ciso

Results 1 - 25 of 101Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Feb 15, 2018
La nostra indagine indica nel complesso che la storia di IaaS sta diventando interessante e ha un ruolo preciso in uno scenario IT in evoluzione. Ci sono ancora dubbi e preconcetti, che vanno tuttavia scemando con la graduale adozione da parte delle aziende e il manifestarsi dei primi vantaggi. Nel complesso, la tecnologia IaaS molto pi facile da integrare di quanto non si creda: infatti quasi due terzi (64%) degli utenti di lungo corso indica che la migrazione stata pi semplice del previsto. facile prevedere che il quadro sar sempre pi positivo con laumentare delle aziende che adottano le nuove soluzioni IaaS avanzate ora disponibili sul mercato.
Tags : 
iaas, imparare, service, infrastructure, oracle
    
Oracle
Published By: Google Cloud     Published Date: May 09, 2018
As companies seek to innovate and engage customers through digital channels, they need superstar security leaders business executives who know how to protect, support, and drive performance. This report looks at the biggest changes in firms expectations of their chief information security officers (CISOs) and provides specific examples of how top information security professionals rise to those occasions.
Tags : 
    
Google Cloud
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understandingand Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuevo modelo de seguridad que merece la pena entender y emular. Tradicionalmente, en materia de seguridad empresarial, se ha confiado en una estrategia tipo fuerte que blindaba los terminales de los usuarios y creaba muros en torno a la red. En la actualidad, esta estrategia no puede posibilitar ni proteger el uso de dispositivos mviles y funciones de SaaS, que se encuentran al otro lado del fuerte. En consecuencia, los directores de seguridad de la informacin (CISO, por sus siglas en ingls) se han dedicado a buscar nuevas soluciones capaces de proteger estas tecnologas actuales, as como de adaptarse a medida que cambian las necesidades empresariales y las amenazas.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuovo modello di sicurezza che vale la pena di studiare, e di imitare. La sicurezza enterprise si basa, tradizionalmente, su una strategia che blocca gli endpoint degli utenti e posiziona la rete all'interno di una sorta di perimetro fortificato. Oggi, questa strategia non in grado di supportare n proteggere l'uso di device mobile e le funzionalit SaaS, che esistono al di fuori di quel perimetro. Di conseguenza, i Chief Information Security Officer (CISO) sono alla ricerca di soluzioni nuove, in grado di tutelare queste tecnologie e di adattarsi al modificarsi di minacce ed esigenze di business.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen hnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich auerhalb der Festung befinden, nicht mehr untersttzen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lsungen umgesehen, die diese Technologien heute sichern knnen und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verndern.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nouveau modle de scurit qui mrite dtre tudi... et reproduit. Traditionnellement, la scurit des entreprises a toujours t fonde sur une stratgie de forteresse , charge de scuriser les terminaux utilisateur et de former une barrire de protection autour du rseau. Aujourdhui, cette stratgie nest pas en mesure de supporter ou de scuriser lutilisation des priphriques mobiles et des fonctionnalits SaaS, qui existent en-dehors de la forteresse. Les responsables de la scurit des informations (CISO, Chief Information Security Officer) sont donc tenus de trouver de nouvelles solutions mme de scuriser ces technologies actuelles, et de sadapter aux menaces et aux besoins mtier en volution.
Tags : 
    
CA Technologies EMEA
Published By: Tenable     Published Date: May 09, 2018
CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
Tags : 
cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
    
Tenable
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, its fair to say the perimeter has left the premises. Whether its discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, todays attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
Ounce Labs, an IBM Company
Published By: SAP SME     Published Date: May 09, 2017
No aconteceu de um dia para o outro, mas aconteceu. A comoditizao e a concorrncia global aumentaram a presso em quase todos os setores. Para piorar a situao, os mercados inanceiros tornaram-se mais exigentes do que nas dcadas anteriores. Todos procuram o crescimento sustentvel, mas poucos encontram a frmula secreta para o conseguir. O que isso tem a ver com engajamento? Tudo. As empresas otimizaram suas operaes para obterem ganhos precisos. Os CEOs esto virando sua ateno para as equipes centradas no cliente marketing, vendas, comrcio e atendimento ao cliente para atrarem mais clientes e manterem relacionamentos mais profundos com eles. As regras do jogo mudaram.
Tags : 
    
SAP SME
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: Oracle     Published Date: Mar 01, 2018
La nostra indagine indica nel complesso che la storia di IaaS sta diventando interessante e ha un ruolo preciso in uno scenario IT in evoluzione. Ci sono ancora dubbi e preconcetti, che vanno tuttavia scemando con la graduale adozione da parte delle aziende e il manifestarsi dei primi vantaggi. Nel complesso, la tecnologia IaaS molto pi facile da integrare di quanto non si creda: infatti quasi due terzi (64%) degli utenti di lungo corso indica che la migrazione stata pi semplice del previsto. facile prevedere che il quadro sar sempre pi positivo con laumentare delle aziende che adottano le nuove soluzioni IaaS avanzate ora disponibili sul mercato.
Tags : 
iaas, imparare, service, infrastructure, oracle
    
Oracle
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, its not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, its not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid, access control, application security, email security, internet security, network security appliance, security management, security policies, vulnerability management
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in todays world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Secureworks     Published Date: Nov 11, 2016
This paper sets out five major areas of focus for the practical CISO.
Tags : 
managed security services, ciso, security, risk management, security, threat and vulnerability management, vulnerability management
    
Secureworks
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Juniper Networks     Published Date: Oct 19, 2015
Datacenters are the factories of the Internet age, just like warehouses, assembly lines, and machine shops were for the industrial age. Over the course of the past several years, riding the wave of modernization, datacenters have become the heart and soul of the financial industry, which each year invests over $480 billion in datacenter infrastructure of hardware, software, networks, and security and services.
Tags : 
juniper, datacenter, threat, ciso, enterprise, data, customer
    
Juniper Networks
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: HP - Enterprise     Published Date: Nov 22, 2011
Six Steps to Secure Your Applications Learn why application security is more critical than ever to your business. Find out more now.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, access control, anti spam, authentication, disaster recovery, encryption, firewalls, hacker detection
    
HP - Enterprise
Published By: McAfee     Published Date: Jan 20, 2015
CIOs and CISOs can avoid risky tradeoffs by deploying next-generation firewalls that are built for both security and network performance.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, networking, firewalls, internet security
    
McAfee
Published By: Lookout     Published Date: Mar 29, 2017
Mobile security is making the role of todays CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
webinar, mobile security, ciso, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The adoption of mobile in the enterprise space is accelerating. Users of mobile devices choose what applications they want to use, but it is up to the enterprise to predict the data that they will be accessing. With that change, comes a new spectrum of risk that CISOs must consider.
Tags : 
mobile security, mobile devices, device security, enterprise mobile security, enterprise mobile management
    
Lookout
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.