system security

Results 176 - 200 of 577Sort Results By: Published Date | Title | Company Name
Published By: Plex Systems     Published Date: Jun 06, 2014
Manufacturers have legitimate questions when contemplating a transition from a legacy, on-premise ERP solution to a cloud ERP system. Cloud ERP solutions have proven their viability and superiority when compared to on-premise competitors when it comes to security, businesscontinuity, cost and other factors.
Tags : 
plex systems, faster usability, operations, erp, cloud, production, manufacturing, data center
    
Plex Systems
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses
    
FireEye
Published By: AlienVault     Published Date: Oct 05, 2016
UW-Superiors IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVaults Unified Security Management (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: Epicor     Published Date: Mar 05, 2018
If youre a manufacturer and have questions about deploying your enterprise resource planning (ERP) system in the cloud, heres your answerits time to move. Cloud ERP solutions provide a number of benefits for manufacturers, and those who make the switch are seeing how simple, economic, and reliable this type of deployment can be. In this eBook, youll discover the top 10 reasons why Epicor customers are choosing to deploy their ERP in the cloud rather than on premises, including: Economic benefits Better use of IT resources Greater security Easier updates Improved mobility and collaboration Faster time to value Download the eBook to learn more about how cloud ERP from Epicor can help your manufacturing business.
Tags : 
    
Epicor
Published By: Epicor     Published Date: Aug 15, 2018
If youre a manufacturer and have questions about deploying your enterprise resource planning (ERP) system in the cloud, heres your answerits time to move. Cloud ERP solutions provide a number of benefits for manufacturers, and those who make the switch are seeing how simple, economic, and reliable this type of deployment can be. In this eBook, youll discover the top 10 reasons why Epicor customers are choosing to deploy their ERP in the cloud rather than on premises, including: Economic benefits Better use of IT resources Greater security Easier updates Improved mobility and collaboration Faster time to value Download the eBook to learn more about how cloud ERP from Epicor can help your manufacturing business.
Tags : 
erp software, enterprise resource planning software, saas, cloud erp, epicor erp
    
Epicor
Published By: Epicor     Published Date: Dec 06, 2018
Over the last several years, manufacturers have embraced cloud applications. However, some manufacturers remain reluctant to migrate ERP systems and other business-critical applications to the cloud. Read on to discover four areas where manufacturers can benefit from a more complete understanding of how and why Epicor Cloud ERP offers unique advantages compared to on-premises deployment, including: Increased data security Greater financial visibility and control Better long-term reliability Easier access to cutting-edge tech innovation Moving an ERP environment to the cloud enables IT leaders to free up the resources they need to partner with the business and to focus on more strategic technology initiatives. Download the white paper to learn more.
Tags : 
epicor erp, erp system, cloud erp
    
Epicor
Published By: Epicor     Published Date: Apr 11, 2019
With the speed at which technology is advancing, manufacturers cannot afford to use outdated manufacturing software. Legacy manufacturing management systems drag down your company with inefficiencies that are both apparent and hidden. These can prevent you from keeping up with your competition and achieving your growth potential. This Epicor white paper details why manufacturing industry technology experts say delaying this important business decision often places your company at risk. By using legacy manufacturing software, not only are you unable to tap into the latest technology trends, but you leave your business vulnerable to: Duplicate or inaccurate data Clunky system performance Security concerns A modern manufacturing ERP solution can eliminate these risks. Download the white paper to learn why implementing new manufacturing software built for business growth may be the most important step you take for the success of your company.
Tags : 
erp, manufacturing, industry 4.0
    
Epicor
Published By: Nasuni     Published Date: Nov 19, 2014
In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices.
Tags : 
employee habits, corporate it systems, dropbox, it infrastructure, security, it management, knowledge management, enterprise applications
    
Nasuni
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Electronic infant protection systems have, to date, been department-level solutions. A new generation of Wi-Fi technology, however, expands infant protection hospital-wide, presenting new opportunities. This white paper reviews the steps required for healthcare IT professionals to select, design and deploy a Wi-Fi Infant Protection solution, in cooperation with clinical and security peers.
Tags : 
wi-fi, infant protection, hospitals, security, healthcare
    
STANLEY Healthcare
Published By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, weve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organizations incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : 
mimecast, email. esra, email security, cloud security
    
Mimecast
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros dont just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
Its practically impossible to be completely prepared for a security incident invariably something happens that best laid plans dont address. But that doesnt mean organizations shouldnt try.
Tags : 
resilient systems, cyber security, incident response, plan, guide, security, data management
    
Resilient Systems, Inc.
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
Maintaining a discipline of strong cybersecurity has become increasingly difficult at enterprise organizations.
Tags : 
resilient systems, incident response, platform, cybersecurity, security
    
Resilient Systems, Inc.
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
With cyber attacks growing increasingly frequent and complex, cybersecurity strategies are shifting: while prevention is still important, it is more about prevailing.
Tags : 
resilient systems, threat, cybersecurity, security, data center
    
Resilient Systems, Inc.
Published By: Hortonworks     Published Date: Apr 05, 2016
This white paper will help you evaluate your ability to protect your data in a Apache Hadoop ecosystem. Read on to learn ten signs that you might need to improve security and data governance in order to manage risk while getting more value out of your Apache Hadoop environment.
Tags : 
    
Hortonworks
Published By: Jamf     Published Date: Mar 28, 2019
For nearly a decade millions of users have leveraged the windows 7 operating system on their PCs. Today, more than 100-plus million users rely on Windows 7. For these users, a new technology age is coming on January 14, 2020 when Microsoft officially ends extended support for Windows 7. Windows 7 end of life means that Microsoft is no longer required to put out security patches or support the operating system. This is significant news for thousands of security-conscious organizations and 100-plus million Windows 7 users who want to keep their machines and data protected.
Tags : 
    
Jamf
Published By: Cyren     Published Date: Oct 17, 2018
Average rates at which enterprise email security systems miss spam, phishing and malware attachments.
Tags : 
email security, phishing, malware, email security systems, appliance security
    
Cyren
Published By: CloudHealth by VMware     Published Date: Apr 08, 2019
Organizations moving to AWS seek improved performance, increased innovation, and a faster time to marketbut the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimize your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
    
CloudHealth by VMware
Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, its a unique target for compromised data. Plus, its mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, its estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegys agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: Oracle     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of todays most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intels x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracles new cloud platform, included a new line of servers for cloud and scale-out applications: Oracles SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracles breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.