Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 251 - 275 of 2276Sort Results By: Published Date | Title | Company Name
Webinar Published By: Palo Alto Networks     Published Date: Feb 24, 2016
Attackers are more sophisticated than ever
Tags : 
palo alto, cyber security, data, security organization, security
    
Palo Alto Networks
Webinar Published By: Palo Alto Networks     Published Date: Feb 24, 2016
Next generation security for financial services.
Tags : 
palo alto, financial services, cyber security, data security, security
    
Palo Alto Networks
White Paper Published By: Intralinks     Published Date: Feb 23, 2016
This report highlights a range of products to help address the collaboration challenge.
Tags : 
intralinks, mobile, enterprise, collaboration, security
    
Intralinks
White Paper Published By: Intralinks     Published Date: Feb 23, 2016
To explore the impact of evolving data privacy regulations and data sovereignty, Ovum was commissioned in Q3 2015 by Intralinks to conduct an international survey of 366 IT decision-makers.
Tags : 
intralinks, data privacy, ovum, data security, security
    
Intralinks
Webinar Published By: Cisco     Published Date: Feb 23, 2016
As security continues to get more complex Cisco looks at a network visually for secuirty aspects and is not based upon classifications of boundary and segmentation. Putting the 'Network' back in Network Security is an implementation used through: Netflow, Fire & ISE, Beyond Access Control (SGT & TrustSec)
Tags : 
network management, network secuirty, network optimization, networking, security
    
Cisco
White Paper Published By: IBM     Published Date: Feb 22, 2016
Survive the big data storm by getting ahead of integration and governance functional requirements
Tags : 
ibm, data, big data, integration, governance
    
IBM
White Paper Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, it’s critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices, networking
    
Qualys
White Paper Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security
    
Qualys
White Paper Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
A high level overview and introduction to the VCE VxRail Appliance.
Tags : 
vce, vxrail appliance, hyper converged, intro to vxrail, networking
    
EMC Converged Platforms
White Paper Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
This solution brief describes how VxRail Appliances are the easiest, fastest, most affordable way to implement a VDI infrastructure.
Tags : 
vce, vdi, hyper converged appliances, solution brief, vdi infrastructure
    
EMC Converged Platforms
White Paper Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
This VxRail solution brief provides an overview and describes benefits gained by Federal Agencies.
Tags : 
vxrail, vce, vdi, federal agencies, solution brief
    
EMC Converged Platforms
White Paper Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
This VxRail solution brief provides an overview and describes benefits gained by State and Local Govt Agencies.
Tags : 
vxrail, vce. vdi challenge, state and local agencies, solution brief, networking
    
EMC Converged Platforms
White Paper Published By: Cisco     Published Date: Feb 16, 2016
Since the 1990s, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate communications. Each day, more than 100 billion corporate email messages are exchanged.1 Security has naturally become a top priority. But mass spam campaigns are no longer the only security concern.
Tags : 
cisco, email threat, data, data security, information security
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
From collaboration to communication to data access, the web is a mission-critical business tool. Enterprises rely on the web not only to innovate and compete but also to conduct business. But the web poses significant security risks that are easily encountered by users, yet not so easy to detect.
Tags : 
cisco, web threat, data security, information security, data access
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
cisco, malware, data security, analytics, global security threat
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
While the companion comparative reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this individual test report provides detailed information not available elsewhere.
Tags : 
cisco, breach detection, system test, data security, threat
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere.
Tags : 
cisco, threat, cybercrime, infrastructure, security
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.
Tags : 
technology, security, security management, malware analysis
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
technology, infrastructure management, security
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
Today the success of your organization may depend on effectively safeguarding the resources and information in your data center.
Tags : 
data security, security, resource management, infrastructure management
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
The need for threat-focused next-generation firewalls (NGFWs) that can effectively mitigate risks that traditional unified threat management (UTM) and point solutions cannot is highlighted by numerous studies, including one from Cisco that reported that every organization should assume it has been hacked. Cisco threat researchers found malicious traffic was visible on 100 percent of the corporate networks that they observed, with evidence that adversaries had often penetrated those networks and were frequently operating undetected over a long period.
Tags : 
network security, threat management, network management, security
    
Cisco
White Paper Published By: ArborNetworks     Published Date: Feb 12, 2016
Security Analytics is one of the two fastest growing product categories in security.
Tags : 
arbor networks, insegment, security analytics, data protection, cyber defense
    
ArborNetworks
White Paper Published By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing, security
    
SAS
White Paper Published By: Xangati     Published Date: Feb 04, 2016
MBSI was providing approximately 800 virtual desktops to their employees using VMware Horizon with View and 8 VMware ESXi hosts and they were running an additional 140 virtual servers using 5 VMware ESXi hosts – all on a Tegile Hybrid SAN. “It was shortly after we converted from ICD-9 diagnosis codes to ICD-10 codes that performance for the VDI desktops began to suffer noticeably,” explained Shawn Wood, Assistant Manager of Systems Administration, MBSI. “We have relied on Xangati for a number of years now to help us quickly see where bottlenecks are in a short period of time. It's an important part of maintaining the integrity of our infrastructure.” Read more to learn how Xangati helped MBSI address this problem.
Tags : 
xangati, medamerica, mbsi, case study, networking
    
Xangati
Webinar Published By: IBM     Published Date: Feb 04, 2016
Disruptors are reinventing business processes and leading their industries with digital transformations. Learn more about personalized front-line decision making, real time insight driven processes, and ecosystem-based innovation.
Tags : 
ibm, middleware, solutions, digital, security
    
IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.