information risk

Results 151 - 175 of 207Sort Results By: Published Date | Title | Company Name

Learn How to Mitigate Bad Actors by Integrating SIEM and Threat Intelligence

Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected, access control, anti spam, anti spyware, anti virus, application security, auditing, compliance, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, analytical applications
    
McAfee

Five Tips for Outsmarting the Information Age Adversary

Published By: Tripwire     Published Date: Jan 29, 2013
Download this paper to learn five actions that will enhance your approach to information risk management and security and help you stay one step ahead of the information age adversary.
Tags : 
risk management, irms, it security, security
    
Tripwire

ESG Technology Brief: Real-Time Risk Management

Published By: McAfee     Published Date: Jan 23, 2013
Information security based on regulatory compliance stipulations cannot keep up with today’s sophisticated and rapidly changing threat landscape. CISOs need to implement a new discipline that ESG calls, “Real-time Risk Management."
Tags : 
enterprise strategy group, esg, jon oltsik, real-time risk management, threats and vulnerabilities, security, it management, data management, business technology
    
McAfee

10 Steps to Risk-Based Security Management

Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management, data management, business technology, data center
    
Tripwire

HIPAA Compliant Data Centers

Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure, patients, utmost, security, confidentiality, integrity, sensitive, information, compliant, compliance, practice, particular, emphasis
    
Dell Storage

ForeScout CounterACT and Compliance

Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control, maps, leading, compliance, mandates, and helps, automate, grc, operations, federal, rules, nerc, ffiec
    
ForeScout

How Predictive Operational Analytics Help Manage Physical and Virtual Assets

Published By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : 
ibm, technology, predictive operational analytics, spss, business analytics, business intelligence, business management, application integration, analytical applications, business technology, infrastructure
    
IBM

Capitalizing on the Software Asset Management Imperative

Published By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : 
software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction, ibm tivoli, business alignment, it infrastructure library, itil, it strategy, it planning, software licences, analytics, audit preparedness, virtualization, cloud, saas
    
IBM

Four Missing Components that Put Your Data Center Consolidation/Migration Project at Risk

Published By: Riverbed     Published Date: May 18, 2012
Data center consolidation and migration projects are fraught with risk. By using Network Behavior Analysis (NBA) systems to get a handle on dependency information, usage information, change impact information, and post-change problem identification, IT organizations can significantly reduce risk by automating and improving the planning process and minimizing disruption during implementation. Download this informative Riverbed white paper to learn more.
Tags : 
data center consolidation, migration, it infrastructure, network behavior analysis, nba analysis, it management, knowledge management, platforms, storage, data management, business technology, data center
    
Riverbed

The Future Of Data Security And Privacy: Controlling Big Data

Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing, application security, database development, database security
    
Forrester

Learn How Security Intelligence Can Help Combat WikiLeaks Stuxnet and Advanced Threats

Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs

Worldwide Retailer Boosts Privacy with Security Intelligence

Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution, access control, identity management, internet security, intrusion detection
    
Q1 Labs

Transitioning from SIEM to Total Security Intelligence

Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, access control, authentication, identity management, internet security, intrusion prevention, data protection
    
Q1 Labs

Why Corporate Compliance and IT Security Must Join Forces

Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : 
brainloop, technology, security, it security, end users, access control, internet security, security management, security policies, vulnerability management
    
Brainloop

Building a Foundation for Information Governance

Published By: OpenText     Published Date: Dec 14, 2011
An organization cannot sustain long-term success without managing its information effectively... Building a foundation for information governance is your next step.
Tags : 
information governance, open text, opentext, governance, information management, risks, storage, storage costs, sustainability, sustainable, application integration, best practices, business activity monitoring, business integration, business intelligence, business management, it spending, product lifecycle management, project management, return on investment
    
OpenText

Managing Information Risk: Why Compliance and Security Must Join Forces

Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop

New demands for security and compliance in online collaboration

Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
    
Brainloop

Defending Against Insider Threats To Reduce Your IT risk

Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business, access control, anti virus, application security, identity management, internet security, security management, web service security, vulnerability management
    
CA Technologies

Data Management for Smarter Business Outcomes

Published By: IBM     Published Date: Sep 22, 2011
This e-book offers tips and solutions to help you optimize infrastructure, boost development productivity and improve database administrator (DBA) efficiency. With intelligent actions and technologies, you can better manage and deliver the information your company needs-along with cost savings, risk reduction and increased performance-to drive smarter business outcomes.
Tags : 
ibm, data management, dba, productivity, infrastructure, development, productivity, application integration, analytical applications, data protection, data quality, data deduplication
    
IBM

The Case for User Provisioning with Andras Cser

Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa, it process automation, security, active directory management, data protection, information security, identity management, identity and access management, staffing, provisioning, threat, iam, privilege delegation
    
NetIQ

Where is Your Risk?

Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models, cat, centroid, collective catastrophe, multilingual data, risk exposure, business intelligence
    
Trillium Software

Is Encryption Compromising Your Network?

Published By: Safenet     Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management, ethernet networking, wide area networks, encryption, network security appliance, risk management, total cost of ownership, information management
    
Safenet

High Speed Ethernet WAN: Is Encryption Compromising Your Network?

Published By: SafeNet     Published Date: Oct 06, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management, ethernet networking, wide area networks, encryption, network security appliance, risk management, total cost of ownership, information management
    
SafeNet

Bullet-Proofing Instant Messaging

Published By: Symantec.cloud     Published Date: Aug 10, 2010
Off-the-shelf instant messaging (IM) lets malware into the Enterprise, and compromises regulatory compliance and copyright protection. Find out how a secure IM service can keep you covered.
Tags : 
messagelabs us, instant messaging, malware, information mobile worker, saas, security risk, anti spam, secure instant messaging, mobile computing, mobile data systems, mobile workers, wireless messaging, risk management, information management, messaging
    
Symantec.cloud

Achieving Operational Responsiveness Through Responsive Process Management

Published By: Progress Software     Published Date: May 27, 2010
According to an independent study from research firm Vanson Bourne, most businesses have a long way to go before they are able to respond to market or customer changes quickly enough to be competitive. Unfortunately for businesses, there's often a disconnect between business objectives and what information technology can deliver. This whitepaper will demonstrate how Progress Software can empower your company to respond to changing conditions and business events as they occur, enabling business leaders to capitalize on commercial opportunities, drive greater efficiencies in their organizations, and reduce risk.
Tags : 
rpm, responsive process management, operational responsiveness, progress, application performance management, best practices, business activity monitoring, business integration, business intelligence
    
Progress Software
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.