security insight

Results 126 - 150 of 162Sort Results By: Published Date | Title | Company Name

Beyond the Next Generation: Meeting the Converging Demands of Network Security

Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat, networking, security, it management, knowledge management, data management
    
IBM

Fortifying for the Future: Insights from the 2014 IBM Chief Information Security Officer Assessment

Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security, networking, security, it management, knowledge management, data management
    
IBM

Network protection: The untold story

Published By: IBM     Published Date: Jan 07, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, networks, threats, protection, security, enterprise applications, business technology
    
IBM

Network protection: The untold story

Published By: IBM     Published Date: Apr 04, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, network protection, ibm security network protection, network security, security, knowledge management, enterprise applications
    
IBM

Network protection: The untold story

Published By: IBM     Published Date: Sep 30, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats, network, networking, enterprise applications, business technology
    
IBM

GDPR signals big data protection changes worldwide

Published By: IBM     Published Date: Jul 17, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running
Tags : 
    
IBM

GDPR signals big data protection changes worldwide

Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running.
Tags : 
    
Group M_IBM Q418

The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19

Cognitive Unified Endpoint Management with IBM MaaS360

Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM

Cisco FireSIGHT Management Center: Context-Aware and Adaptive Security

Published By: Cisco     Published Date: Nov 17, 2014
Traditional static approaches can’t provide the security you need. They often miss the insight and automation necessary to fully protect your infrastructure.
Tags : 
sourcefire, firesight, management center, context aware, adaptive security, monitoring, automation, critical security, defenses, management center, security, business intelligence
    
Cisco

Cisco 2015 Annual Security Report

Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco

Security Certifications in Mobility: What They Mean and Which to Look For

Published By: BlackBerry     Published Date: Mar 11, 2013
FIPS, CAPS, AISEP, and many more — BlackBerry® has received certification from the most rigorous security testers in the world. In this insightful webinar, find out what they mean and why they matter to enterprises.
Tags : 
blackberry security, certifications, security tests, webinar, security tests, security, wireless, data management, business technology
    
BlackBerry

Security Certifications in Mobility: What They Mean and Which to Look For

Published By: Blackberry     Published Date: Mar 12, 2013
FIPS, CAPS, AISEP, and many more — BlackBerry® has received certification from the most rigorous security testers in the world. In this insightful webinar, find out what they mean and why they matter to enterprises.
Tags : 
blackberry security certifications, organization, blackberry 10, webinar, transition, knowledge management, enterprise applications, mobile computing, mobile data systems, business technology
    
Blackberry

SilverSky Silver Lining Report

Published By: SilverSky     Published Date: Apr 16, 2013
A SilverSky study of 200 U.S. chief information officers and senior level security decision-makers were found that nearly all (97 percent) of respondents indicate their confidence level in the cloud has either increased or stayed the same in the past 12 months. The Silver Lining report provides insights into cloud behavior. Download the report now and see how your peers are feeling about moving to the cloud.
Tags : 
study, cloud, adoption, cloud security, cio, it security, virtualization, security, bandwidth management, backup and recovery, storage management, storage virtualization, cloud computing, data center design and management
    
SilverSky

BlackBerry Cylance 2019 Threat Report

Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
The Cylance 2019 Threat Report represents the company’s piece of the overall cybersecurity puzzle. It details the trends observed and the insights gained, and the threats Cylance’s consulting team, research team, and customers encountered over the past year. Cylance shares this report in the hope that you will put it to good use in our collective fight against the rising tide of cyber attacks worldwide.
Tags : 
    
BlackBerry Cylance

2015 IBM Retail Solutions Guide

Published By: IBM     Published Date: Jul 31, 2015
This guide provides a quick overview of the solutions IBM offers aligned to the three ‘imperatives’ facing the retail industry - to deliver a Smarter Shopping Experience, to build Smarter Merchandising and Supply Networks and to drive Smarter Operations.
Tags : 
ibm, retail solutions, retail industry, supply networks, omni-channel commerce, retail security, performance insights
    
IBM

Symantec Intelligence Report: June 2013

Published By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec

The Forrester Wave™: Endpoint Security, Q1 2013

Published By: Symantec     Published Date: Aug 09, 2013
Symantec Positioned as a Leader in Independent Research Firm Report Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester Wave™: Endpoint Security, Q1 2013 and “remains a good choice” in the endpoint security space. For insight on selecting the right partner to tackle endpoint security challenges, access the full report.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec

Symantec Intelligence Report: September

Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team, security
    
Symantec

2014 Gartner Magic Quadrant for SIEM

Published By: AlienVault     Published Date: Oct 21, 2014
AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM. So, you can go from installation to insight in days, not months. Download the 2014 Gartner MQ for SIEM.
Tags : 
mitigate, threats, detect, affordability, solution, deliver, security, visibility, siem, quadrant, it management
    
AlienVault

Viavi Special Report: Network Tools Hold Critical Insight in Attack Remediation

Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions

Beyond Borders: Identifying Global Sales in a Shrinking Ecommerce World

Published By: Bronto     Published Date: Jan 20, 2017
Bronto partnered with Ipsos Research and Censuswide to survey more than 4000 US, UK and Australian shoppers about their preferences for cross-border shopping, factors that entice them to shop outside their home country, and remaining barriers to global ecommerce. In this paper we found: - Australian consumers (71%) embrace cross-country commerce more than the UK (44%) and the US (42%). - Women and shoppers over 55 years old are more likely to choose merchants in their home country. - The two top reasons for buying from another country are unique merchandise at a better price. - Barriers include concern about shipping costs, distrust of online payments and security worries. - Download this research report to get more valuable insights and advice to help you be the winner in this growing global competition.
Tags : 
bronto, e-commerce, global sales, customer lifecycle
    
Bronto

2015 Website Security Threat Report

Published By: Symantec     Published Date: Oct 01, 2015
Stay up-to-date with Symantec's WSTR 2015: your 3-Part report to the world's current and emerging website security threats. Packed with valuable insights and statistics, it's all you need to know about the threats that impact your online business world.
Tags : 
web security, web threats, online business, e-commerce, security
    
Symantec

2017 Spotlight Report – Use of Managed Security Service Providers (MSSPS)

Published By: AlienVault     Published Date: Oct 20, 2017
This 2017 Spotlight report reveals the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs. You'll learn about key findings including: The predominant driver for organizations to consider managed security services The most critical capabilities organizations look for in MSSPs The most requested security services offered by MSSPs Key benefits respondents have achieved by partnering with an MSSP Whether you are evaluating using an MSSP, or are an MSSP yourself, download this report to gain valuable insights into how MSSPs are helping their clients improve their security posture.
Tags : 
    
AlienVault

Know Your Security Posture - The Importance of Security Assessment

Published By: IBM     Published Date: Aug 21, 2008
Assessments are the key tools for uncovering vulnerabilities in your security that may be well hidden. This webinar explains how your organization can gain value and insight from the various types of security assessments that safeguard the confidentiality, integrity and availability of your critical business data.
Tags : 
ibm, ibm mi, ibm grm, security, high availability, intrusion prevention, data protection
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.