RSS feed Get our RSS feed

News by Topic

abs

Results 326 - 350 of 492Sort Results By: Published Date | Title | Company Name
By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: Quorum Labs     Published Date: Dec 20, 2011
Here is the dilemma - Are your servers really protected in case of a disaster?
Tags : quorumlabs, equipment, product, disaster recovery, onq, protection, security, backup
     Quorum Labs
By: Absolute Software     Published Date: Nov 21, 2011
With increased visibility into computers on and off their network, Allina Hospitals was able to optimize security and comply with regulations.
Tags : auditing, audit, accuracy, allina hospitials, allina, optimize security, security, regulations
     Absolute Software
By: Absolute Software     Published Date: Nov 21, 2011
Like most IT teams, LIAI technicians are committed to optimizing staff productivity. With the organization steadily growing and IT demands increasing, maintaining this commitment proved challenging. They needed began to minimize the burden of administrative duties and maximize IT efficiency.
Tags : la jolla, absolute, immunology, productivity, it demands, efficiency, liai, resources
     Absolute Software
By: Absolute Software     Published Date: Nov 21, 2011
Learn about best practices in the management and security of IT assets and the sensitive information they contain.
Tags : security, strategy, healthcare, absolute, it assets, sensitive information, phi, ehr
     Absolute Software
By: Workforce Software     Published Date: Nov 17, 2011
During the past several years, challenges such as increased regulatory pressures, employee fatigue and the ever-present need to reduce costs have all weighed heavily on most human resource organizations. As a result, HR and payroll professionals are playing an increasingly strategic role in the day-to-day operation of the business.
Tags : workforce management software, labor laws, california labor laws, change management, labor law compliance, time and attendance, time and attendance software, labor scheduling
     Workforce Software
By: Quorum Labs     Published Date: Nov 10, 2011
Download this paper to learn about virtual recovery solutions that SMBs need to bring an application back online in a matter of minutes.
Tags : backup, recovery, recover, best practices, quorum, smb, small and medium business, application
     Quorum Labs
By: GoToMeeting     Published Date: Oct 06, 2011
Want to connect with today's phone-averse, time-starved prospects? Use email. Sure, most emails get deleted upon arrival, but that's because most emails aren't written right. Watch this on-demand webinar to learn from sales expert Jill Konrath as she explores how to craft an email message that grabs the attention of prospects and compels them to continue the conversation.
Tags : citrix, marketing, prospects, email, email marketing, webinar, web analytics, customer experience/engagement
     GoToMeeting
By: Trend Micro Inc.     Published Date: Sep 21, 2011
Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.
Tags : trendlabs, trend micro, data storage, small business, technology, security solution
     Trend Micro Inc.
By: Absolute Software     Published Date: Sep 09, 2011
Security professionals are wondering how to best deal with the oncoming tide of personal mobile devices finding their way into the workplace. Download this research report to learn some key areas of consideration before moving ahead with a mobile implementations strategy.
Tags : absolute, managing security, risk challenges, mobile devices, it implementation, secure processes
     Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
This white paper provides guidelines to help you create policies for computer energy consumption that are sensible and easy to enforce.
Tags : absolute, power saving policy, management, roi, energy savings, policy metrics, network management
     Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
     Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
Join Michael Scarpelli, Technical Support Manager for La Jolla Institute for Allergy & Immunology, as he shares how his team streamlines and automates computer setup and maintenance for a rapidly growing network of more than 500 machines.
Tags : absolute, technical support, healthcare organizations, operating environment
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their AppleŽ iOS devices (iPhoneŽ, iPodŽ Touch, iPadT).
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : absolute, computrace, secure, tracking, security, manage, protect
     Absolute Software
By: Symantec.cloud     Published Date: Aug 03, 2011
Cloud-based archives offer the cost savings, ease of use, and scalability of the cloud coupled with best-of-breed security from a trusted provider for defensibly handling high-risk enterprise data. Download this whitepaper to find out more now!
Tags : messagelabs symantec hosted services, best practices, financial services compliance, archiving, security, saas
     Symantec.cloud
By: Symantec.cloud     Published Date: Aug 03, 2011
This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.
Tags : symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com, cta, converged threat analysis, email security
     Symantec.cloud
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics