Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 326 - 350 of 2295Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Jan 07, 2016
Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data, security, compliance, information
    
IBM
White Paper Published By: IBM     Published Date: Jan 07, 2016
Understand how attacks work- then deploy comprehensive, integrated solutions to fight each step malware takes.
Tags : 
ibm, networks, malware, risk, security
    
IBM
White Paper Published By: IBM     Published Date: Jan 07, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, networks, threats, protection, security
    
IBM
White Paper Published By: IBM     Published Date: Jan 07, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, cloud, security, threats, usage
    
IBM
Webinar Published By: IBM     Published Date: Jan 07, 2016
Be the “Yes Guy” in IT with IBM Cloud Security Enforcer and expand secure adoption of cloud apps in the enterprise.
Tags : 
ibm, cloud, apps, security, protection
    
IBM
Webinar Published By: IBM     Published Date: Jan 07, 2016
Accelerate Cloud Adoption and Safeguard the Business
Tags : 
ibm, cloud, security, enforcer, enterprise applications
    
IBM
White Paper Published By: IBM     Published Date: Jan 07, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud, prevention, protection, threat
    
IBM
White Paper Published By: IBM     Published Date: Jan 07, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat, global threat intelligence, protection, security
    
IBM
White Paper Published By: IBM     Published Date: Jan 07, 2016
Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats.
Tags : 
ibm, threat, prevention, protection, system
    
IBM
White Paper Published By: IBM     Published Date: Jan 07, 2016
IBM Security Network Protection (XGS) is a next-generation intrusion prevention appliance that uses behavior-based analysis instead of pattern matching to help identify and block unknown threats.
Tags : 
ibm, networks, security, threats, protection
    
IBM
White Paper Published By: IBM     Published Date: Jan 07, 2016
In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad.
Tags : 
ibm, malware, industry, cybercrime, fraud
    
IBM
White Paper Published By: K2     Published Date: Jan 07, 2016
Choosing the right solution to automate your business processes or meet specific business process needs isn’t easy. While a broad array of functionality is available, from BPM suites to custom applications that meet specific business needs, different solutions have differing capabilities and strengths across a variety of categories. In the following RFI, we’ve honed in on eight key areas for business process automation success to help you evaluate the quality of the platforms you are considering – and to ensure that the system you choose is agile and flexible enough to meet your business needs.
Tags : 
business process automation, rfi, best practices, bpm, networking
    
K2
White Paper Published By: K2     Published Date: Jan 07, 2016
Despite the enormous market share that IBM Lotus Notes has earned since its release in 1989, many organizations are now finding that the combination of IBM Lotus Notes and IBM Lotus Domino no longer meets their needs. Many companies are migrating to other solutions, like Microsoft Office 365 and Microsoft SharePoint, but they find that their business applications are a challenge because their IBM Lotus applications don’t migrate: instead the applications have to be rebuilt in the new environment.
Tags : 
ibm lotus, microsoft office 365, optimizing business apps, microsoft sharepoint, data migration
    
K2
White Paper Published By: K2     Published Date: Jan 07, 2016
Is it time to reframe BPM through a modern lens? This is what a recent Forrester report claims, after conducting an online survey of over 3,300 businesses. While 33 percent of companies are already implementing or using a BPM solution and an additional 30 percent are interested in using BPM, only 17 percent of companies made a formal request to use BPM in the last year.
Tags : 
bpm, business process management, forrester report, bpm solutions, networking
    
K2
White Paper Published By: K2     Published Date: Jan 07, 2016
The business context for process excellence and business process management (BPM) has changed dramatically since the 2009-to-2010 recession. During the recession, BPM software and services saw impressive double-digit growth as a result of enterprises slashing costs and boosting worker productivity. Now, executive agendas have shifted to focus on growing revenue, expanding the customer base, and delivering new digital products and services. Enterprise and process architects are reshaping their business cases for BPM around these new drivers. This is not an easy task. However, process excellence will play a critical role for forward-thinking enterprise architects that invest the time to link BPM to new front-office drivers to help the organization drive digital transformation. This report replaces “Building The Case For Your BPM Initiative” in the business process management playbook and provides guidance on developing revenue and customer-focused business cases.
Tags : 
bpm, business process management, process excellence, best practices, networking
    
K2
White Paper Published By: K2     Published Date: Jan 07, 2016
BPM platforms help solution architects and business outcome owners accelerate application development, transform business processes, and digitalize business processes to exploit business moments. This research provides an overview of many of the products used to address these needs.
Tags : 
gartner market, business process management, bpm, networking, security
    
K2
White Paper Published By: K2     Published Date: Jan 07, 2016
User adoption has always been something of an issue. Despite having ready access to SharePoint, many users cling to their file-shares, or more recently, adopt other ways of collaborating and sharing documents via web-based services. A third of the organizations surveyed feel that their SharePoint project has struggled to meet their original expectations, and a further 26% feel progress has stalled. Is this because of poor training and governance, restricted functionality of SharePoint, or simply the inevitable result of being the first ECM system to move beyond the safer boundaries of compliance-based aoperations? As we will see in this report, it is likely to be a combination of all of these.
Tags : 
aiim, microsoft sharepoint, user adoption, enterprise content management, networking
    
K2
White Paper Published By: K2     Published Date: Jan 07, 2016
Microsoft SharePoint users rely on forms daily; it’s where the nitty-gritty work gets done. SharePoint forms that only work for current business needs can stagnate overall business growth. It’s important to plan today for a form that can carry your business processes into tomorrow. You have three options when looking for a SharePoint forms solution: should you buy, code or configure your own forms? Forms that can be delivered quickly, in an adaptable, affordable and future-ready way, are ideal.
Tags : 
microsoft sharepoint, best practices, security, sharepoint solutions, business processes
    
K2
White Paper Published By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : 
microsoft sharepoint, data integration, security, sharepoint solutions, networking
    
K2
White Paper Published By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : 
security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution
    
K2
White Paper Published By: Druva     Published Date: Jan 06, 2016
How to Include Macs in Your Laptop Backup and Data Protection Plans
Tags : 
druva, mac, mac backup, security, protection
    
Druva
White Paper Published By: Druva     Published Date: Jan 06, 2016
Compiled from real life use cases, Blue Hill Research examined how organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to meet their wider data management needs.
Tags : 
druva, blue hill, enterprise, archive, data
    
Druva
Webinar Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response
    
BAE Systems
White Paper Published By: Cisco     Published Date: Jan 05, 2016
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions
Tags : 
cisco, next gen buyer, guide, network security, solutions
    
Cisco
Webinar Published By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices
    
Salesforce
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.