mitigate

Results 176 - 200 of 269Sort Results By: Published Date | Title | Company Name

Discover Vulnerability Intelligence for ALL your Applications and Systems

Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera

Protect Your Digital Enterprise

Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications, it management, knowledge management, data management
    
CDW-HPE Servers

How REI Uses Intelligent Threat Detection and Edge Protection on AWS with Splunk

Published By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS

Building Trust in a Cloudy Sky

Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security, cloud data protection, cloud access security broker, cloud survey, cloud usage data, cloud malware, aws security
    
McAfee

Cloud usage is now over 90% but IT is struggling to keep up. Are you? - German

Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud, cloud usage, cloud security
    
McAfee

A Guide to Modern IT Disaster Recovery

Published By: VMware     Published Date: Dec 18, 2012
How to prepare for and mitigate the “Black Swan Events” in your data center
Tags : 
disaster recovery, guide, data center, virtualization, database security, business technology, cloud computing, infrastructure, infrastructure management
    
VMware

How To Find, Prioritize and Mitigate Vulnerabilities in Your Organization

Published By: Rapid7     Published Date: Jul 12, 2012
In this webcast, Bernd Leger, VP of Marketing, Products & Solutions at Rapid7 and Nate Crampton, Product Manager at Rapid7 discuss the current state of how organizations are prioritizing vulnerabilities in their environments and what security professionals can do to lower their security thresholds.
Tags : 
rapid7, technology, security, it management, business technology, security management, security policies, data protection, data quality, vulnerability management
    
Rapid7

Three Steps to Address the Challenges with BYOD

Published By: Rapid7     Published Date: Nov 27, 2012
The "Bring Your Own Device" (BYOD) trend started in late 2009 and caught on with users faster than IT expected, especially as iOS and Android devices became dominant. This webinar will delve into the underlying risks associated with BYOD, and provide a simple step-by-step approach to mitigate their risks.
Tags : 
rapid7, technology, security, it management, business technology, access control, identity management, intrusion prevention
    
Rapid7

Why Corporate Compliance and IT Security Must Join Forces

Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : 
brainloop, technology, security, it security, end users, access control, internet security, security management, security policies, vulnerability management
    
Brainloop

Anatomy of a Siebel CRM Archiving Project

Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, siebel crm, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification, enterprise applications, data management, customer relationship management, return on investment, sla
    
IBM

Anatomy of an Oracle E-Business Suite Archiving Project

Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, oracle e-business suite, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification, enterprise applications, data management, ebusiness, enterprise resource planning, oracle
    
IBM

Anatomy of a JD Edwards EnterpriseOne Archiving Project

Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification, enterprise applications, data management, business management, customer relationship management, enterprise resource planning
    
IBM

Background Check Basics - A Guide to Getting Started

Published By: IntelliCorp     Published Date: May 31, 2012
Need to implement a pre-employment screening solution for your organization or want to evaluate your current program? Download this free whitepaper to receive a clear explanation of what you should consider to help mitigate risk.
Tags : 
intellicorp, background check, pre-employment screening, background screening company, fcra, consumer report, criminal search, sex offender registry, ssn verification, terrorist search, motor vehicle reports, credit reports, education verification, e-verify, drug testing, professional reference, address history, work history, civil records, professional licensing
    
IntelliCorp

Justifying IT Security: Managing Risk & Keeping Your Network Secure

Published By: Qualys     Published Date: Feb 04, 2010
The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, network security appliance, security management, security policies, business management, vulnerability management
    
Qualys

10 Steps to Mitigate a DDoS Attack in Real Time

Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection, secure business, network security, hacker detection, intrusion prevention, data loss prevention
    
F5 Networks

Analyzing the Neverquest Malware Threat

Published By: F5 Networks     Published Date: Mar 18, 2015
Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works and how to mitigate Neverquest.
Tags : 
f5 networks, malware, security, network security, anti spam, anti spyware, anti virus, email security, hacker detection, internet security, intrusion prevention, wireless security, data protection
    
F5 Networks

Streamline Regulatory Compliance in Life Sciences with DTM

Published By: DocuSign     Published Date: Jun 25, 2014
Leading life sciences companies aim to improve health outcomes around the world by delivering breakthrough treatments while complying with safe manufacturing techniques. When quality is compromised, that mission to deliver breakthrough treatments and the lives invested in these efforts are put at risk.
Tags : 
docusign, regulatory compliance, life sciences, dtm, device companies, medical device, pharmaceutical, mitigate risk, knowledge management, enterprise applications
    
DocuSign

GRC Strategies - Finding the Right Balance of Business and IT

Published By: SAP     Published Date: Nov 23, 2009
Increased regulatory requirements, the need for transparency, and the desire to better manage and mitigate risks have combined to make Governance, Risk, and Compliance (GRC) top of mind for both business and Information Technology (IT) executives. Business managers and IT security managers must work collaboratively and continuously to control access and authorization, guarding against fraud and mistakes, while providing the clear visibility that is prerequisite for sound corporate oversight to ensure profitability and compliance.
Tags : 
sap, governance, risk, compliance, grc, risk management, vulnerability management
    
SAP

Enabling the Lean Enterprise Executive Insight

Published By: SAP     Published Date: May 04, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times. Discover how streamlining common processes can reduce costs, and how you can increase the effectiveness and efficiency of the processes that differentiate you from the competition.
Tags : 
sap, lean enterprise, erp, enterprise resource planning, financial objectives, integrated platforms, business management, business process management
    
SAP

Next Generation Privileged Identity Management: Are You Ready?

Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation

Close the Window on Three Window Server Threat Scenarios

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation

A Business Risk Approach to IT Governance

Published By: IBM     Published Date: Jan 20, 2015
An introduction to the key concepts and challenges of IT governance and how these can be efficiently approached and mitigated with IBM® OpenPages® IT Governance.
Tags : 
business risk, it governance, it risk management, kpis, it policies
    
IBM

Secure Document Sharing on Mobile Devices

Published By: IBM MaaS360     Published Date: Feb 05, 2015
Smart companies are realizing a vital part of any mobile device management strategy is to mitigate risk by sealing these security holes in document sharing and finding new ways to enhance information sharing across the enterprise in a secure and compliant manner.
Tags : 
mobile device management, mobile document sharing, risk mitigation, document security, byod, security, it management, document management, information management
    
IBM MaaS360

Save Your IT Budget with an Efficient Exchange Recovery Plan

Published By: Quest Software, Inc.     Published Date: Nov 18, 2010
This white paper describes how real organizations have handled these challenges and how a strong and reliable messaging solution like Quest Recovery Manager for Exchange could have mitigated risk, reduced cost, and improved regulatory compliance.
Tags : 
quest software, messaging, microsoft exchange server, quest recovery manager, business communication, migration, consolidation, backup and recovery, disaster recovery, microsoft exchange, windows server
    
Quest Software, Inc.

Removing the Barriers to IT Governance: How On-Demand Software Changes the Game

Published By: Innotas     Published Date: May 11, 2009
Discover how IT Governance enables IT to meet these expectations, measure performance, manage resources, mitigate risk and make sure that IT aligns activities with the strategic direction of the enterprise - all for a surprisingly low cost.
Tags : 
innotas, it governance, enterprise services, it management, strategy, accountability, cost saving, business intelligence, business activity monitoring, business management, project management
    
Innotas
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.