RSS feed Get our RSS feed

News by Topic

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 101 - 125 of 2295Sort Results By: Published Date | Title | Company Name
By: LifeLock     Published Date: Aug 23, 2016
Every employee has a risk of having their identity stolen. Provide your employees with identity theft management by offering LifeLock.
Tags : best practices, identity theft, security, protection
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
While most employers provide employees with protection for healthcare, accident and illness, many employees are missing protection for identity theft. Employers can now add value to their benefit package and help keep employees protected while on the job.
Tags : cyber crime, best practices, identity theft, security, protection
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
The impact of data breaches and identity theft on a business cannot be overstated. Offering identity theft protection is one solution. Discover how to help protect your business and your employees if they have a non-employer related fraud attack.
Tags : best practices, identity theft, security, protection
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
In an always-on, ever connected world, the risk of identity theft is real. There is a new identity fraud victim every two seconds. LifeLock identity theft protection helps safeguard against identity fraud by monitoring millions of transactions per second provide services that remediation-only or credit monitoring-only services don’t offer – with no benefit deductible or service co-pay.
Tags : best practices, identity theft, security, protection
     LifeLock
By: Kaminario     Published Date: Aug 23, 2016
Successful businesses are nimble and built to scale. At times you might need to grow your sales capacity by bringing more people on board. Other times you might simply need them to get more active, boosting performance. Sometimes you need to do both. To support the ebb and flow of your business your storage should be capable of scaling up capacity while increasing performance. Yet you might be surprised to know that only one All-flash vendor can do so, while keeping costs predictable. Read on to learn about 3 scalabity benefits that will transform your storage purchasing experienc
Tags : kaminario, flash, performance, storage, application performance, scalability, security
     Kaminario
By: EMC Converged Platforms     Published Date: Aug 19, 2016
In this video, ESG analyst Colm Keegan discusses the new VCE VxRail. He explains the rationale for the product, where it fits in the VCE’s portfolio, and addresses the growing demand for HCI systems.
Tags : vce, esg, vxrail. hyper-converged, hci systems, security
     EMC Converged Platforms
By: EMC Converged Platforms     Published Date: Aug 19, 2016
VxRail is aiding in Land Rover BAR’s quest for the America’s Cup.
Tags : data center, data application, network performance, data virtualization, optimization, security, technology
     EMC Converged Platforms
By: LogMeIn     Published Date: Aug 09, 2016
QualiTest Put Rescue and TeamViewer to the Test. Rescue beats Teamviewer in a number of categories. Read on to find out why.
Tags : logmein, logmein rescue, teamviewer, qualitest, remote support, customer service, technical support, remote assistance
     LogMeIn
By: LogRhythm     Published Date: Aug 08, 2016
THE TIME HAS come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.
Tags : cyber threat, cyber risk, technology, best practices, security
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Tags : cyber threat, cyber risk, technology, best practices, business management, business analytics, security
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Security threats continue to be more sophisticated and advanced with each day, with the majority often going completely undetected. • Organizations are usually scrambling to keep up and implement new security controls to protect themselves, which adds a new layer of complexity. • With the rise of Advanced Persistent Threats (APTs) and insider attacks, it becomes extremely difficult for security staff to detect all the risks. • Many IT and IT Security staff are already stretched thin by keeping track of many different security technologies that already exist.
Tags : security, technology, best practices, information technology
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : security, technology, best practices, information technology
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : microsoft, security, best practices, data
     LogRhythm
By: Panasonic     Published Date: Aug 04, 2016
Cybersecurity is top of mind for companies with workers using mobile computing devices. Report identifies top field service security risks, why security policies are critical, and includes a security checklist.
Tags : cyber risk, security, mobile security, best practices
     Panasonic
By: IBM     Published Date: Jul 27, 2016
IBM i2 Enterprise Insight Analysis helps analysts and investigators turn large data sets into comprehensive intelligence, in near real-time. With the help of advanced analytics and visual analysis capabilities, analysts can uncover hidden connections, patterns and trends buried in disparate data. Equip analysts and those on the front line with the tools they need to generate actionable intelligence, with mission critical speed.
Tags : ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence, security
     IBM
By: IBM     Published Date: Jul 27, 2016
IBM's i2 Analyst’s Notebook offers a wide range of analysis and visualization capabilities that can aid in the identification of key actionable intelligence. Download this IBM White Paper to discover and deliver actionable intelligence to help identify, predict and prevent criminal, terrorist, and fraudulent activities with IBM i2 Analyst's Notebook.
Tags : ibm, cyber threat analysis, ibm i2 analyst notebook, analyst, cyber security, business intelligence, security
     IBM
By: IBM     Published Date: Jul 27, 2016
Learn how to counter and mitigate more attacks with cyber threat analysis.
Tags : ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence, security
     IBM
By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : cloudflare, best practices, technology, security, access control
     CloudFlare
By: HPE_OMG_7.16     Published Date: Jul 22, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : security, compliance, hybrid cloud, best practices, cloud security, business intelligence, business management, cloud computing
     HPE_OMG_7.16
By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : security, compliance, hybrid cloud, best practices, cloud security
     Hewlett Packard Enterprise
By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: Okta     Published Date: Jul 19, 2016
77 Energy uses Okta to automate provisioning and deprovisioning tasks, so IT can focus on identifying and deploying business solutions, rather than worrying about whether or not users can access them. Hear Chris Dodds share how IT staff help people work efficiently and keep the company free of legacy business practices.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: IBM     Published Date: Jul 15, 2016
This Market Guide helps CISOs identify emerging data-centric audit and protection tools. IBM is positioned with a centralized management console approach across multiple silos and has coverage of all the key capabilities evaluated by Gartner.
Tags : ibm, gartner, data, dcap, data-centric audit protection, security
     IBM
By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : ibm, data, security, virtualization
     IBM
By: IBM     Published Date: Jul 15, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments.
Tags : ibm, data, security, big data
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.