RSS feed Get our RSS feed

News by Topic

securing

Results 251 - 275 of 472Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Jun 30, 2015
Total Mobility Management (TMM) is a comprehensive platform that makes implementing, managing, and securing mobile devices simple.
Tags : mobility, apps, strategy, platform, tmm, risk management, productivity
     CDW
By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching
     Waratek
By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : ibm, data, big data, safeguard, sensitive data, security, dbms, data management
     IBM
By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
     McAfee EMEA
By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
     Tenable
By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : aws, aws vpc, aws openvpn, aws bastion, aws remote access
     Aviatrix
By: Code42     Published Date: Apr 22, 2016
Dramatic changes are underway in offices around the world, with Macs rapidly gaining market share in modern enterprises. Read this white paper to discover the industry-wide transitions to Macs, and tips to smooth your integration of Apple devices.
Tags : mac, code 42, apple devices, modern offices
     Code42
By: Dell Software     Published Date: May 10, 2013
Have you ever had problems securing Active Directory? In this Dell technical brief, learn about three critical tasks administrators often overlook – and why doing them helps maximize AD security.
Tags : dell software, active directory, ad security, dell technical brief
     Dell Software
By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
     Code42
By: IBM     Published Date: Feb 11, 2015
Strengthen application protection—from design to deployment—to proactively address cloud security risks.
Tags : cloud environment, web application, cloud-based security, ibm, ibm security, security
     IBM
By: SPAN Systems     Published Date: Aug 30, 2013
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags : securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes
     SPAN Systems
By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : cloud, it pros, security, dlp, cloud securiity
     Box
By: CDW     Published Date: Jun 18, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program.
Tags : cdw, byod, bring your own device, mobile computing, smartphones, tablets, wireless, security
     CDW
By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data
     CDW
By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: IBM     Published Date: Jan 07, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : ibm, cloud, security, threats, usage, application
     IBM
By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : ibm, security, cloud applications, cloud, cloud-based threats
     IBM
By: Blue Coat     Published Date: Mar 11, 2016
The cloud creates new risks and compliance issues for organizations already struggling with traditional threats. Get Blue Coat’s new E-Book, “Securing Cloud Applications & Services.”
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application
     Blue Coat
By: Intralinks     Published Date: May 29, 2013
Ensuring the security of confidential, sensitive information is an essential element of enterprise Security and Governance, Risk Management and Compliance programs. Regulations, such as the HIPAA, FDA, and SOX, place significant requirements on organizations for securely sharing sensitive data such as confidential personally identifiable information (PII) and personal health information (PHI).
Tags : security, sensitive information, sharing, mobile file sharing, solutions, confidential, storage
     Intralinks
By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security
     Intralinks
By: Intralinks     Published Date: Mar 12, 2014
In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and up-time, and the availability of reporting and audit trails.
Tags : intralinks, technology, saas, confidential data, dada cloud computing, security
     Intralinks
By: DigiCert     Published Date: Mar 16, 2017
This webinar provides an overview from both a healthcare provider organization and medical device manufacturer perspective.
Tags : internet of things, healthcare, cybersecurity, medical devices, risk assessment
     DigiCert
By: HP     Published Date: Jul 29, 2008
The data residing on your storage systems and media, data-at-rest, presents serious security concerns. Regulations and various mandates around the world are putting the burden on companies and government entities to protect the private information they store. Increasingly, companies are being required to publicly disclose breaches that put individuals private data at risk, be it a customer, employee, shareholder, partner, or other stakeholder.
Tags : data security, database security, securing data, customer data, consumer data, pci, cardholder data, mission critical
     HP
By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security
     Symantec.cloud
By: Infoblox     Published Date: Jun 18, 2015
This in-depth white paper from the SANS institute will bring you up to speed on today’s most dangerous vulnerability. In it, you will learn about: • How DNS works, and why, if unprotected, it can put your network at risk • The different kinds of DNS attacks—and who’s been hit by them • Major compliance frameworks that address the problem • Effective governance and best practices
Tags : infoblox, dns, attacks, effective governance, sans institute, compliance frameworks
     Infoblox
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics