it security practices

Results 51 - 75 of 196Sort Results By: Published Date | Title | Company Name

How To Gain Control Of Your Microsoft Azure Environment

Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
In today’s fast-moving, competitive environment, companies are migrating to Microsoft Azure to increase their agility and decrease their time to market. While the payoff for adopting Azure can be great, many are finding it difficult to reach the cloud and business success they originally hoped for. It’s common for organizations investing in Azure to encounter numerous roadblocks early in their cloud journey, including monthly bills exponentially higher than anticipated and underutilized resources. For organizations looking to reach cloud maturity—where cost and performance are optimized, security and compliance best practices are established, and one’s environment is governed by policy-driven automation—gaining control of their Azure infrastructure is crucial. The goal of this eBook is to help with just that. For those of considering Azure or who are currently in the migration phase of your Azure cloud journey, we offer insight and expert best practices to make the early stages of your
Tags : 
    
CloudHealth by VMware

Top 10 Best Practices for Cloud Security Posture Management

Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware

Growing Government Cyber Intelligence

Published By: IBM     Published Date: Jan 13, 2017
As traditional network perimeters surrounding data centers dissolve, agencies face enormous difficulties fending off attacks using a patchwork of traditional security tools to protect classified or personally identifiable information (PII). Time and again, traditional security practices have proven porous and/or unsustainable. Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence -Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM

Achieving Advance Security and Data Compliance with DSE

Published By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax

Achieving Advance Security and Data Compliance with DSE

Published By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax

Isolation Best Practices for Financial Services Institutions

Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security

How to Make Your Software Security Program Successful

Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx

Cybersecurity for Dummies

Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
Palo Alto Networks

Measuring the confidence of IT leaders in their data and security practices

Published By: Oracle     Published Date: Jun 04, 2019
The results presented in this report are based on a mobile-only, 23-question global survey. This survey targeted Manager, Director, Vice President or C-Level executives with influence in the decision-making process of cloud solutions, platforms, and infrastructure or department specific software. Respondents worked within organisations generating revenues between less than £1 million to more than £500 million, with 100 to 50,000 employees. Who believes they are truly capable of managing this deluge of data? To find out download this survey today!
Tags : 
    
Oracle

Trusting Business with Data Webinar

Published By: Oracle     Published Date: Sep 30, 2019
Company reputations are at stake— unless they’re sure of their data security and practices in the face of multiplying data volumes. There is now a need to understand the responsibilities and the need for the entire company to commit to a digital trust framework. In this episode of the Tomorrow Talks series, IDC and Oracle discuss how data security and practices are no longer the remit of CIOs and CISOs alone. To find out more, watch this webinar today.
Tags : 
    
Oracle

Trusting Business with Data Webinar

Published By: Oracle     Published Date: Sep 09, 2019
Company reputations are at stake— unless they’re sure of their data security and practices in the face of multiplying data volumes. There is now a need to understand the responsibilities and the need for the entire company to commit to a digital trust framework. In this episode of the Tomorrow Talks series, IDC and Oracle discuss how data security and practices are no longer the remit of CIOs and CISOs alone. To find out more, watch this webinar today.
Tags : 
    
Oracle

Narrowing the Security Gap with Automated Configuration Assessment

Published By: Qualys     Published Date: Jun 02, 2015
In this guide, Qualys describes internal risks to IT security and three best practices to control incorrect configurations. Critical components to this include automation of assessments and prioritization of risks. By using the automation technology in Qualys Policy Compliance, organizations can ensure the safety of sensitive data and IT while meeting mandates for compliance.
Tags : 
security gap, automated configuration assessment, it security, compliance, security
    
Qualys

5 Best Practices for Mitigating Medical Device Security Risks

Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software

Android Enterprise & MobileIron

Published By: MobileIron     Published Date: Feb 14, 2019
Google’s Android enterprise is fast tracking a more connected workforce, with multiple layers of security along with new innovative features, and comprehensive management. Despite the growing popularity of Android, few enterprises are leveraging the full benefits of Android mobility in their organization. In this webinar, we discuss simple best-practices for how Google’s Android enterprise can be securely leveraged in the enterprise with UEM.
Tags : 
    
MobileIron

eBook: How to Accelerate Your AWS Cloud Journey to Reach Cloud Maturity

Published By: CloudHealth by VMware     Published Date: Apr 08, 2019
Organizations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimize your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
    
CloudHealth by VMware

Building and Managing Secure APIs

Published By: Google Apigee     Published Date: Mar 06, 2019
Inside the API Product Mindset APIs expose data or functionality for use by applications and developers, which means they allow access to a business’s valuable digital assets—and thus to the heart of the business itself. Vulnerable APIs can expose a business’s core data and services to a variety of threats. Therefore, API security should be of paramount importance to any enterprise that exposes digital assets. Google Cloud’s new eBook, Building and Managing Secure APIs, takes a deeper look at the do’s and don’ts of enterprise API security. Explore how to design secure, easy-to-use APIs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use cases ? API monetization checklist
Tags : 
    
Google Apigee

Security Without Compromise

Published By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : 
security, firewall, next generation, applications, byod, threats
    
Cisco

Security Without Compromise

Published By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : 
security, firewall, next generation, applications, byod, threats
    
Cisco

5 Best Practices for Network Discovery & Management in 2013

Published By: Kaseya     Published Date: Jan 14, 2013
Like 62% of your peers*, do you lack an easy way to discover and manage devices both on and off your network? One thing that won’t change in 2013 for IT Pros is the daily onslaught of challenges. Learn about 5 best practices for network discovery
Tags : 
kaseya, it automation, discovery & management, free webinar, increasing security, 5 best practices for network discovery, it management, data management
    
Kaseya

Security Policy: Five Keys to User Compliance

Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security
    
Brainloop

Passing PCI Compliance Section 6.6: Code Reviews and Application Firewalls

Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise

How are Open Source Development Communities Embracing Security Best Practices?

Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities
    
HP - Enterprise

A CISO's Guide to Securing Open Source Software

Published By: HP - Enterprise     Published Date: Nov 19, 2008
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise

eBook: Achieve Complete Security

Published By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where you’re still unprotected and what you need to do complete your security portfolio.
Tags : 
security, network security, enterprise, infrastructure, best practices, vulnerability, access control, anti spam
    
HP - Enterprise

Mobility Tech Dossier: There’s an app for that but is it secure?

Published By: HP - Enterprise     Published Date: Jan 24, 2013
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Tags : 
mobile, vulnerability, byod, dast, sast, testing, risk management, security management
    
HP - Enterprise
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.