systems security

Results 1 - 25 of 314Sort Results By: Published Date | Title | Company Name

What Financial Institutions Should Look for in a Managed Security Service Provider

Published By: BAE Systems     Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
Tags : 
bae systems, applied intelligence, financial institution, managed security, managed security services, managed security service provider, mssp, data breach
    
BAE Systems

10 File Transfer Challenges that impact Discovery and Adoption of New Best Practices

Published By: Ipswitch     Published Date: Mar 14, 2014
This newly-released e-Guide provides senior technology leaders with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.
Tags : 
ipswitch, file transfer, stagnation, automation, file management, file management systems, file transfer systems, productivity
    
Ipswitch

2018 Cloud Security Report

Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9

2018 Global State of Priviledge Access Management

Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19

3 steps to IT modernization

Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box

4 Critical Features of a Cyber-Resilient Architecture

Published By: Dell Server     Published Date: Aug 08, 2018
PowerEdge servers protect your customers and business with integrated security Analysts say attacks on firmware are becoming a greater threat to systems, making a cyber-resilient server architecture essential to the modern data center. Dell EMC PowerEdge servers, powered by Intel® Xeon® Scalable processors, deliver comprehensive management tools and robust layers of security to protect hardware and firmware throughout the server lifecycle.
Tags : 
    
Dell Server

4 Key Qualities of Effective Host-Based Intrusion Prevention (HIP) Systems

Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips
    
Third Brigade

4 Mobile Security Insights for CISOs

Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout

451 Research: Cloud Complexity Drives Need for Consulting Partners

Published By: effectual     Published Date: Dec 03, 2018
Multi-Cloud, hybrid strategies add complexity Nearly 60% of businesses say they're moving toward hybrid IT enviornments that integrate on-premises systems and public cloud resources and enable workloads to be pleaced according to performance, security and dependency requirements. Identifying the best execution venue is a key cloud hurdle.
Tags : 
cloud enablement, cloud optimization, digital transformation, cloud migration, cloud computing, cloud architecture
    
effectual

4G LTE Retail Solutions

Published By: CradlePoint     Published Date: May 17, 2016
Always-on Connections for Store Networks and Powering Intelligent Systems In the fast-paced world of retail, network reliability is everything—but so are security, agility, and cost-effectiveness. Retailers want it all, and they depend on their IT administrators to balance these needs. Whether it’s ensuring an always-on connection for store networks, powering intelligent systems aimed at swaying buyer behavior, or transmitting real-time analytics to inform marketing and inventory decisions, the bedrock of successful retailing is a network that can support the growing list of mission-critical applications dependent on secure Internet connectivity. In the past, finding a solution to balance these demands has been difficult at best. Less expensive wired options like DSL mean hours of downtime each month. Alternatives like T1 connections deliver more uptime but carry a price tag that usually puts large-scale distributed deployments out of reach.
Tags : 
    
CradlePoint

5 Cyber Security Imperatives For Power Executives

Published By: GE Power     Published Date: Oct 05, 2016
Cyber attacks against utilities and power producers are on the rise. Prudent leaders are taking action now to lock down their control systems and operations assets before a potentially catastrophic event occurs. Download the eBook “5 Security Imperatives for Power Executives” to learn how to prepare and react to threats to your business and the public you serve.
Tags : 
energy cyber security, power plant cyber security, digital security for power plants, dcs security, ics security, power plant cyber risk
    
GE Power

5 Steps to Improve Your Cyber Security Incident Response Plan

Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
It’s practically impossible to be completely prepared for a security incident – invariably something happens that best laid plans don’t address. But that doesn’t mean organizations shouldn’t try.
Tags : 
resilient systems, cyber security, incident response, plan, guide, security, data management, business technology
    
Resilient Systems, Inc.

6 Benefits of Upgrading to Windows 10

Published By: Dell     Published Date: Feb 04, 2016
Not only do outdated systems pose security risks, they also prevent the organization from accessing the benefits of a modern operating system. Download this whitepaper to learn six of the most noteworthy.
Tags : 
    
Dell

6 Must-Haves for Modern Financial Management Systems

Published By: Workday     Published Date: Sep 08, 2015
Download this white paper to understand the six key capabilities that separate Workday Financial Management from old-world business apps.
Tags : 
financial systems, finance technology, workday, security, payroll software, financial management, cloud computing, modern financial mangement system
    
Workday

6 Ways to Make Your Security Stack Work Harder

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA

8 Steps to Measure ADM Vendor Deliverables

Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST

A New Approach to Combating First-Party Fraud

Published By: BAE Systems     Published Date: Dec 29, 2015
Learn about the challenges involved in combating first-party fraud and emerging best practices
Tags : 
bae systems, applied intelligence, fraud, first-party fraud, financial institution, network analytics, detection, prevention
    
BAE Systems

A New Security Approach for Today's Advanced Attacks

Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses
    
FireEye

A remedy for IT complexity and sprawl: Standardization

Published By: Red Hat     Published Date: Dec 23, 2014
What if you could rapidly grow your business while eliminating the complexity and multiple operating systems, administration and management tools, and security and compliance requirements? See how many good things happen when you standardize on open, flexible infrastructure solutions.
Tags : 
standardization, it complexity, multiple operating systems, management tools, compliance requirements, flexible infrastructure, it management
    
Red Hat

A Simple Guide to Penetration Testing

Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth

A Smarter Way to Integrate with SharePoint

Published By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : 
microsoft sharepoint, data integration, security, sharepoint solutions, networking, it management, knowledge management
    
K2

A Wiki-Induced Stimulus for Knowledge Management

Published By: eTouch     Published Date: Aug 04, 2009
The native speakers of the islands of Hawaii probably had no notion of the inadequacy of the Word and Email duopoly to corporate communications when they coined the term Wiki - literally meaning fast. However, Wikis have grown into just that -- a fast and efficient way of fostering knowledge sharing across corporations worldwide; combining elements of Word, email, RSS, plugins and other relevant technologies.
Tags : 
roi, wiki, etouch, rss, plugins, word, email, blog
    
eTouch

Accelerating UK government IT innovation

Published By: MuleSoft     Published Date: Apr 15, 2019
United Kingdom (U.K.) citizens expect fast, connected, and seamless experiences. Government bodies face a growing delta between citizen’s expectations of experience and the reality of how quickly they can deliver now that sophisticated private sector customer experiences are the new standard. Legacy IT stacks, budgetary constraints, and inflexible core systems are only a few of the hurdles government face to overcome the digital transformation imperative. By moving beyond point-to-point integration and embracing reusable microservices, government can increase the speed of delivery without compromising security. Read this whitepaper to learn: Why U.K. government must move beyond point-to-point integration. How API-led connectivity support microservices adoption in government. How government IT teams can use MuleSoft’s Anypoint Platform to better execute against their digital transformation agenda.
Tags : 
    
MuleSoft

Acceptable Use Policy

Published By: NAVEX Global     Published Date: Aug 18, 2016
This guide provides an example of an acceptable use policy of computer systems at an organization.
Tags : 
policy, policy of computer systems, security, security application, application security, policy based management, security management, security policies
    
NAVEX Global

Access Control Integration White Paper

Published By: TDSi     Published Date: Jun 08, 2011
An Essential Guide to Integration of your Security Systems and the Benefits That Can Bring
Tags : 
access control integration, building management system, security management systems, integrated security management systems, integrated access control, intelligent building management system, bms systems, security management systems
    
TDSi
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.