security first

Results 1 - 25 of 88Sort Results By: Published Date | Title | Company Name

Dynamic IT For A Dynamic Workplace

Published By: Lenovo UK     Published Date: Mar 14, 2019
An increasingly tech-savvy workforce is changing the future of work and the workplace. The workplace is now where your people are, not where they go – whether that’s the public space of a coffee shop or private space at home. Working hours are no longer standard, dictated by the tasks to be done, not by the clock. Work tools are no longer based only on workplace technology. The same cool features used in consumer devices, such as touch, are now required for workplace devices. It’s this familiar, smart technology that keeps people, across the generations, happy, productive and engaged. This dynamic IT is the foundation for a smart workplace that will enable you to attract and keep top talent – and shape the future-ready enterprise, now.
Tags : 
dynamic it, smarttechnology, dynamicworkplace, security-first, smartit, workplacesecurity, cybersecurity, iot, artificalintelligence, future-ready
    
Lenovo UK

10 Top Things to Look For in a Cloud Security Solution Provider

Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies

Software in Silicon: What It Does and Why

Published By: Oracle CX     Published Date: Oct 19, 2017
The Software in Silicon design of the SPARC M7 processor, and the recently announced SPARC S7 processor, implement memory access validation directly into the processor so that you can protect application data that resides in memory. It also includes on-chip Data Analytics Accelerator (DAX) engines that are specifically designed to accelerate analytic functions. The DAX engines make in-memory databases and applications run much faster, plus they significantly increase usable memory capacity by allowing compressed databases to be stored in memory without a performance penalty. The following Software in Silicon technologies are implemented in the SPARC S7 and M7 processors: Note: Security in Silicon encompasses both Silicon Secured Memory and cryptographic instruction acceleration, whereas SQL in Silicon includes In-Memory Query Acceleration and In-Line Decompression. Silicon Secured Memory is the first-ever end-to-end implementation of memory-access validation done in hardware. It
Tags : 
    
Oracle CX

A Repeatable Cloud-First Deployment Process Model

Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9

Security for the Mobile First Era

Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron

10 Top Things to look for in a Cloud Security Solution Provider

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies

Quantifying the Attacker's First-Mover Advantage

Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable

RAND Study Phase 2

Published By: Juniper Networks     Published Date: Oct 19, 2015
New Juniper Networks-sponsored research, by the RAND Corporation, “The Defender’s Dilemma: Charting a Course Toward Cybersecurity,” introduces a first-of-its-kind heuristic model that helps companies map the economic drivers and challenges of defense.
Tags : 
juniper, rand, cybercrime, cybersecurity, threat, malware, security, research
    
Juniper Networks

MobileIron Solution Guide

Published By: MobileIron     Published Date: Sep 07, 2017
Secure corporate data, drive employee productivity, and enable business innovation in ways you never thought possible. Harness the power of mobile devices with the leading enterprise mobility management (EMM) platform from MobileIron. By providing a modern EMM solution that meets both user demands and IT security requirements, MobileIron enables today’s large enterprises to become truly Mobile First.
Tags : 
mobileiron, information technology, platform, security, mobile devices
    
MobileIron

The Payment Card Industry Data Security Standard and CA Privileged Access Management

Published By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies

Truth About Cloud Security

Published By: Citrix ShareFile     Published Date: Nov 09, 2016
There are many headlines about security challenges but first impressions can be deceiving.
Tags : 
networking, security, it management, wireless, knowledge management, enterprise applications, data management, electronics, business technology, telecom
    
Citrix ShareFile

Whitepaper: File Sharing Without Fear

Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry

Security for the Mobile First Era: Mobile Operating Systems are Inherently Secure

Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity, wireless, enterprise applications
    
MobileIron

Osterman Research - Best Practices for Implementing Security Awareness Training

Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast

The Latest State of Email Security Report

Published By: Mimecast     Published Date: Mar 19, 2019
The Latest Threats, Confidence Killers And Bad Behaviors – And How To Fix Them Email. You use it constantly. And it’s the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, it’s supposed to just work, right? But if email isn’t part of an organization’s core security strategy, it can become a major vulnerability. Get this report to learn: -How employees are your first and last line of defense in attacks -Ways to adjust your approach to prioritize educating the riskiest employees -The magnitude of growth around impersonation attacks and phishing
Tags : 
    
Mimecast

Solution Brief: Security when off the corporate network, off the VPN.  

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Why organizations use Umbrella: The easiest and fastest security you'll ever deploy. - There is no hardware to install or software to manually update. - For the first time, adding security won’t add any additional latency. - Our endpoint footprint is one-quarter the size of antivirus because everything happens in the cloud, and when a new version is available, it automatically updates without reboots. To find out more about how Cisco Umbrella can help your business download this Solution Brief today.
Tags : 
    
Cisco Umbrella EMEA

Automating the Identity Lifecycle with Okta Provisioning

Published By: Okta     Published Date: Jun 03, 2016
Increasingly companies are employing cloud solutions as the foundation for running their business. Okta builds on that foundation with a full suite of identity, mobility and security products that are all fully integrated into one platform for internal and external users. Okta is the identity management foundation for a cloud-first IT architecture that enables you to take the lead in adopting new applications and enabling mobile for your organization to drive growth. In this webinar with Okta, and customer Medallia, learn about the benefits of Okta Provisioning to maximize security, efficiency and productivity, and how Medallia recognized significant IT savings and >900% ROI. Speakers: Ed Sawma, Director Product Marketing, Okta Jonathan Hansen, Head of IT, Medallia
Tags : 
    
Okta

The Ultimate Guide to BYOD

Published By: MobileIron     Published Date: May 07, 2018
The global BYOD and enterprise mobility market continues to experience impressive growth. Preparing for this transformation is more than just a matter of security. It’s a matter of leveraging the people, processes and tools needed to become a Mobile First organization that’s ready to explore a whole new opportunity landscape. This BYOD guide is a great first step toward achieving your mobile transformation by implementing a successful BYOD program. By following the recommendations in this guide, you can deliver a program that meets the needs and preferences of mobile workers, while upholding corporate security and budget requirements. But the true success of any BYOD program depends on its long-term sustainability, which means you must ensure the security of your corporate data, drive user adoption by supporting employees’ device preferences and maintain a flexible technology portfolio that enables business innovation.
Tags : 
guide, byod, mobility, landscape, organization, program, mobile
    
MobileIron

The 7 Habits of Highly Effective API and Service Management

Published By: MuleSoft     Published Date: Apr 13, 2016
New Enterprise challenge has emerged. With the number of APIs growing rapidly, managing them one-off or via Excel or corporate wiki is no longer feasible. The smartest organizations have discovered a set of best practices to design powerful APIs that leverage existing services, to effectively manage those APIs throughout their lifecycle and to scale their deployment across consumers and devices. This eBook examines the relationship between APIs and services and presents the key elements of a successful API strategy in the form of 7 habits. In this eBook you will learn: - How to leverage existing services in the API economy - Where to get started with your API strategy - Key criteria for selecting an API Management solution - Strategies to overcome API security and identity challenges - How and why to apply the fundamentals of API First Design
Tags : 
service management, enterprise applications, best practices, business management, business strategy, application integration, business intelligence, service oriented architecture, web service management, content management system
    
MuleSoft

Buyer's Guide to Mobile Application Platforms

Published By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, mobile, hybrid, buyer's guide, mobile applications, mobile application platforms, mobile computing, mobile data systems, mobile workers, wireless application software
    
IBM

Cloud First, Now What? - Cloud Security Alliance Paper

Published By: Palo Alto Networks     Published Date: Dec 02, 2016
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered.
Tags : 
palo alto, automated malware, security, cloud
    
Palo Alto Networks

Creating an Enterprise Risk Management (ERM) program is a value-add for your organization

Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv

The GDPR advantage with IBM Cloud

Published By: IBM     Published Date: Aug 07, 2018
Learn about the top needs and challenges for GDPR compliancy and how IBM resolves these challenges with a security first cloud approach.
Tags : 
    
IBM

"Rethinking Web & Email Security" Webinar, Featuring Gartner Analyst, Peter Firstbrook

Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security

Security when off the corporate network, off the VPN

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Your CISO is faced with two dilemmas: Too much malware reaches you and perimeter security is often blind. Our solution is to use DNS as the first layer of always-on network security.
Tags : 
    
Cisco Umbrella EMEA
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.