RSS feed Get our RSS feed

News by Topic

securing

Results 426 - 450 of 465Sort Results By: Published Date | Title | Company Name
By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : cloud, security, data centre, sla, continuity, disaster recovery
     The Bunker
By: ThreatTrack Security     Published Date: Jan 22, 2015
South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.
Tags : threattrack, security, threat, track, information, admins, best, practices
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security
     ThreatTrack Security
By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download white paper now to learn the challenges of physical consolidation, performance issues for virtualization and cloud security requirements.
Tags : trend micro, cloud security, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security
     Trend Micro Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Nov 12, 2009
Securing the Physical, Virtual, Cloud Continuum Virtualization and cloud computing are radically altering data center operations. In this webinar, Ted Ritter, Senior Research Analyst at Nemertes Research, and Harish Agastya, Director of Product Marketing at Trend Micro, discuss the rise of virtualization and cloud computing and the impact this is having on security best practices and next-generation security technologies.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Nov 25, 2009
The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.
Tags : trend, trend micro, webcast, security, hitrust, web, privacy, ehrs
     Trend Micro, Inc.
By: Tripp Lite     Published Date: Jun 28, 2018
Credit, debit and ATM card fraud costs consumers, merchants and financial institutions billions in losses every year. The payment card industry has responded by creating the PCI security standard. Merchants that fail to comply with PCI face increased risk of security breaches and substantial contractual penalties. Tripp Lite Wall-Mount Rack Enclosures help merchants achieve PCI compliance by securing network/telecommunications hardware and storage media in retail point-of-sale environments and other locations.
Tags : 
     Tripp Lite
By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
     Tripwire
By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : network management, network security, access control, nac, network access control, identity management, security management, authentication
     Trusted Network Tech
By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : video surveillance, access control, business intelligence, security
     Tyco Integrated Security
By: Varonis     Published Date: Feb 05, 2014
Varonis has conducted several surveys over the last year, and the results indicate that most organizations recognize they need to do a better job securing their own data, and a much better job securing your data. The most disturbing discovery, though, is that in large numbers they lack the fundamental controls necessary to ensure safe digital collaboration.
Tags : varonis, data, data migration, digital revolution, digital collaboration
     Varonis
By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to learn how strong authentication tools safeguard user login and ensure that only authorized users gain access to confidential patient data.
Tags : vasco, cloud computing, technology, saas applications, authentication, security
     VASCO
By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
     Venafi
By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
     Venafi
By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : security, internet security, privacy, digital security certificates, security keys
     Venafi
By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : security, internet security, privacy, digital security certificates, security keys
     Venafi
By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : veracode, gartner, magic quadrant, application security testing, security, application security
     Veracode
By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : veracode, security, supply chain security, web applications, application security
     Veracode
By: Veracode     Published Date: Oct 28, 2016
DevOps practices, while relatively new, are spreading rapidly. And there are sound business reasons for executives to embrace these changes. This e-book from Veracode provides background into the evolution of DevOps and proposes five principles that must be addressed for those seeking to integrate AppSec into DevOps.
Tags : veracode, security, devops, appsec
     Veracode
By: Veracode     Published Date: Jun 26, 2019
DevOps, a new model for software development, is transforming the way the world creates software. And despite its substantial organizational, cultural and technological requirements, this new way of organizing development and IT operations work is spreading rapidly.
Tags : 
     Veracode
By: VeriSign     Published Date: Feb 10, 2011
This white paper will detail the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : verisign, mobile apps, code signing, mobile application development, signing certificates
     VeriSign
By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics