RSS feed Get our RSS feed

News by Topic

security information management

Results 101 - 125 of 150Sort Results By: Published Date | Title | Company Name
By: Jamf     Published Date: Mar 13, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: • How the Apple ecosystem is structured • How Apple management differs from Windows • What security features are unique to the Apple ecosystem • What to consider when adding new Apple devices • What Apple integrations are available to leverage what you already have
Tags : 
     Jamf
By: Jamf     Published Date: Mar 20, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
     Jamf
By: McAfee     Published Date: Mar 31, 2017
The concept of SIEM orchestration provides immediate, automated responses. It is the only way for a modern enterprise to protect against advanced attacks.
Tags : secops, siem, soc, orchestration, threat intelligence, epo, automation, process integration
     McAfee
By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : security information, event management, orchestration, surface, intel security
     McAfee EMEA
By: IBM     Published Date: Oct 10, 2013
First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments. Read this white paper, “Security intelligence can deliver value beyond expectations and needs to be prioritized” for an overview of market adoption of security-as-a-service.
Tags : security, security intelligence, security incident, event management, security-as-a-service, information security, risk, risk management
     IBM
By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
     VeriSign Authentication Services, now a part of Symantec Corp.
By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
     AlienVault
By: LogRhythm     Published Date: Dec 20, 2016
For security analysts, a flow of security alerts is an inevitable consequence of the digital age. Moreover, as alerts can signal business-impacting incidents, the enterprise’s security staff cannot be complacent. Staff must be relentless in gathering logs, setting alert parameters, assessing alert severity, and then prudently responding to incidents with countermeasures.
Tags : security, technology, best practices, information technology, business analytics, business management
     LogRhythm
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
     Neoscale Systems, Inc.
By: NETIQ     Published Date: Sep 09, 2013
This paper contains three simple steps for maintaining visibility and control when moving to the cloud and explains how NetIQ can help with each.
Tags : netiq, cloud infrastructure, cloud computing, security risks, regulations, information security, compliance management, public cloud
     NETIQ
By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : security, security practices, enterprise security, security information management, government, application security, security services
     HP - Intel®
By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, security
     IBM
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: Brainloop     Published Date: Nov 09, 2011
This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.
Tags : brainloop, security, compliance risks, sharing information, security management, data protection
     Brainloop
By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
     IBM
By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : big data, big security data, mcafee siem, intrusion detection systems, security monitoring
     McAfee
By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa
     NetIQ
By: NetIQ     Published Date: Nov 01, 2012
In this paper, we will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Tags : security information, event management, log management, pci dss, security
     NetIQ
By: NETIQ     Published Date: Mar 12, 2013
In this paper, we will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Tags : security information, event management, log management, pci dss, security
     NETIQ
By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
     Marketo
By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
     Marketo
By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing
     Quocirca
By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing
     Forrester
By: Quocirca     Published Date: Mar 12, 2009
For many years, server-based computing has been seen as a means of, at best, providing those within highly task-based environments with a controlled desktop environment. However, changes in software, hardware, security and management systems are leading towards server-based computing being suitable for a far larger proportion of an organization's user base.
Tags : quocirca, desktop environment, software, hardware, security, management systems, data security, business continuity
     Quocirca
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics