RSS feed Get our RSS feed

News by Topic

asset discovery

Results 1 - 12 of 12Sort Results By: Published Date | Title | Company Name
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention
     AlienVault
By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
     CA ITAM
By: IBM     Published Date: Sep 22, 2011
Companies need capabilities for identifying data assets and relationships, assessing data growth and implementing tiered storage strategies-capabilities that information governance can provide. It is important to classify enterprise data, understand data relationships and define service levels. Database archiving has proven effective in managing continued application data growth especially when it is combined with data discovery.
Tags : ibm, application data, technology, enterprise, database archive
     IBM
By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence, security
     McAfee
By: Numara Software     Published Date: Jul 16, 2009
See how this integrated out-of-the-box help desk, asset management and Change Management solution can help solve many IT help desk problems with ease.• Easily create tickets and requests • Automate repetitive workflows • Perform asset discovery • Manage software license compliance • Run pre-built dashboards and reports 
Tags : numara, help desk management, track it, asset management, asset discovery, tickets, requests, dashboards
     Numara Software
By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless
     Promisec
By: Riverbed     Published Date: Jul 17, 2013
Effective IT planning and decision making are dependent upon having a complete asset inventory and an accurate understanding about dependencies available before, during and after IT change activities. Application discovery and dependency mapping (ADDM) solutions automate the process of discovering and mapping transactions and applications to the underlying infrastructure and application interdependencies. Learn how Riverbed Cascade’s built-in application discovery and dependency mapping capabilities can help you shorten project times and mitigate risk.
Tags : effective it, addm, application discovery, riverbed cascade
     Riverbed
By: ServiceNow     Published Date: Mar 13, 2019
It’s nearly impossible to effectively manage software assets without first normalizing disparate software discovery data. This best practice guide will help you get the most out of software normalization process and showcase the benefits realized during software publisher audits and renewal discussions.
Tags : 
     ServiceNow
By: ServiceNow     Published Date: May 14, 2019
It’s nearly impossible to effectively manage software assets without first normalizing disparate software discovery data. This best practice guide will help you get the most out of software normalization process and showcase the benefits realized during software publisher audits and renewal discussions.
Tags : servicenow, software, asset, management, data, audits
     ServiceNow
By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
     Tenable
By: Waterline Data & Research Partners     Published Date: May 18, 2015
Waterline Data automates the cataloging of data assets and provides an Amazon.com-like guided shopping approach to data discovery that is intended to take the guesswork out of targeting the right data.
Tags : waterline, big data, automation, cataloging, processing, analysis, assets, data science
     Waterline Data & Research Partners
By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
     Zingbox
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics