RSS feed Get our RSS feed

News by Topic

security landscape

Results 126 - 141 of 141Sort Results By: Published Date | Title | Company Name
By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : security, compliance, mobile, tablets, byod, cloud
     HP - Enterprise
By: McAfee     Published Date: Jan 23, 2013
Information security based on regulatory compliance stipulations cannot keep up with today’s sophisticated and rapidly changing threat landscape. CISOs need to implement a new discipline that ESG calls, “Real-time Risk Management."
Tags : enterprise strategy group, esg, jon oltsik, real-time risk management, threats and vulnerabilities, security
     McAfee
By: ESET     Published Date: Sep 21, 2012
Get the most up-to-date view of the IT security threat landscape from the experts at ESET. This monthly threat report is required reading for anyone involved with IT Security.
Tags : security threat, eset, it security, security
     ESET
By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security
     Splunk
By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
     ForeScout
By: Splunk     Published Date: Jul 23, 2012
In this study, Enterprise Management Associates (EMA) examines the Return on Investment (ROI) in Splunk realized by the Interac organization.
Tags : interac organization, splunk, security, it landscape, roi
     Splunk
By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t
     AT&T
By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t
     AT&T
By: IBM Corporation     Published Date: Oct 20, 2011
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Tags : ibm, guardium, technology, data, security, privacy, risk reduction
     IBM Corporation
By: Akamai     Published Date: Jul 01, 2011
Learn Why Protecting Your Online Channels and Applications is Critical.
Tags : akamai, security capabilities, online channel protection, web applications, ddos, distributed denial of service, threat landscape, firewall
     Akamai
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
     Ounce Labs, an IBM Company
By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : eset, security, threatsense, malware, threat trends, conficker, virus, agent
     ESET
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : trend micro, trend, e-discovery
     Trend Micro, Inc.
By: HP - Enterprise     Published Date: Nov 19, 2008
With an extensive background in police, military, government, and industry security, Howard Schmidt explains how to respond to the changing landscape of cyber threats and how business leaders are helping set the standards for application security. He then profiles industry role models who are setting the standard for application security.
Tags : howard schmidt, security, application security, audit, risk, vulnerabilities, fortify, fortify software
     HP - Enterprise
By: MX Logic     Published Date: May 21, 2008
Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.
Tags : botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm
     MX Logic
By: Microworld     Published Date: Dec 12, 2007
The Small and Medium Businesses contribute to around 68% of the world economy while making up for 80% of the employment. The security needs, issues and priorities of SMBs are different in many ways from that of large Business Houses.
Tags : smb, smbs, small business, soho, internet security, email security, spam, spamming
     Microworld
Start   Previous    1 2 3 4 5 6     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics