security requirements

Results 126 - 150 of 225Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Today’s business requirements—such as security, disaster recovery, and mobility—are more extensive than ever before. To meet these requirements, Microsoft® Exchange has extended its reach beyond simple e-mail to increase user productivity and keep information close at hand, while being flexible enough to meet your organization’s administrative model.
Tags : 
microsoft exchange, exchange, productivity, microsoft, exchange server, it management, servers
    
Microsoft Exchange
Published By: IBM     Published Date: May 31, 2012
The topic of security is now unquestionably a C-suite priority. An enterprise that delegates security matters solely to the CIO is compounding its risk factors. Organizations need to move toward a more systematic and proactive approach to addressing security threats and managing compliance requirements. Download the white paper to learn more.
Tags : 
ibm, cyber terrorism, digital age, c suite, security, technology, business technology, business, access control, application security, authentication, business intelligence
    
IBM
Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci, pc ftp application, script file exposure, file encryption processes, compliance, encryption, pci compliance
    
Linoma Software
Published By: VASCO     Published Date: Jul 12, 2012
Read more of this white paper to find out how federated identity management can solve the password complexity and the "token necklace" problem while keeping up with increasing security requirements.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security
    
VASCO
Published By: Equinix     Published Date: Sep 25, 2012
Issues of performance, security and compliance requirements are critical when developing cloud services.
Tags : 
cloud computing, security, compliance, equinix
    
Equinix
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security, it management
    
CDW-Trend Micro
Published By: CrowdStrike     Published Date: Nov 28, 2018
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider, to how to evaluate and review solutions, youll get expert advice that can help you choose a security solution that best fits your organizations requirements. Before initiating a change from your current AV solution read this guide to learn: How to plan an AV replacement project and the critical elements to consider How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions What prevalent technologies are available and what are the pros and cons of each? How to measure the efficacy of a solution and what steps you should take to ensure youre getting accurate results Why you should consider evaluating CrowdStrike Falcons next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
Any single approach to security monitoring cannot satisfy all requirements. Security analysts need a set of complementary technologies which can coexist.
Tags : 
security analytics, advanced threats, uba, security monitoring
    
McAfee
Published By: Mimecast     Published Date: Dec 18, 2008
You can't afford to ignore email archiving, security, internal policy or regulatory requirements, but can you afford to keep paying for it as multiple systems on top of your email system? When you add up the full price tag for your email environment, from server to soft ware to risk management and staff costs, it becomes clear why running everything in-house can mean you spend far more of your budget on maintenance than innovation.
Tags : 
mimecast, saas, software as a service, uem, unified email management, email archive, medium-size business, esg, storage, storage management, enterprise software, sales & marketing software, database development, email archiving
    
Mimecast
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Nov 25, 2009
The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.
Tags : 
trend, trend micro, webcast, security, hitrust, web, privacy, ehrs, health records, access control, application security, security management, web service security, hipaa compliance, web service management
    
Trend Micro, Inc.
Published By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyers Guide offers guidance on how to develop your organizations requirements with regard to: Risk management avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyers Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : 
collaboration solutions, risk management, business productivity, it efficiency, business users, enterprise applications
    
Intralinks
Published By: IBM     Published Date: Nov 05, 2014
A security framework is a step-by-step approach to helping an organization move from meeting its basic security requirements to providing a fully security-optimized environment. Five types of frameworks address progressive steps in security maturity as needs and capabilities change.
Tags : 
ibm, cyber security, risk management, business threats, security framework, business protection, cyber protection, security framework, protection, security, it management, business intelligence, business management
    
IBM
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To comply with todays government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, rackspace, log management, automated log management, pci, hipaa, glba, log data, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industrys only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To comply with todays government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, sungard, log management, automated log management, pci, hipaa, glba, log data, security, it management
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industrys only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions, security, it management
    
Alert Logic and Sungard Availability Services
Published By: Rackspace     Published Date: Mar 08, 2016
Determining which model works best for your organization means understanding the following requirements: Technical: Can the workload actually be hosted in the cloud? Compliance: Regulation may determine where and how their data and workloads can be run and stored. Security: Each workload has separate security requirements, creating challenges to run in the public cloud.
Tags : 
cloud model, public cloud, diy cloud, hybrid cloud, rackspace, compliance, cloud security, it management
    
Rackspace
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arent built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro Deep Security is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions havent caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that dont allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in todays business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of todays demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: IBM MaaS360     Published Date: Feb 06, 2015
Download the Essential Capabilities for Secure Mobility for a high-level look at the over 300 guidelines in the DISAs Mobile Device Management (MDM) Server Security Requirements Guide, and strategies to manage this ever expanding list.
Tags : 
nist, dod requirements, secure mobility, mdm, data communication, device authentication, it management, knowledge management, data management, mobile data systems
    
IBM MaaS360
Published By: IBM     Published Date: Sep 30, 2015
Automate and strengthen security and endpoint management to better protect data and meet HIPAA and meaningful use requirements
Tags : 
best practices, hipaa compliance, business intelligence, database security
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.