RSS feed Get our RSS feed

News by Topic

security infrastructure

Results 326 - 350 of 413Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 09, 2015
Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.
Tags : ibm, integrated security, security weakness, risk management, infrastructure security
     IBM
By: IBM     Published Date: Apr 09, 2015
Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.
Tags : ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security
     IBM
By: IBM     Published Date: Jul 01, 2015
This webcast talks about decentralizing the IoT by leveraging the “block chain”-- the technology platform underlying Bitcoin.
Tags : internet of things, iot, cloud computing, data security, blockchain, big data, app infrastructure, data analytics
     IBM
By: IBM     Published Date: Jul 22, 2015
Driving transformation in the healthcare industry as it navigates technological, regulatory, legislative and cultural changes.
Tags : it healthcare, cloud computing, cloud security, hybrid cloud, regulatory compliance, it infrastructure, healthcare organizations, data management
     IBM
By: IBM     Published Date: Oct 06, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : ibm, cloud, analytics, mobile, social, security, infrastructure, data center
     IBM
By: IBM     Published Date: Apr 04, 2016
Just as business intelligence helps enterprises make decisions that maximize opportunities and minimize business risks, security intelligence enables them to better detect threats, identify security risks and areas of noncompliance, and set priorities for remediation. One of the most compelling arguments for security intelligence is operational efficiency, or better use of people, time and infrastructure. This white paper discusses how security intelligence is an essential ingredient to comprehensive and cost-effective information security.
Tags : ibm, security intelligence services, ibm security intelligence solution, cloud siem, security intelligence event management, security
     IBM
By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security
     IBM
By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : information technology, information infrastructure, security risks, operation efficiency, operation flexibility
     IBM
By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : it security, malware, malware protection, virus prevention, ibm, threat intelligence
     IBM
By: Seagate Technology     Published Date: Apr 14, 2015
Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.
Tags : surveillance, security system, virtual management software, cameras
     Seagate Technology
By: VeriSign Incorp.     Published Date: Jan 15, 2008
Online visitors are becoming more and more wary about transacting online. One way to provide reassurance that your Web site is reputable and safe is to implement the latest SSL encryption technology on your site. Read this guide to learn about the latest in SSL.
Tags : security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Oct 15, 2008
Learn about the current trends in Internet fraud, and how VeriSign Inc. is helping organizations protect critical data and instill trust for their customers.
Tags : security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca)
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Apr 15, 2009
Read this white paper from VeriSign and RealTime Publisers to examine common vulnerabilities in IT systems and business practices that undermine information security.
Tags : extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
     VeriSign Incorp.
By: Splunk Inc.     Published Date: Jun 02, 2009
This document explains IT Search's ability to instantly search all the data generated by applications, servers and network devices in your IT infrastructure. Download to learn more today!
Tags : operations, it search, data center, splunk, business intelligence, compliance, security, it infrastructure
     Splunk Inc.
By: Cisco     Published Date: Nov 17, 2014
Traditional static approaches can’t provide the security you need. They often miss the insight and automation necessary to fully protect your infrastructure.
Tags : sourcefire, firesight, management center, context aware, adaptive security, monitoring, automation, critical security
     Cisco
By: SilverSky     Published Date: May 09, 2014
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SilverSky security services for their organizations.
Tags : silversky, economic impact, network security, security solutions, forrester research, security threats, risk-adjusted, productivity
     SilverSky
By: SilverSky     Published Date: Aug 27, 2014
Learn how your company can increase their security by adopting this holistic approach.
Tags : silversky, security, targeted attacks, retail security, security infrastructure, detection, zoning, network security
     SilverSky
By: Dell Software     Published Date: Aug 30, 2013
In this new technical brief, discover the top 10 ways Foglight for Virtualization, Free Edition, can help you with troubleshooting virtualization challenges. Read this technical brief today.
Tags : virtualization, security, consolidation, data, infrastructure, network, technology
     Dell Software
By: IBM     Published Date: Jan 02, 2014
This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : ibm, analytics, global business service, big data, business value, it professionals, volume, velocity
     IBM
By: Cisco     Published Date: Oct 14, 2015
Read more to learn how to seize new business opportunities by embedding security into the intelligent network infrastructure and across the extended network.
Tags : cisco, cisco security, digital economy, network infrastructures, network security, internet of everything, ioe, security
     Cisco
By: CenturyLink Technology Solutions     Published Date: Sep 02, 2014
With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your infrastructure into a more efficient virtual environment.
Tags : centurylink, data center, colocation, infrastructure, facility management
     CenturyLink Technology Solutions
By: Cisco     Published Date: Aug 24, 2015
Download this white paper to learn why security needs to be as pervasive as the IoE itself.
Tags : internet of everything, ioe, security, cloud, digital business models, network infrastructure
     Cisco
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics