Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 176 - 200 of 4738Sort Results By: Published Date | Title | Company Name
Webinar Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices, security
    
LogRhythm
Webinar Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar, three cyber security veterans will discuss todays rapidly evolving cyber threat landscape and LogRhythms new Security Intelligence Maturity Model (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats.
Tags : 
cyber security, security intelligence, best practices, technology, security
    
LogRhythm
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employees USB stick, one hacker, one virus, or one careless error to compromise your companys reputation and revenue. The threat of data breach is real and its critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock
White Paper Published By: LifeLock     Published Date: Sep 12, 2016
How you handle a data breach says a great deal about your companys integrity. LifeLock Breach Response Services works with corporations to develop proactive, pre-negotiated strategies and breach response plans to stay ahead of a crisis.
Tags : 
authentication
    
LifeLock
White Paper Published By: Webroot Inc     Published Date: Sep 09, 2016
This guide will examine a number of mitigation strategies that will help protect your organizations data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. Its a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.
Tags : 
security management, web service security
    
Webroot Inc
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This white paper is focused on the advantages of Oracles new SCM Cloud solutions.
Tags : 
scm cloud solutions, cloud computing, cloud, cloud solutions, oracle scm
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
The transformation of supply chain management is happening now. IoT is driving that change, but supply chain analytics is instrumental in taming the massive amounts of data generated by IoT sensors, devices and objects and turning it into insight and into a competitive edge. Smart companies recognize this.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This survey presents the attitudes towards and future plans for the adoption of cloud-based supply chain management (SCM) solutions.
Tags : 
cloud computing, cloud, supply chain management solutions, scm, oracle
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
With order channels multiplying, supply, chains growing more complex, and customer expectations increasing, fulfilling orders consistently and efficiently - while meeting customer demands - is harder than ever.
Tags : 
oracle scm cloud, supply chain, security, application security, security management
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Manufacturing faces many challenges in the 21st century with an explosion of new technologies, increasing regulations and ever-rising customer expectations. Its time to re-imagine manufacturing.
Tags : 
oracle scm cloud, cloud computing, cloud, scm, security
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This white paper is focused on the advantages of Oracles new SCM Cloud solutions.
Tags : 
cloud solutions, cloud, cloud computing, scm, supply chain management
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This survey presents the attitudes towards and future plans for the adoption of cloud-based supply chain management (SCM) solutions.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
There is little question that cloud is well established as a way to deliver business applications.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
There is little question that cloud is well established as a way to deliver business applications.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why our world-leading, unified solution is relied on by market-leading companies across the planet.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.