security information

Results 51 - 75 of 528Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT, and its deployment and configuration services, ThreatZero. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: CA Technologies     Published Date: Jun 01, 2018
Todays most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Published By: IBM     Published Date: May 30, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
    
IBM
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Todays most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news knowing how to deal with an intruder thats broken through your cyber defenses can be even more challenging. This white paper, Youve Been Breached Now What? How to Respond to a Worst-Case Scenario, offers practical steps IT and security professionals should take after a cyberattack occurs. Youll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organizations defenses against a future breach. They are based on decades of experience from CrowdStrike incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of in
Tags : 
    
CrowdStrike
Published By: Google Cloud     Published Date: May 09, 2018
As companies seek to innovate and engage customers through digital channels, they need superstar security leaders business executives who know how to protect, support, and drive performance. This report looks at the biggest changes in firms expectations of their chief information security officers (CISOs) and provides specific examples of how top information security professionals rise to those occasions.
Tags : 
    
Google Cloud
Published By: Trend Micro     Published Date: May 03, 2018
NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v4.0 available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micros participation. While the companion Comparative Reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this Test Report provides detailed information not available elsewhere.
Tags : 
    
Trend Micro
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Data overload have burdened practically every largescale enterprise today. Its vital for competitive enterprise not only to find solutions that will deliver the right data at the right time, but also be confident that the data they are looking at is governed and trusted. Sage Business Cloud Enterprise Management enables businesses to gain real-time access to data and make critical business decisions; achieve a better ROI while reducing IT overhead; automate data integration and deliver a 360-degree view of the businesses; mitigate data security risks and comply with legal regulations. Download this whitepaper and discover how to overcome some common challenges of information overload to increase your business insight and visibility.
Tags : 
    
Sage Software (APAC)
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understandingand Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen hnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich auerhalb der Festung befinden, nicht mehr untersttzen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lsungen umgesehen, die diese Technologien heute sichern knnen und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verndern.
Tags : 
    
CA Technologies EMEA
Published By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
    
Carbon Black
Published By: Oracle     Published Date: Apr 05, 2018
Les fonctions marketing et informatique font plus que jamais la paire. Aujourd'hui, l'agilit des entreprises se mesure l'aune de la flexibilit oprationnelle de leurs outils marketing. Pour dcouvrir les possibilits ouvertes par les nouvelles technologies dans le domaine du marketing, lisez notre Guide des technologies marketing . Au sommaire : Les technologies du paysage marketing actuel Les nouveauts de l'automatisation marketing Le rle de vos contenus et des rseaux sociaux dans votre stratgie globale Oracle is a global technology company who provide a range of services, including the Oracle, the industrys broadest and most integrated public cloud which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computing industry. All information that you supply is pro
Tags : 
    
Oracle
Published By: Lookout     Published Date: Mar 30, 2018
Mobile security presents one of the federal governments biggest information technology challenges. Read the Lookout report to learn about the greatest risks, current security solutions, and the future for BYOD.
Tags : 
    
Lookout
Published By: Jamf     Published Date: Mar 20, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: McAfee EMEA     Published Date: Mar 14, 2018
By building an adaptable security infrastructure based on the McAfee integrated security platform, this small information security team dramatically improved its ability to defend its organization, staff, and patients, despite an environment of continual change.
Tags : 
    
McAfee EMEA
Published By: Jamf     Published Date: Mar 13, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Tenable     Published Date: Mar 07, 2018
Includes 5 tips for bridging the DevOps InfoSec gap. Across industries, in the public and private sector alike, the benefits of DevOps are undeniable: speed to market, improved service delivery and cost savings. At the same time, DevOps can create security blind spots that impact an entire enterprise. To understand why this happens and learn how you can bridge the gap between security and development, read: Information Security in the DevOps Age: Aligning Conflicting Imperatives. Topics covered include: - Rethinking the role of security - Shifting security left by focusing on code quality and prevention - Blind spots in containers and open source components - 5 tips for bridging the DevOps infosec gap Written by CyberScoop, this paper offers practical advice for DevOps and InfoSec professionals who want to realize the benefits of accelerated software development without jeopardizing enterprise security.
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, youll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer support is predicated on the instances when customers cant solve their problem or get answers to their question(s) on their own. In some of those cases, such as phone calls or live chats, it can be difficult for agents to identify and resolve the issue without additional visual assistance. With co-browse, agents can see what the visitor sees, provide guided assistance by highlighting items or filling out forms on a visitors behalf. Sensitive fields like social security numbers and passwords can be blocked from the agents view so private information remains just that, private. Bold360s co-browse allows agents to follow visitors behind secure fields i.e. signing into their account providing an extra level of support to customers.
Tags : 
browse, web, customers, security
    
LogMeIn
Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.