RSS feed Get our RSS feed

News by Topic

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 301 - 325 of 2276Sort Results By: Published Date | Title | Company Name
By: Intel Security     Published Date: Jan 12, 2016
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analysts Peter Firstbrook and Neil MacDonald have created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
Tags : gartner, buyers guide, endpoint security, security
     Intel Security
By: Intel Security     Published Date: Jan 12, 2016
Research by third-party analyst Aberdeen Group reveals the true cost of "Free" endpoint security solutions.
Tags : aberdeen, free av, endpoint security, security
     Intel Security
By: Intel Security     Published Date: Jan 12, 2016
As organizations try to simplify vendor management, many are asking if consolidating on a single endpoint security vendor makes sense. This white paper examines the questions IT executives should ask themselves and their security technology partners.
Tags : endpoint, security, vendor, iot
     Intel Security
By: Cisco     Published Date: Jan 12, 2016
Network readiness is an important factor in any new IT project at companies both large and small. New applications seem to require more bandwidth than the applications that they replace. These applications can also bring in new users, sometimes by the thousands. In some cases, the network services and/or capacity are not ready for these changes, and the IT rollout suffers. This guide covers the following topics: bandwidth, wireless, firewalls, content filtering, proxy servers, and others.
Tags : cisco, byod, connectivity, education, networking environment, digital revolution, higher education, security
     Cisco
By: Cisco     Published Date: Jan 12, 2016
This white paper will discuss the challenges currently facing local educational entities, describe 10 exemplary local alliances that enabled connection to CalREN in California, and finish with a set of recommendations for other local entities wishing to create a successful local consortium that could duplicate this success for themselves and for their local educational ecosystems.
Tags : cisco, byod, connectivity, education, networking environment, security
     Cisco
By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance
     Vormetric, Inc.
By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : security
     BitSight Technologies
By: BitSight Technologies     Published Date: Jan 11, 2016
Why does the cyber security performance of several industries differ? Download the latest BitSight Industry Benchmarking report to find out.
Tags : security
     BitSight Technologies
By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : security
     BitSight Technologies
By: Cisco     Published Date: Jan 08, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : cisco, ngfw, security, svm, firewall, protection, leader
     Cisco
By: Cisco     Published Date: Jan 08, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities.
Tags : cisco, wan, design guide, dmvpn, qos, security
     Cisco
By: IBM     Published Date: Jan 07, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : ibm, security, maturity, mobile, wireless
     IBM
By: IBM     Published Date: Jan 07, 2016
This infographic shows the key points on the path to a secure mobile enterprise, and how holistic protection from IBM can help organizations move beyond device security and extend protection to sensitive content, applications and transactions.
Tags : ibm, security, mobile, enterprise, application
     IBM
By: IBM     Published Date: Jan 07, 2016
Are you suffering from “mobilephobia”? If you’re a CISO, and the growing number of mobile devices on your network—and your inability to manage those devices with traditional security measures—keeps you awake at night, then you’ve got a textbook case of mobilephobia.
Tags : ibm, mobile, ciso, mobile, security
     IBM
By: IBM     Published Date: Jan 07, 2016
This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : ibm, security, intelligence, cloud
     IBM
By: IBM     Published Date: Jan 07, 2016
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution.
Tags : ibm, qradar, security, intelligence, siem, information and event management
     IBM
By: IBM     Published Date: Jan 07, 2016
This white paper discusses how security intelligence is an essential ingredient to comprehensive and cost-effective information security.
Tags : ibm, security, intelligence, information
     IBM
By: IBM     Published Date: Jan 07, 2016
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements.
Tags : ibm, gartner, magic quadrant, security, enterprise
     IBM
By: IBM     Published Date: Jan 07, 2016
Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : ibm, data breach, analysis, ponemon institute, security
     IBM
By: IBM     Published Date: Jan 07, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : ibm, cyber security, threat, data, security
     IBM
By: IBM     Published Date: Jan 07, 2016
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : ibm, cyber crime, trend, threat, security
     IBM
By: IBM     Published Date: Jan 07, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : ibm, threat, endpoint, security, intelligence, qradar
     IBM
By: IBM     Published Date: Jan 07, 2016
See why Gartner selects IBM as an IGA leader in the 2016 report.
Tags : ibm, gartner, magic quadrant, identity governance, administration, security
     IBM
By: IBM     Published Date: Jan 07, 2016
This study details how organizations achieve cost and risk reductions while increasing productivity and tactical efficiencies from implementing IBM Security Guardium
Tags : ibm, forrester, total economic impact, tei, security, data
     IBM
By: IBM     Published Date: Jan 07, 2016
Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data, security, compliance, information
     IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.