RSS feed Get our RSS feed

News by Topic

security suite

Results 51 - 69 of 69Sort Results By: Published Date | Title | Company Name
By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : security solutions, protecting data, secure management, cost-effective, security
     Centrify Corporation
By: IBM     Published Date: Jul 15, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : security, best practices, fraud management, financial organizations, business management, ibm
     IBM
By: IBM     Published Date: Mar 21, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : security
     IBM
By: IBM     Published Date: Apr 04, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : ibm, fraud protection, fraud management fraud prevention, security
     IBM
By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : endpoint security, security, threat prevention, threat detection, security solution
     Symantec
By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : ibm, c-suite study, cybersecurity, security
     IBM
By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : ibm, security, maturity, c suite, cybersecurity
     IBM
By: IBM     Published Date: Sep 30, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : ibm, security, web fraud, fraud protection, cyber security
     IBM
By: CarbonBlack     Published Date: Oct 26, 2016
Download the report to learn why Forrester gave Carbon Black the top score in prevention and the highest score possible in detection capabilities criteria.
Tags : security
     CarbonBlack
By: HP     Published Date: Sep 08, 2014
Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and security. When such a shift occurs, legacy servers rapidly become obsolete, dragging down enterprise productivity and agility. Fortunately, each new server shift also brings its own suite of enabling technologies, which deliver new economies of scale and entire new computational approaches. In this interview, long-time IT technologist Mel Beckman talks to HP Server CTO for ISS Americas Tim Golden about his take on the latest server shift, innovative enabling technologies such as software-defined everything, and the benefit of a unified management architecture. Tim discusses key new compute technologies such as HP Moonshot, HP BladeSystem, HP OneView and HP Apollo, as well as the superiority of open standards over proprietary architectures for scalable, cost-effect
Tags : servers, innovative, management, mobility, security, computational, technologies, mainframes
     HP
By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
     Absolute Software
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : network security, access control, nac, network access control, intrusion prevention, landesk
     LANDesk
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware
     LANDesk
By: Visendo     Published Date: Sep 09, 2010
This whitepaper explains how SMBs can improve their mail security and increase their efficiency when storing, scanning, filtering emails with minimum investment and Visendo innovative email suite.
Tags : pop3 connector, antispam filter, anti-phisihing, email security for smbs
     Visendo
By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : server security, virtual server security, cloud server security, data center server security, security
     Intel Security
By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
     Microsoft Office 365
By: Alert Logic     Published Date: May 23, 2019
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
     Alert Logic
Start   Previous    1 2 3     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics