RSS feed Get our RSS feed

News by Topic

security as service

Results 226 - 250 of 276Sort Results By: Published Date | Title | Company Name
By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : hipaa, compliant, data, center, centers, healthcare, providers, assure
     Dell Storage
By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : technology, firewall, security, cloud, data, anti-virus
     Qualys
By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : java, network security, security breach, security flaws, network intrusion
     Rapid7
By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
     Rapid7
By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
     Akamai
By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
     Akamai
By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
     HP - Enterprise
By: HP - Enterprise     Published Date: Nov 22, 2011
Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more
Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
     HP - Enterprise
By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
     HP - Enterprise
By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway
     ZScaler
By: iDirect     Published Date: Oct 13, 2011
In an insightful report from iDirect, find out why satellite is the best option for delivering cost-effective, reliable, broadband connectivity to any location. Today's satellite networks are enterprise-class platforms built on IP; offering seamless integration with existing communications technology. In addition, satellite now delivers up to 99.99 percent network availability and meets new security regulations, such as AES encryption. Get the facts on satellite for the smart grid and learn how satellite services can deliver the security, latency, and reliability required for all core utility applications. Download the report.
Tags : idirect, satellite communications, technology, smart grid, utility companies
     iDirect
By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
     HP - Enterprise
By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : "application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
     HP - Enterprise
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
     DigitalPersona UK
By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
     Webroot
By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
     Webroot
By: Symantec.cloud     Published Date: Apr 28, 2011
This white paper discusses how SaaS can simplify IT management.
Tags : symantec.cloud, it security management, saas, risk prevention, security, software as a service
     Symantec.cloud
By: Symantec.cloud     Published Date: Mar 02, 2011
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
Tags : symantec.cloud, messagelabs, midmarket, wireless device, remote workers, pda, smart phones, tablet pc
     Symantec.cloud
By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will examine the information security needs of midmarket organizations, and how SaaS security services can help address those needs specific to a distributed workforce.
Tags : messagelabs symantec hosted services, saas, distributed workforce, information security, software-as-a-service, messaging
     Symantec.cloud
By: Mimecast     Published Date: Nov 10, 2010
Cloud-based email services can offer full protection with the promise of availability and reliability too.
Tags : mimecast, software as a service, saas, security, threat mitigation, cloud-based email service
     Mimecast
By: Microsoft Corporation     Published Date: Oct 19, 2010
Get a close look at Microsoft security measures for ensuring data protection and integrity, and learn how you can rest assured about the security and reliability of Microsoft Online Services with 24x7 IT professional support and a financially backed service level agreement (SLA) for 99.9 percent uptime.
Tags : microsoft online services, security measure, data protection, business productivity, collaboration, it administration
     Microsoft Corporation
By: Symantec.cloud     Published Date: Sep 07, 2010
Drawing on the findings from multiple benchmark studies on best practices in email security and security software as a service, Aberdeen's analysis shows that users of cloud-based email security had substantially better results than users of on-premise email security implementations in the critical areas of security, compliance, reliability and cost.
Tags : messagelabs hosted services, email security, cloud computing, audit, compliance
     Symantec.cloud
By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam, anti-virus, email encryption, intrusion prevention
     Symantec.cloud
By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security
     Symantec.cloud
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics