RSS feed Get our RSS feed

News by Topic

security risk

Results 776 - 800 of 931Sort Results By: Published Date | Title | Company Name
By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence
     Q1 Labs
By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Damballa     Published Date: Oct 03, 2014
The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence
Tags : damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
     Damballa
By: Citrix     Published Date: Oct 15, 2013
Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.
Tags : citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
     Citrix
By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : cyber security threats, harmful business risks, malware, spam, intelligence team, security
     Symantec
By: HP     Published Date: May 05, 2014
Leveraging HP breadth to increase security, lower risk, increase efficiency: Find out how CapitalOne has improved compliance, lowered risk, eliminated bottlenecks, reduced cost, and moved from silos to integration by leveraging the HP Software portfolio. Headquartered in McLean, Virginia, Capital One offers a broad array of financial products and services to consumers, small businesses and commercial clients in the U.S., Canada and the UK.
Tags : bsm, business service management, it operations group, it case study, capital one, automation
     HP
By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack
     Fireblade
By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
     OpenText
By: Microsoft Office 365     Published Date: Jan 21, 2016
Learn how much money your business can save. In an objective study commissioned by Microsoft, Forrester Consulting investigated the Total Economic Impact™ for small to medium sized businesses, with 1 to 250 employees, using Office 365. The study revealed a sizeable return on investment. One business founder had this to say, “The productivity gain is the main thing for me with Office 365. It’s allowed everybody to be more productive, and if there is any element of downtime on hardware, it’s just a case of moving into another location, whether it’d be the next desk, office, or Starbucks.” Discover these findings and more when you download the free report: • Improved Business Continuity. How enhanced business continuity lead to an avoidance in lost billable hours of $15,000 annually. • Increased mobile worker productivity. How an investment in mobility saved45 hours per year per worker. • Lowered Security, Risk, and Compliance Costs. How an organization went from 15 data breaches per year
Tags : 
     Microsoft Office 365
By: Microsoft Office 365     Published Date: Jun 03, 2016
Did you know that just like email, video conferencing is susceptible to security risks? Our “Online Meetings: Secure Your Video Conferences” eBook shows you how small and medium businesses can use Skype for Business to provide effective collaboration tools—like HD video conferencing*—that are more secure and simple to use. In this ebook, you’ll discover how to: Save on security, risk, and compliance costs Reduce risk with a comprehensive solution Simplify your IT environment and increase security *For HD video, compatible HD hardware and broadband connection with at least 4 Mbps required.
Tags : 
     Microsoft Office 365
By: IBM     Published Date: Feb 27, 2014
Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.
Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
     IBM
By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
     Marketo
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
     MessageLabs Ltd.
By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, you’ll learn how Worklight Application Scanning helps you deliver applications that aren’t susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, you’ll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : application screening, user feedback, mobile app development, cloud-based services
     IBM
By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl, security
     Symantec
By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Symantec Corporation     Published Date: Oct 03, 2013
Learn how to confidently choose a cloud hosting provider and see how your organization can take advantage of the economic benefits, but also avoid potential security risks.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Symantec Corporation     Published Date: Oct 08, 2014
"SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services. The risks of hiccups and problems increases with the number of certificates, including lost sales when customers see security warnings about expired certificates on your site, damage to your brand and consumer trust because of problems with certificates and more. With these risks in mind, this guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle."
Tags : 
     Symantec Corporation
By: AlienVault     Published Date: Mar 30, 2016
The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Tags : 
     AlienVault
By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
     AlienVault
By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : webpulse, defense, malware, security, protection, blue coat, insider threats, security
     Blue Coat Systems
By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : wlan, wireless security, wireless freeloaders, wireless rogue, rogue, rogues, wireless infrastructure, monitoring
     AirDefense
Start   Previous    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics