RSS feed Get our RSS feed

News by Topic

security management strategies

Results 1 - 11 of 11Sort Results By: Published Date | Title | Company Name
By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually youíll find that siloed cloud security strategies fall short of the mark. But donít wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
     Fortinet EMEA
By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises ó some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a botís ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : web analytics, frost & sullivan, bot management, botnet
     Akamai Technologies
By: Oracle ODA     Published Date: Dec 06, 2016
IT leaders must consider new approaches to database administration, implementation, and security, including proactive management, to reduce time-consuming administrative tasks. This, in turn, will free them to develop strategies for capitalizing on the new data-driven initiatives that can help transform the enterprise. Learn more about these opportunities as well as how products, such as an integrated Database Appliance, can streamline the management of these tasks, while reducing costs and time.
Tags : 
     Oracle ODA
By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises ó some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a botís ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : management, bot, security, credential, akamai
     Akamai Technologies
By: McAfee     Published Date: Oct 28, 2014
For SIEM to help usher in more effective security and risk management strategiesóparticularly related to threat mitigation, embracing trends, and aligning with business prioritiesóthese five business issues must be addressed. McAfee spoke with SIEM users and this brief lists those top issues along with corresponding customer case studies and use cases.
Tags : big security data, situational awareness, real-time context, management ease, integrated security, siem, mcafee, risk management strategies
     McAfee
By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : secnap, network security, data security, compliance, osi, malware, antispam, anti-spam
     SECNAP Network Security Corporation
By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‚Äźin
     Catapult
By: Catapult.     Published Date: Apr 23, 2009
As a software provider for a product information management solution, we were experiencing a myriad of problems supporting and servicing our on premise application – too many versions to maintain, test, install and upgrade. It was becoming increasingly difficult to support our existing customers, let alone sell to new customers.  The following information is a compilation of our research.
Tags : saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‚Äźin
     Catapult.
By: CDW     Published Date: Jun 26, 2015
Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.
Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies
     CDW
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : trend micro, trend, e-discovery
     Trend Micro, Inc.
By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset
     BlackBerry
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics