lan security

Results 251 - 275 of 470Sort Results By: Published Date | Title | Company Name

Creating a Security-Rich Environment For Your SOA

Published By: IBM     Published Date: Mar 28, 2008
For many organizations, applications have been moved to an SOA environment and now must be extended to offer a service interface to new sets of users that were not originally planned.  Extending resources in this way requires that you reassess your security risk. To minimize any risk, you need the right level of security checks for user authentication and authorization.
Tags : 
security, tivoli, service oriented architecture
    
IBM

Find the balance between data security and availability.

Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management, security management, risk management, tivoli, data protection, database security
    
IBM

How Hybrid Flash Array Helps Businesses Do More With Less

Published By: NexGen     Published Date: Feb 09, 2015
Data integrity and ultra-high performance dictate the success and growth of many companies. One of these companies is BridgePay Network Solutions, a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Due to the nature of their business, their IT team needed to strike the perfect balance between meeting regulatory-mandated data security measures with the lowest possible levels of latency and response times. As their growth accelerated, BridgePay realized the need to immediately address infrastructure shortcomings and prepare for their future growth. Download the case study now and see how BridgePay built a competitive advantage and scaled transactions by 500% in the same storage footprint using some of the most advanced and differentiated technology available today.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash, it management
    
NexGen

Ten Tips for Increasing Operational Efficiency

Published By: Cisco     Published Date: Jan 29, 2009
The following are 10 tips for using network technology to help your business increase operational efficiency, reduce costs, improve customer satisfaction, and stay ahead of the competition.
Tags : 
cisco, increasing operational efficiency, boost operational efficiency, mobile employees, smb employees, secure wireless access, outsource it tasks, improve employee retention, long-term technology plan, value-added resellers, vars, managed service providers, security and vpn, unified communications, cisco business application connectors, cisco systems capital, enterprise applications, vpn, customer relationship management
    
Cisco

The Cost of PCI Compliance

Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : 
pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware, and software, achieving pci standards compliance, protect against security breaches, security management, security policies
    
NeoSpire Managed Hosting

Achieving NERC Compliance Through Tripwire IT Security and Compliance Automation Solutions

Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log, event management, compliance, internet security, business process automation
    
Tripwire, Inc

Smooth Transition: Preparing for International Financial Reporting Standards (IFRS)

Published By: Epicor     Published Date: Feb 22, 2010
This white paper covers how to effectively managing the upcoming transition for US registered companies to file their financial statements in International Financial Reporting Standards (IFRS) format.
Tags : 
epicor, ifrs, sec, enterprise resource planning, erp, general ledger, accounting, security, security policies, financial management
    
Epicor

Dental Office Builds More Secure, Patient-Friendly Practice

Published By: Cisco     Published Date: Mar 10, 2011
All-in-one video surveillance solution helps Skye Dental improve office security and deliver superior patient experience.
Tags : 
cisco, business phone system, voip, video surveillance, security, voice and data communication, ip networks, ip telephony, video conferencing, voice recognition, voice over ip
    
Cisco

7 Steps to Developing a Cloud Security Plan

Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security, business technology
    
Navisite- A Time Warner Cable Company

The fundamentals of security and management of software

Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management, software testing, software compliance, virtualization
    
CDW

Mobile Security for Networks without Borders

Published By: CDW     Published Date: Jul 08, 2015
It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.
Tags : 
security, vulnerability management, analytics, mobile security, byod, mdm, application security, policy based management, mobile device management, data loss prevention
    
CDW

New Set of Network Security Challenges

Published By: Dell SonicWALL     Published Date: Nov 28, 2012
A new IDG survey reveals optimism about the ability of next- generation firewalls to help IT balance productivity and security.
Tags : 
firewall security, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management, application intelligence, whitepaper, mobile, social, tablets, byod, security, anti spam, anti spyware, anti virus, hacker detection, internet security
    
Dell SonicWALL

Advanced Evasion Techniques for Dummies

Published By: McAfee     Published Date: Apr 14, 2014
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee

Next-Generation Authentication: Keys to Balancing Security and Convenience

Published By: SafeNet     Published Date: Jan 14, 2014
The demands for heightened security through the use of multi-factor authentication are pressing, but so is the need to control budgets and give users convenient access to the data and services they need. It is growing increasingly clear that organizations can’t meet these demands with legacy platforms—they need next-generation authentication. This paper examines why this need for next-generation authentication is so vital, and it offers a detailed look at the key characteristics that distinguish these platforms from other alternatives.
Tags : 
authentication, next-generation, cloud computing, internet security, safenet
    
SafeNet

Information Security Threat Landscape: Recent Trends and 2015 Outlook

Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security, it management
    
Cyveillance

10 Myths About Cyber Threat Intelligence Separating Fact from Fiction

Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud, networking, security
    
Cyveillance

An Alternative to Today's Distributed Content Security Chaos

Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture, it management
    
Box

2015 Cyberthreat Defense Report

Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense, it management, knowledge management, data management
    
ThreatTrack Security

What You Need To Know About Vendor Risk Management In Financial Institutions

Published By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector, it management, knowledge management, enterprise applications
    
BitSight Technologies

ESG: NetApp Is Accelerating Your Data Protection Strategy to the Clouds

Published By: NetApp     Published Date: Mar 11, 2015
Improving data backup and recovery continues to be a top priority among senior IT decision makers, as highlighted in a 2015 IT Spending Intentions survey conducted by ESG. Organizations plan to invest in modernizing data protection, including the cloud. Learn the key considerations when evaluating a cloud-extended data protection solution that provides security, efficiency, effectiveness, and risk mitigation.
Tags : 
    
NetApp

Smart Protection Complete: Complete User Protection Provides Better, Simpler, More Flexible Security

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : 
user protection, security, cloud, endpoint, application, network, networking, it management
    
CDW-Trend Micro

Windows Security with EMM: Reduce TCO by up to 80%

Published By: MobileIron     Published Date: Oct 21, 2016
Planning the transition to EMM and quantifying potential cost savings require a detailed analysis of an organization’s existing security and management infrastructure. The TCO model and worksheet in this paper can provide a good starting point. Download now!
Tags : 
    
MobileIron

Gartner Research: Strengthen E-Discovery Readiness To Reduce Cost And Risk

Published By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
    
Mimecast

Learn about The Total Economic Impact of the Flexera Data Platform

Published By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
    
Flexera

How Snapper Further Protects Data in Amazon S3 Using CWP for Storage

Published By: AWS     Published Date: Oct 30, 2018
Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
data, amazon, cwp, storage
    
AWS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.