controls

Results 226 - 250 of 305Sort Results By: Published Date | Title | Company Name

Is Virtualization Under Control?

Published By: Tripwire     Published Date: Jul 25, 2008
Tripwire surveyed IT professionals to learn how virtualization is expanding and if security, change controls and compliance requirements are keeping pace. Read this white paper to learn more about the state of virtualization today and why most of the respondents agree that a dedicated configuration tool is needed and are in the process of evaluating or planning to acquire such a tool.
Tags : 
virtual, virtualization, tripwire, configuration, change managemement, change management, server virtualization, configuration management
    
Tripwire

The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
    
Tripwire

Close, Consolidate and Report For Dummies

Published By: IBM     Published Date: Jul 30, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, business analytics, finance, closing, consildating, reporting, reporting process, internal control management
    
IBM

Advanced Endpoint Security for Dummies

Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec

For better access governance, look beyond roles to entitlements

Published By: IBM     Published Date: Jan 09, 2017
Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don’t retain access after they leave the organization. IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : 
ibm, security, identity governance and intelligence, identity governance, entitlements, compliance, enterprise applications, business technology
    
IBM

The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19

Case Study | Applied Materials

Published By: TAKE Supply Chain     Published Date: Mar 18, 2016
TAKE's tailored solution for Applied Materials delivered real-time information and enhanced controls from the initial order to just-in-time parts delivery to the manufacturing shop floor. Results include a 10-15% increase in on-time delivery, 30% reduction in premium freight costs, 25-30% reduction in receiving discrepancies, and an ROI of nearly 500% and $2.5 million in recurring annualized savings.
Tags : 
    
TAKE Supply Chain

IBM MaaS360 with Watson

Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM

Data Leakage Landscape: Where Data Leaks & How Next Generation Tools Apply

Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco

Using Spend Visibility to Drive More Than Category Sourcing Strategies and Spend Reporting

Published By: Zycus     Published Date: Mar 28, 2010
Spend Matters has long argued that spend visibility and contract management have always been two sides of the same coin. Companies can leverage an integrated spend analysis, contract management and P2P solution set to institute real-time controls to validate a number of possible spend variables.
Tags : 
zycus, sourcing, strategic sourcing, procurement, purchasing, sourcing companies, sourcing services, sourcing
    
Zycus

Securing the Modern Data Center

Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development
    
Cisco

Top 10 Reasons why a comprehensive User Rights Management strategy matters

Published By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : 
user rights management, appsense, desktop security, windows optimization, it service requests, secure apps, user productivity, rights management
    
AppSense

Skype for Business + Voice and Video: Your Need-to-Know Guide

Published By: Polycom     Published Date: Aug 16, 2017
"Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business."
Tags : 
polycom, skype for business, voice, video, microsoft
    
Polycom

Skype for Business + Voice and Video: Your Need - to - Know Guide

Published By: Polycom     Published Date: Nov 30, 2017
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business.
Tags : 
skype for business, collaboration, video conferencing, content sharing, call management controls, microsoft office 365
    
Polycom

Data Center Security Challenges Infographic

Published By: Cisco     Published Date: Aug 24, 2015
Download this infographic to learn how data center security challenges are more than a technology issue - they're a human problem.
Tags : 
data center security, human error, security controls, data center segmentation, data security solution, networking, security, it management
    
Cisco

Gartner MarketScope Newsletter for Vulnerability Assessment 2013

Published By: Rapid7     Published Date: Oct 09, 2013
Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.
Tags : 
gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection, network security
    
Rapid7

SANS Report Breaches Happen: Be Prepared

Published By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : 
computer viruses, automated attacks, encryption, deceptive packaging, security controls, security
    
Symantec

How to Detect Ransomware Before it’s Too Late with AlienVault USM

Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

Skype for Business + Voice and Video: Your Need-to-Know Guide

Published By: Polycom     Published Date: Mar 12, 2018
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business.
Tags : 
skype, business, polycom, infrastructure, meeting, enterprise
    
Polycom

The Rise of the Identity-Defined Workspace

Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch

Bring Mac To The Enterprise with A Modern Approach

Published By: VMware     Published Date: Feb 24, 2017
Apple began aligning management profiles in Mac and iOS software years ago so that Macs could be managed alongside iOS devices with mobile device management (MDM). Each macOS update has delivered additional MDM controls, enabling IT to manage more endpoints together. Unified endpoint management brings together traditional client management with a modern enterprise mobility management framework to simplify the management process for IT. This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.
Tags : 
    
VMware

5 Security Controls for an Effective Security Operations Center (SOC)

Published By: AlienVault     Published Date: Mar 30, 2016
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data.
Tags : 
    
AlienVault

CIS Critical Security Controls - Accelerated & Simplified

Published By: AlienVault     Published Date: Mar 30, 2016
The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Tags : 
    
AlienVault

Practical Threat Management for Educational Institutions

Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault

5 Steps to Implement and Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.