RSS feed Get our RSS feed

News by Topic

it security managers

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name
By: Pine Cove     Published Date: Oct 03, 2019
To understand the realities of endpoint security today, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT managers across the globe. The resulting paper reveals the experiences, concerns and future plans of organizations in 12 countries and six continents. It provides deep insight into the day-to-day challenges IT teams face securing their organizations against cyberattacks, as well as their experiences with endpoint detection and response (EDR) technologies.
Tags : 
     Pine Cove
By: Pine Cove     Published Date: Oct 03, 2019
To understand the realities of endpoint security today, Sophos commissioned independent research specialist Vanson Bourne to survey 3,100 IT managers across the globe. Check out this infographic for insight into the day-to-day challenges IT teams face securing their organizations against cyberattacks.
Tags : 
     Pine Cove
By: NetSpi     Published Date: Oct 01, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify any misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
     NetSpi
By: NetSpi     Published Date: Sep 20, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify and misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
     NetSpi
By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
     Druva
By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
     Lookout
By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
     Microsoft Office 365
By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : byod, malware threats mobile security, data protection, mobile security solutions
     Lookout
By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : it staff, applications, business data, data security, it managers, endpoint data, device, platforms
     IBM
By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : email security, cyber threats, it security, phishing
     Mimecast
By: Lookout     Published Date: Mar 29, 2017
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : practitioners, enterprise, mobile security, productivity, lookout
     Lookout
By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their company’s information is secure and today any device can become an access point threat. Printers and MFPs can be the Achilles’ Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn what’s necessary to protect your company.
Tags : hewlett packard, printer security, information technology
     Hewlett Packard Enterprise
By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : insights, mobile, security, byod, lookout
     Lookout
By: Lookout     Published Date: Mar 28, 2017
Enterprise mobility started with the Blackberry, a revolutionary messaging device that solved security concerns by giving IT managers the ability to set many restrictions on its functionality. In the following years, employees started using fully-functional, internet-capable smartphones in their personal lives and demanded the same capabilities at work.
Tags : enterprise, mobile, security, lookout, revolutionary
     Lookout
By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : security, technology, best practices, information technology
     LogRhythm
By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : security, security application, siem, siem architecture, it security managers
     Logrhythm
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
     Arbor
By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology
     Aruba Networks
By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with Intel® CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : remote repair, it management, operatin systems, pc repair, enterprise security, it managers, productivity, cloud storage
     Intel
By: IBM     Published Date: Jul 13, 2012
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. But this has introduced new challenges and opportunities. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Tags : ibm, technology, risk management, professionals, business, security management, emerging threats
     IBM
By: IBM     Published Date: Jul 13, 2012
This white paper examines the changing nature of the workplace and the demands it places on IT managers for faster delivery of high-quality, flexible services while providing a quick return on IT investment.
Tags : ibm, technology, security, white paper, management, it managers, productivity, workplace
     IBM
By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement
     SAP
By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : eset, cybersecurity webinar, security manager, it security, crm solutions/software, customer experience/engagement, reputation monitoring, usability
     ESET, LLC.
By: SAP     Published Date: Nov 23, 2009
Increased regulatory requirements, the need for transparency, and the desire to better manage and mitigate risks have combined to make Governance, Risk, and Compliance (GRC) top of mind for both business and Information Technology (IT) executives. Business managers and IT security managers must work collaboratively and continuously to control access and authorization, guarding against fraud and mistakes, while providing the clear visibility that is prerequisite for sound corporate oversight to ensure profitability and compliance.
Tags : sap, governance, risk, compliance, grc
     SAP
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics