mitigate

Results 76 - 100 of 269Sort Results By: Published Date | Title | Company Name

Anatomy of a Botnet

Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet, business technology
    
Arbor

Pipeline Integrity: How to Detect, Prevent and Mitigate Commodity Releases

Published By: Schneider Electric     Published Date: May 04, 2016
This paper discusses advanced technologies and tools that enable greater pipeline integrity, particularly computational pipeline monitoring (CPM) methodologies as a means to identify anomalies that signal a possible commodity pipeline release.
Tags : 
pipeline integrity, oil and gas, pipelines, control room, control room management, leak detection, schneider electric, telvent, lars larrsen, kelly doran, data management, business technology
    
Schneider Electric

Controlling Web 2.0 Applications in the Enterprise

Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security, application security, network security appliance, security management, vulnerability management
    
Fortinet, Inc.

4 Considerations to Meet FINRA & SEC Regulations

Published By: Smarsh     Published Date: Dec 07, 2016
To meet the requirements of FINRA & SEC, you must first understand what they require of investment firms and organizations. Better yet, you must understand what is classified as a violation of those rules, then put practices in play that mitigate the risk and position you as an active advocate for compliance— not a violator or passive enabler for non-compliant activity.
Tags : 
    
Smarsh

Mitigate Risk and Accelerate Time to Value

Published By: Delphix     Published Date: Jun 27, 2014
Making your IT organization more elastic and efficient is hard. Doing it while staying in compliance with regulations is even harder. Download this white paper to learn how your IT organization can accelerate business, introduce new services, and reach new markets, all while staying in compliance.
Tags : 
mitigation, time to value, regulations, organization, new markets, compliance, networking, it management, data management
    
Delphix

5 Ways Community Banks can Leverage CRM Solutions to Boost Profitability

Published By: Salesforce.com     Published Date: Jul 02, 2014
The most successful community banks are using advanced customer relations management (CRM) and collaboration technology to mitigate risks and maximize opportunities. Are you ready to take the first step towards a more profitable future? Download this white paper to learn how.
Tags : 
salesforce.com, community banks, customer relations management, crm, collaboration technology, mitigate risks, maximize opportunities, knowledge management, enterprise applications
    
Salesforce.com

Increase Collaboration to Convert More Leads

Published By: Salesforce.com     Published Date: Jul 02, 2014
Providing a consistent picture of the customer household to every line of business results in more lead conversion, cross-selling opportunities and an outstanding customer experience. In this webinar, Kennebunk Savings Bank shares how it transformed its business by breaking down silos, increasing sales effectiveness and orienting all lines of business around the customer.
Tags : 
salesforce.com, community banks, customer relations management, crm, collaboration technology, mitigate risks, maximize opportunities, knowledge management, enterprise applications
    
Salesforce.com

Marketing for Banks

Published By: Salesforce.com     Published Date: Jul 02, 2014
Hear directly from First Midwest Bank about their proven success strategies leveraging ExactTarget to better market their bank.
Tags : 
salesforce.com, community banks, customer relations management, crm, collaboration technology, mitigate risks, maximize opportunities, knowledge management, enterprise applications
    
Salesforce.com

Getting Back the Community to the Bank

Published By: Salesforce.com     Published Date: Jul 02, 2014
Hear directly from New Hampshire Bank on how it trained 300 users on salesforce.com and watch a live demonstration.
Tags : 
salesforce.com, community banks, customer relations management, crm, collaboration technology, mitigate risks, maximize opportunities, knowledge management, enterprise applications
    
Salesforce.com

Utilizing Security Ratings for Enterprise IT Risk Mitigation

Published By: BitSight Technologies     Published Date: Feb 03, 2015
In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.
Tags : 
security ratings, it risk mitigation, cyber risk, performance metrics, network security risk, security, it management, knowledge management, best practices, business activity monitoring
    
BitSight Technologies

How to Drastically Improve Your Third-Party Security Compliance

Published By: BitSight Technologies     Published Date: Feb 20, 2015
Learn how to drastically improve your third-party security compliance and see how your organization should make adjustments to ensure you’re protected from unmitigated risks.
Tags : 
bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
BitSight Technologies

IBM i2 Enterprise Insight Analysis for Cyber Threat Analysis

Published By: IBM     Published Date: Jul 27, 2016
Learn how to counter and mitigate more attacks with cyber threat analysis.
Tags : 
ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence, security, business technology
    
IBM

What is Cyber Threat Analysis?

Published By: IBM     Published Date: Oct 06, 2016
Defensive weak spots are just waiting to be found and exploited by persistent cyber attackers. But with cyber threat analysis, you quickly identify, disrupt and mitigate breaches by uncovering critical insights unseen by traditional defenses.
Tags : 
cyber security, threats, enterprise insight analysis, data computation, intelligence, hacker detection, internet security, intrusion detection, security management
    
IBM

New Tools For Protecting Cloud Services From Emerging Threats

Published By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS

Linking Contract Management with Supplier Onboarding: Managing Supplier Risk

Published By: Determine (Selectica)     Published Date: Jun 29, 2017
As our unpredictable world becomes more complex, interdependent and dangerous, it’s becoming harder to manage third-party risk. Traditional financial and operational risks seem like the good old days. Now procurement has to manage, mitigate and avoid risks as disparate as conflict minerals, cybercrime, natural disasters, resource depletion and many others.
Tags : 
    
Determine (Selectica)

Better Together: Linking CLM with SIM to Improve Third Party Risk Management

Published By: Determine (Selectica)     Published Date: Oct 24, 2017
Organizations today and for the foreseeable future must have visibility into supplier and third-party operations in order to mitigate risks and achieve compliance.
Tags : 
    
Determine (Selectica)

The awakening of cyber threat analysis: An intelligence-driven solution to security and risk

Published By: IBM     Published Date: Jan 11, 2017
Download this white paper to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats. - Why security infrastructure protection alone is not enough to thwart cyber criminals, and how you can fortify your existing security strategy. - How the use of both machine led analytics with human led analysis can help you mitigate threats.
Tags : 
ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk, enterprise applications, business technology
    
IBM

Govern your Data IBM StoredIQ and Box

Published By: IBM     Published Date: Feb 16, 2017
This video explains the integrations from IBM StoredIQ and Box that enables data cleanup and discovery. Learn how StoredIQ fits into the solution platform from IBM to help manage and mitigate risk with the use of Box's cloud solution.
Tags : 
ibm, analytics, ecm, ibm storediq, ibm box
    
IBM

Endpoint Backup Compliance Considerations for HIPAA-regulated Enterprises

Published By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : 
hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
    
Druva

O'Reilly Book: DevOps & DNS

Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Today's internet-dependent business landscape demands frequent system changes, higher throughput and increased reliability. If your new features and fixes do not hit the digital market quickly, user experience, customer retention and revenue all take a hit. DNS however, is a tool that can be used to both mitigate problems and optimize the performance and delivery of these systems. Read the latest O'Reilly book to understand how the DevOps approach combined with the fundamentals of DNS can: • Use DNS as a means of distribution, deployment and high-availability • Mitigate failure and minimize risk • Improve system reliability and management Get the O'Reilly Book! "
Tags : 
    
Oracle + Dyn

Whitepaper: Understanding and Mitigating DDoS Attacks

Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DDoS attacks increase by over 100% year over year. What’s scarier is that 82% of enterprises described DDoS attacks as crippling to their business. In order to have a secure disaster recovery plan and overcome these increasingly sophisticated threats you need a highly resilient and scalable DNS infrastructure. Download this quick guide and learn: Common types of DDoS attacks and which layers of your infrastructure are most at risk How to geographically isolate attacks and mitigate latency when you have multiple endpoints How to get the best before, during and after attack protection Get the guide!
Tags : 
    
Oracle + Dyn

A Look at Deception

Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec

Creating an Enterprise Risk Management (ERM) program is a value-add for your organization

Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv

Harnessing the power of open banking

Published By: IBM     Published Date: May 02, 2018
Read about security measures banks should consider to help mitigate risk and gain user trust in today’s Open Banking ecosystem.
Tags : 
open banking, security, risk
    
IBM

Food and Beverage Traceability Ebook

Published By: Sage Software     Published Date: Nov 12, 2018
Sage Business Cloud Enterprise Management offers you a comprehensive, real-time solution that delivers accurate, up-to-date data that identifies and mitigates the consequences of product recalls and other supply chain issues. With Sage Business Cloud Enterprise Management, your food and beverage business will have a faster, simpler and flexible way to keep the costs and reputational damage of recalls to a minimum.
Tags : 
    
Sage Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.