Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 176 - 200 of 4738Sort Results By: Published Date | Title | Company Name
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Manufacturing faces many challenges in the 21st century with an explosion of new technologies, increasing regulations and ever-rising customer expectations. Its time to re-imagine manufacturing.
Tags : 
oracle scm cloud, cloud computing, cloud, scm, security
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This white paper is focused on the advantages of Oracles new SCM Cloud solutions.
Tags : 
cloud solutions, cloud, cloud computing, scm, supply chain management
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This survey presents the attitudes towards and future plans for the adoption of cloud-based supply chain management (SCM) solutions.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
There is little question that cloud is well established as a way to deliver business applications.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
There is little question that cloud is well established as a way to deliver business applications.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why our world-leading, unified solution is relied on by market-leading companies across the planet.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
There is little question that cloud is well established as a way to deliver business applications.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
There is little question that cloud is well established as a way to deliver business applications.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Mimecast     Published Date: Aug 30, 2016
Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of todays cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
mimecast, email, email security, cyber security, whaling
    
Mimecast
White Paper Published By: Mimecast     Published Date: Aug 30, 2016
Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : 
mimecast, email, cloud, email archiving, email
    
Mimecast
White Paper Published By: IBM     Published Date: Aug 29, 2016
Download the TechRadar data security road map from Forrester and find out what it takes to protect your dataand your business.
Tags : 
ibm, b2b, commerce, b2bi, business to business integration
    
IBM
White Paper Published By: LifeLock     Published Date: Aug 23, 2016
ID theft has escalated to an all-too-possible nightmare that involve weeks, if not months, to resolve. Download this practical comparison guide to learn what are challenges exist and the key benefits for employers to look for in selecting a partner. Compare now!
Tags : 
best practices, identity theft, security, protection
    
LifeLock
White Paper Published By: LifeLock     Published Date: Aug 23, 2016
This eBook focuses on the benefits of offering identity theft protection through the workplace, including reducing risk, streamlining remediation and choosing the right partner.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
White Paper Published By: LifeLock     Published Date: Aug 23, 2016
Every employee has a risk of having their identity stolen. Provide your employees with identity theft management by offering LifeLock.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
White Paper Published By: LifeLock     Published Date: Aug 23, 2016
While most employers provide employees with protection for healthcare, accident and illness, many employees are missing protection for identity theft. Employers can now add value to their benefit package and help keep employees protected while on the job.
Tags : 
cyber crime, best practices, identity theft, security, protection
    
LifeLock
White Paper Published By: LifeLock     Published Date: Aug 23, 2016
The impact of data breaches and identity theft on a business cannot be overstated. Offering identity theft protection is one solution. Discover how to help protect your business and your employees if they have a non-employer related fraud attack.
Tags : 
best practices, identity theft, security, protection, application integration
    
LifeLock
White Paper Published By: LifeLock     Published Date: Aug 23, 2016
In an always-on, ever connected world, the risk of identity theft is real. There is a new identity fraud victim every two seconds. LifeLock identity theft protection helps safeguard against identity fraud by monitoring millions of transactions per second provide services that remediation-only or credit monitoring-only services dont offer with no benefit deductible or service co-pay.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
White Paper Published By: Kaminario     Published Date: Aug 23, 2016
Successful businesses are nimble and built to scale. At times you might need to grow your sales capacity by bringing more people on board. Other times you might simply need them to get more active, boosting performance. Sometimes you need to do both. To support the ebb and flow of your business your storage should be capable of scaling up capacity while increasing performance. Yet you might be surprised to know that only one All-flash vendor can do so, while keeping costs predictable. Read on to learn about 3 scalabity benefits that will transform your storage purchasing experienc
Tags : 
kaminario, flash, performance, storage, application performance
    
Kaminario
White Paper Published By: Metalogix     Published Date: Aug 22, 2016
Read this white paper to find out how to plan for a Microsoft Office 365 implementation in your organisation.
Tags : 
office 365 cloud, move to office 365, cloud, productivity in the cloud, cloud model
    
Metalogix
Webinar Published By: EMC Converged Platforms     Published Date: Aug 19, 2016
In this video, ESG analyst Colm Keegan discusses the new VCE VxRail. He explains the rationale for the product, where it fits in the VCEs portfolio, and addresses the growing demand for HCI systems.
Tags : 
vce, esg, vxrail. hyper-converged, hci systems, networking
    
EMC Converged Platforms
Webinar Published By: EMC Converged Platforms     Published Date: Aug 19, 2016
VxRail is aiding in Land Rover BARs quest for the Americas Cup.
Tags : 
data center, data application, network performance, data virtualization, optimization
    
EMC Converged Platforms
White Paper Published By: NAVEX Global     Published Date: Aug 18, 2016
This Cyber Security Awareness Kit illustrates how to make your organisation more secure by neutralizing the leading cause of cyber security risk: your employees.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks
    
NAVEX Global
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.