security manager

Results 51 - 75 of 109Sort Results By: Published Date | Title | Company Name
Published By: McAfee EMEA     Published Date: Mar 14, 2018
McAfee advanced threat defense, McAfee Threat Intelligence Exchange, and McAfee enterprise security manager can cut through the grey to provide a clear understanding of risk.
Tags : 
mcafee, webinar, security, product, technology
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security Innovation Alliance Partners have integrated, tested, and certified their security solutions to work with McAfee Enterprise Security Manager. We have collaborated with our partners to simplify the integration of these products in even the most complex customer environments. This provides a truly connected security ecosystem that optimizes the value of your existing investments, improves efficiency, maximizes protection, and reduces operational costs.
Tags : 
entity, analytics, mcafee, enterprise, security, customer, environments
    
McAfee EMEA
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg, symantec, managers, enterprise, email, devices, apps, it management, mobile computing, mobile data systems, mobile workers, cloud computing, infrastructure
    
CDW Symantec
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management, encryption, security management, content management system
    
IBM
Published By: Intel     Published Date: Aug 10, 2012
Watch this McAfee ePO Deep Command* animation to see security management beyond the operating system, Intel® AMT to optimize security and reduce costs.
Tags : 
enterprise security, it management, it managers, mcafee, data center, data management, animation, security, data security, data warehousing, enterprise applications, network security appliance
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with Intel® CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : 
remote repair, it management, operatin systems, pc repair, enterprise security, it managers, productivity, cloud storage, virtualization, security, wireless infrastructure, risk management
    
Intel
Published By: McAfee     Published Date: Mar 31, 2017
UEBA provides added visibility within SIEM for compliance and user monitoring, improving security alerts, and more insightful investigations. Today’s most advanced security operations use the technologies together to maximize each tool’s strengths.
Tags : 
ueba, uba, siem, analytics, secops, soc, threat hunting, correlation, incident response
    
McAfee
Published By: McAfee     Published Date: Apr 06, 2017
Kevin O'Sullivan, Security Service Director, Kinetic IT, explains how this Australian managed security services provider relies on McAfee Enterprise Security Manager to deliver visibility of risks and threats for its customers.
Tags : 
siem, secops, security operations, threat visibility, compliance, integration
    
McAfee
Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager, anti spam
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : 
saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Dec 17, 2008
All businesses face a daily bombardment of email spam that consumes valuable IT staff time as well as end-user productivity. In addition, email is an attack vector for many types of security threats to businesses, including phishing, viruses, spyware, and malicious URLs. Given that all businesses are experiencing the financial pressures of a tightening world economy, coupled with the uncertainty of any near-term recovery, small and medium-sized business (SMB) managers are searching for ways to cut costs while continuing to maintain a consistent level of service and protection for their businesses.
Tags : 
saas, trend, trend micro, software as a service, smb, spyware, hacker, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, anti spam
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager, anti spam
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : 
saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: SAP     Published Date: Nov 23, 2009
Increased regulatory requirements, the need for transparency, and the desire to better manage and mitigate risks have combined to make Governance, Risk, and Compliance (GRC) top of mind for both business and Information Technology (IT) executives. Business managers and IT security managers must work collaboratively and continuously to control access and authorization, guarding against fraud and mistakes, while providing the clear visibility that is prerequisite for sound corporate oversight to ensure profitability and compliance.
Tags : 
sap, governance, risk, compliance, grc, risk management, vulnerability management
    
SAP
Published By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : 
sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement, secure apps, mobile management, application security, patch management, wireless application software, wireless security, data protection
    
SAP
Published By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : 
continuous monitoring, network security, vulnerability, best practices, security
    
Qualys
Published By: BlackBerry     Published Date: Aug 26, 2008
It's important that corporate mobile policies cover everything from what types of devices will be available to users, how and when they can use them, what corporate resources they are able to access and what security measures will be instituted. Furthermore, Mobile managers must not ignore the impact of government regulations and compliance when laying out their corporate mobile policies.
Tags : 
blackberry, mobile policies, vpn, mobile devices, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging
    
BlackBerry
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection, anti spam, anti spyware, anti virus, application security, firewalls, internet security, intrusion detection, intrusion prevention, security management, security policies
    
McAfee Inc
Published By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : 
siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
    
Intel Security
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.