it security practices

Results 151 - 175 of 196Sort Results By: Published Date | Title | Company Name

The Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing, international computing
    
VeriSign Incorp.

Guide to evaluating, implementing & deploying content management systems

Published By: CrownPeak     Published Date: Jun 30, 2009
Congratulations you've decided to embark on the journey to implement a content management system (CMS) for your Web site. This document assumes that you have already built the business case for purchasing a CMS and has been signed off on by the appropriate stakeholders. Learn more today!
Tags : 
crownpeak, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management, enterprise integration, enterprise application
    
CrownPeak

Online Marketing is Content Marketing: Part 2: Technology - The Web Content Marketing Suite

Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management
    
CrownPeak

Securing end-user mobile devices in the enterprise

Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications, business technology, telecom
    
IBM

Meeting Exceptional Security Challenges: Focus on IT Spending and the Right Hires

Published By: Modis     Published Date: Mar 09, 2015
In the wake of the recent Sony data breach, customer and company privacy issues have become a hot topic in the media and the tech sector. The Sony incident and other widely covered consumer-facing data breaches experienced by Target, Home Depot, JPMorgan Chase and others have had a significant financial impact on these companies. Experts are projecting that both the number of incidents and the cost of dealing with data breaches will increase in 2015. To combat these attacks, businesses must respond with a heightened awareness of cybersecurity as well as increased spending on enterprise security as needed. Designating high level executives to lead security and hiring certified security experts are among the best practices for stronger IT security in 2015 and beyond. Download to learn more!
Tags : 
modis, security challenges, it spending, privacy concerns, cybersecurity, security experts, data breaches, consumer facing breaches, security, it management
    
Modis

Boyce Technologies' Additive Solutions to Win Business

Published By: ASME     Published Date: Oct 03, 2019
When Verizon wanted to add new digital and internet-connected kiosks around New York City, they turned to Boyce Technologies and Boyce turned to 3D printing to save them time and money. Boyce Technologies is one of the leading manufacturers of security and communication equipment for the mass transit market in New York. Since incorporating large-format 3D printing, Boyce has seen firsthand how 3D printing helps compress the design, engineering, and production time so they can meet tighter deadlines and get to production faster. Boyce uses its BigRep large-format 3D printers across a variety of applications including prototyping, end-use parts, and vacuum forming molds. Download now to discover: Best practices for integrating 3D printing How a prototyping exercise turned into end use parts for Verizon kiosks around New York City Case studies for end use parts, molds, and prototypes Making the business case for investing in AM
Tags : 
    
ASME

Security Leadership Series: Security Strategies for Success

Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors.
Tags : 
citrix, security, data, policy based management, security management, security policies, best practices, database security, collaboration
    
Citrix Systems, Inc.

SC Magazine: Analyze This! (security brief)

Published By: SAS     Published Date: Jun 10, 2016
Understanding security analytics can be a daunting job. It is more than just analyzing log files but it is less than a full-blown information security platform. In fact, according to Anton Chuvakin, research vice president for security and risk management at Gartner, it is not yet even a “market,” but rather still just a ”concept” that has yet to define best practices.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications, analytics, prevention, network management, business activity monitoring, business analytics, business management
    
SAS

SECURITY LEADERSHIP SERIES: Security Strategies for Success

Published By: Citrix     Published Date: Jul 25, 2014
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.
Tags : 
network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance, business technology
    
Citrix

Vulnerability Management: What you Need to Know to Prioritize Risk

Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault

Cybersecurity for Dummies eBook

Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers, virus, spam, malware, application security, anti spam, anti virus, email security, hacker detection, identity management, security management, wireless security, data protection
    
Palo Alto Networks

Protecting Your Website with Always on SSL

Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl, security
    
Symantec

Securing Your Private Keys As Best Practice for Code Signing Certificates

Published By: Symantec Corporation     Published Date: Feb 25, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : 
symantec, stuxnet, cyber-attack, security, certificate authority, application security, security policies
    
Symantec Corporation

Securing Your Private Keys as Best Practice for Code Signing Certificates

Published By: Symantec Corporation     Published Date: Jun 24, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : 
security, code signing, software, private keys, software development
    
Symantec Corporation

Transitioning from Managed Services to Managed Security

Published By: AlienVault     Published Date: Oct 20, 2017
Transitioning from MSP to MSSP is a well-trodden path and there are a lot of best practices to increase chances of success. Success is due to people, processes, and tech in equal proportions. Generally, new MSSPs should pick a core set of competencies and branch outward from there. In this white paper, Garrett Gross, Director of Field Enablement, AlienVault and Tim Foley, Sr. Manager of Information Security, Dataprise discuss the current state of the market for MSSPs and best practices for new MSSPs.
Tags : 
    
AlienVault

Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance

Published By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan, wlan security, ids, intrusion prevention, intrusion detection, security policy, wireless security policy, airdefense, security policies, sarbanes oxley compliance
    
AirDefense

The Role Of SAN Security In Storage Operations Management

Published By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : 
storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity, database security, data protection, backup, creekpath, security management
    
Creekpath

The Quest to Achieve Best Practices in Healthcare Information Security

Published By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : 
ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy, patient, patient privacy, best practices, hipaa compliance, information management
    
IBM

Winning outsourcing strategies: How to increase value and reduce risk

Published By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : 
quocirca, outsourcing, security, networking, software development, software outsourcing
    
Quocirca

Achieve and Maintain Compliance with PCI Data Security Standard - Part 4

Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, vulnerability management
    
Ecora Software

LAN Security: Identity-Based Solution Guide

Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis, nevis networks, dos, infrastructure, dmz, access control, precision prospects, local area networking, identity management, policy based management, security management
    
Nevis Networks

Using Likewise to Comply with the PCI Data Security Standard

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows, data protection
    
Likewise Software

The Top 10 Software Security Vulnerabilities

Published By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify, security best practices, common vulnerabilities, code, security management
    
HP - Enterprise

The Architecture and Security of SAS Marketing Operations Management

Published By: SAS     Published Date: Apr 16, 2015
This white paper describes the architecture of SAS Marketing Operations Management and various aspects of its deployment and security. The following areas are covered: • High-level architecture overview • Architectural components • Ecosystem • Virtualization • Deployment options • Deployment best practices • Security This paper is intended for those involved in purchasing, selling and implementing SAS Marketing Operations Management, including system administrators and anyone seeking an understanding of the solution’s architecture and security.
Tags : 
    
SAS

Stronger Cybersecurity Starts with Data Management

Published By: SAS     Published Date: Aug 03, 2016
A paradigm shift is underway in the cybersecurity industry. Cybersecurity professionals are moving from a focus on attacker prevention to attacker detection. Preventing the “bad guys” from getting in is still important, but cyber adversaries are increasingly able to bypass even the most sophisticated network defenses. Once inside, it is more important than ever to find these attackers fast, before their activities get buried in the daily volume and pulse of network communications. This is where security analytics holds promise. Security analytics provides the necessary and timely visibility into normal and abnormal network behavior. This visibility enables devices and entities acting suspiciously to be quickly identified and investigated.
Tags : 
cyber security, security, best practices, attacker prevention, paradigm shift, security analytics, technology, business analytics, business technology
    
SAS
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.