risk control

Results 101 - 125 of 153Sort Results By: Published Date | Title | Company Name

Continuous Security Monitoring

Published By: Qualys     Published Date: Nov 05, 2013
Continuous Monitoring has become an overused and overhyped term in security circles, driven by US Government mandate (now called Continuous Diagnostics and Mitigation). But that doesn’t change the fact that monitoring needs to be a cornerstone of your security program, within the context of a risk-based paradigm. This paper from Securosis discusses Continuous Security Monitoring, including how to do it, and the most applicable use cases they have seen in the real world. It also provides a step-by-step guide for things to do for each use case to move forward with a monitoring initiative.
Tags : 
qualys, securosis, secuirty monitoring, continuous monitoring, continuous security monitoring, cms< security, security programs, risk management, csm platform, use cases, attacks, change control, compliance, security, data protection, cloud computing
    
Qualys

Delivering an Integrated Infrastructure for the Cloud

Published By: Sponsored by HP and Intel®     Published Date: May 10, 2013
Cloud computing has emerged as one of the prevailing IT trends today. By providing greater levels of provisioning and automation, cloud computing can help organizations become more nimble, reduce operating costs, improve application performance, and better allocate their compute resources. It enables organizations to more flexibly scale their IT infrastructure while reducing the administrative burden on IT organizations. But IT departments determined to take advantage of these benefits are at risk of losing control of their infrastructure. Read this white paper to understand how the HP CloudSystem Matrix is an integrated IT infrastructure solution that meets this challenge head-on, enabling organizations to simplify their IT infrastructure, reduce their management burden, and streamline operating costs. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other count
Tags : 
delivering, cloud, integrated infrastructure, hp cloudsystems, operating costs, enabling organizations, it management, knowledge management, enterprise applications, data management
    
Sponsored by HP and Intel®

Data Protection 2.0: It's Not Just Names and Numbers Anymore

Published By: Tripwire     Published Date: Oct 14, 2010
Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how.
Tags : 
tripwire, data protection, data breach risk, threats, compliance, intrusion detection, intrusion prevention, risk management
    
Tripwire

10 Reasons to Choose Mimecast

Published By: Mimecast     Published Date: May 20, 2009
Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.
Tags : 
mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara, compliance, esg, webmail, storage capacity, storage, sales & marketing software, web services, service management, colocation and web hosting
    
Mimecast

Banking Webinar - New Risk Management Strategies

Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, financial, quality, risk, management, cost, reduce costs, effiency, operations, optimization, control, proftits, data center, solution, customer, brms, enterprise applications, customer relationship management, risk management, data center design and management
    
IBM ILOG.

Healthcare Video - How to Improve Customer Experience In Private Health Insurance

Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, health, healthcare, customer, service, private, epxperience, insurance, organization, results, success, barmenia, accurate, control, automate, enterprise applications, customer relationship management, customer service
    
IBM ILOG.

How to Manage Regulatory Compliance & Data Privacy While Keeping Your Data Safe

Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, knowledge management, enterprise applications, data management, data center
    
Intralinks

Breaking Bad: The Risks of Unsecure File Sharing

Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications, business technology
    
Intralinks

The 5 Key Tactics for Dealing with Advanced Persistent Threats

Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, encryption, business scanning, content control, patch management, change management, test environment
    
Lumension

Committed to Memory: Protecting Against Memory-Based Attacks

Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension

Enterprise Information Management: In Support of Operational, Analytic, and Governance Initiatives

Published By: SAP     Published Date: Jan 19, 2010
Your information can be one of your greatest assets - helping you stay on top of regulatory requirements, close to customers, and ahead of the competition. Organizations that pay attention to their data will be the ones to survive and thrive. So how do you obtain a complete view of your information when it is scattered across silos? Or integrate data from structured and unstructured data sources? Or help reduce the risk of inaccurate reporting? And how do you manage your information more effectively to help keep costs from spiraling out of control?
Tags : 
sap, eim, enterprise information management, erp, crm, etl, customer relationship management, enterprise resource planning, enterprise software, information management, project management
    
SAP

GRC Strategies - Finding the Right Balance of Business and IT

Published By: SAP     Published Date: Nov 23, 2009
Increased regulatory requirements, the need for transparency, and the desire to better manage and mitigate risks have combined to make Governance, Risk, and Compliance (GRC) top of mind for both business and Information Technology (IT) executives. Business managers and IT security managers must work collaboratively and continuously to control access and authorization, guarding against fraud and mistakes, while providing the clear visibility that is prerequisite for sound corporate oversight to ensure profitability and compliance.
Tags : 
sap, governance, risk, compliance, grc, risk management, vulnerability management
    
SAP

The Age of Compliance: Preparing for a Riskier and More Regulated World

Published By: SAP     Published Date: Aug 17, 2010
Most organizations find managing risk and compliance a challenge - but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise - and protect both corporate performance and reputation.
Tags : 
sap, risk, regulation, grc, risk, compliance, governance, erm, enterprise risk management, business management, hipaa compliance, risk management
    
SAP

Next Generation Privileged Identity Management: Are You Ready?

Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation

Close the Window on Three Window Server Threat Scenarios

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation

Sans Healthcare

Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys

Developing an Effective Corporate Mobile Policy

Published By: BlackBerry     Published Date: Jun 11, 2008
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise: namely, increased productivity, improved efficiency and improved response times resulting in decreased costs and increased revenue opportunities. But with these advantages come risks, and most have to do with controlling the data contained on wireless devices and the networks and applications to which they connect.
Tags : 
blackberry, corporate mobile policy, enterprise solution, crm, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging
    
BlackBerry

A Smarter Solution to Malware Prevention

Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection, security
    
Webroot Inc

Enforcing IT Change Management Policy

Published By: Tripwire     Published Date: Jul 05, 2007
Discover how high-performing IT organizations are able to create a culture that supports and uses change management to their advantage, facilitating enterprise business goals.
Tags : 
cmdb, configuration management, auditing, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, it management, change management, itil, service management
    
Tripwire

Configuration Audit and Control: 10 Critical Factors for CCM Success

Published By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : 
change management models, auditing, configuration management, security, change management, network security, efficiency, productivity, tripwire, cmdb, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, change control, infrastructure, business metrics
    
Tripwire

HIPAA Security Provisions: Is Your Network Ready for a Physical?

Published By: Tripwire     Published Date: Jun 30, 2009
Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.
Tags : 
tripwire, hipaa, security, provision, network, health, company, system, internal, security, risk, examination, federal, regulation, lawyer, data, control, administration, compliance, healthcare
    
Tripwire

Sustaining SOX Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs

Published By: Tripwire     Published Date: Jun 30, 2009
Since the adoption of SOX, much has been learned about IT compliance. Discover how to make SOX efforts more effective in "Sustaining Sox Compliance."
Tags : 
tripwire, sustain, sox, compliance, practice, risk, control, data, security, system, administration, institution, automated, reduce, cost, effective, sustainability, governance, business, change
    
Tripwire

Avoiding Insider Threats to Enterprise Security

Published By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : 
ibm, user access, enhanced security, security risk, networking, security, it management, knowledge management, data management
    
IBM

Manage Identities & Access for Continuous compliance & reduced risk

Published By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : 
ibm, continuous compliance, reduced risk, security, threat intelligence, iam, data management, business technology
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.