, security
    
Box
White Paper Published By: Box     Published Date: Nov 24, 2015
Breakthroughs in collaboration technology are helping companies of all sizes foster engagement with employees, customers, and partners. However, some organizations are still struggling to align all facets of their organization and as a result misalignment between teams is still a likely scenario. Download this whitepaper to learn how online collaboration can help push productivity in order to allow your organization a competitive edge as a result of increased productivity and a positive return-on-investment.
Tags : 
collaboration technology, customer engagement, productivity, competitive edge, return on investment
    
Box
Case Study Published By: Brother     Published Date: Nov 23, 2015
Read this case study to learn how Night Nurse used a Brother system to increase efficiency to handle more practices and patients, enabling expansion from a local, Massachusetts-only business to operating in 33 states.
Tags : 
brother, efficiency, expansion, scalability, printer
    
Brother
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : 
intralinks, mwd, volterra fietta, goldilocks zone, security
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel.
Tags : 
kuppingercole, information sharing, security, data, intralinks
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
Use this guide to clarify the process, and move toward the right solution.
Tags : 
enterprise, intralinks, collaboration, security, data
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
intralinks, security, data, threat
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory
    
Intralinks
White Paper Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management
    
Intralinks
White Paper Published By: Evident.io     Published Date: Nov 19, 2015
Evident.io has a significant head start in this nascent corner of the cloud security space. Besides addressing a critical portion of the cloud's attack surface that isn't well covered by other vendors yet, Evident.io has built a platform that transcends the niche it currently addresses. The API/SDK consumption capabilities, data analytic and user workflow portions of the company's Evident Security Platform are valuable assets that it can leverage to grow into other areas in the future.
Tags : 
evident, cloud security, security platforms, datacenter, firewalls
    
Evident.io
White Paper Published By: Evident.io     Published Date: Nov 19, 2015
This report will help IT executives and development teams understand the new approaches to security required in a continuous deployment environment.
Tags : 
evident, security, continuous deployment environment, dev ops approach, it management
    
Evident.io
White Paper Published By: Cisco     Published Date: Nov 18, 2015
The Internet of Everything (IoE) is a continuous interaction among people, processes, data, and things. Sensors, networks, and smart devices are ubiquitous, providing a torrent of streaming data or big data. The Internet of Things (IoT), which is a network of physical objects accessed through the Internet that can sense and communicate, is a component of IoE. Cisco is helping customers and strategic partners leverage the full potential of IoE to achieve radical results across all sectors and industries. Indeed, IoE is capable of helping public safety and justice agencies increase cost efficiency, improve safety and security, provide better response times, and increase productivity.
Tags : 
ioe, public safety, justice, emergency response, networking
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : 
cisco, public safety, disaster response, networking, security
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 18, 2015
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget. You might be wondering how things could get so complicated so quickly. But as an IT professional, you are nodding your head, because it all sounds very familiar.
Tags : 
cisco, network, business growth, virtual network, security
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 18, 2015
This e-book describes a hypothetical company, referred to as NeedToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book presents a summary of the key components of some of the emerging approaches to WAN architecture and design amd concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
applications, systems integration, cloud, platform, wan
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2015
This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.
Tags : 
cisco, transceiver, cost reduction, data center aggregation, migration
    
Cisco
Webinar Published By: Cisco     Published Date: Nov 17, 2015
Built for continuous availability in mission-critical data center environments, Cisco NX-OS has set the standard for resiliency, extensibility, efficiency, and virtualization. Now it has added programmability and automation to that list, too. For this episode of TechWiseTV, Robb Boyd talks to two foremost experts in this, the world's most deployed operating system in the data center. They discuss all the exciting changes Cisco has made to NX-OS and, more importantly, how organizations can take full advantage of this automation opportunity. This is truly a deep dive into the full potential of all the components that compose Open NX-OS.
Tags : 
cisco, twtv, nx-os, virtualization, programmability
    
Cisco
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.