Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 251 - 275 of 4740Sort Results By: Published Date | Title | Company Name
White Paper Published By: Dell EMC     Published Date: Jul 05, 2016
EMC Global Data Protection Index 2016 Key Findings and Results Report
Tags : 
data management, business practices, data center. data application, enterprise applications, business intelligence
    
Dell EMC
White Paper Published By: Dell EMC     Published Date: Jul 05, 2016
This report documents hands-on testing of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system
Tags : 
data management, business practices, data center. data application, enterprise applications, security
    
Dell EMC
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
Mobile is the new playground for thieves: How to protect against mobile malware
Tags : 
ibm, mobile, security, mobility, mobile computing
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
Best practices for mobile application lifecycle management: Security from design through deployment
Tags : 
ibm, mobile, mobile applications, application lifecycle, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : 
ibm, mobile, mobile applications, security, wireless
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jul 01, 2016
In Forresters 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
ibm, forrester, enterprise mobile management, mobile, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jun 30, 2016
Learn how to protect corporate data when users use personal devices for work
Tags : 
ibm, bring your own device, byod, mobile, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jun 30, 2016
A humorous look at ITs challenges in managing Bring Your Own Device (BYOD) for todays organizations
Tags : 
ibm, mobile, mobile device management, mdm, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jun 30, 2016
Essentials for your organizations first MDM deployment
Tags : 
ibm, mobile device management, mdm, mobile, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Jun 30, 2016
Enable secure access to critical data and applications, while mitigating the risk of mobile malware
Tags : 
ibm, mobile, ciso, mobile security, security
    
IBM MaaS360
White Paper Published By: Cyphort     Published Date: Jun 28, 2016
Computer viruses have plagued personal computers since the original Brain virus began infecting boot sectors in 1986. Originally, these early viruses were annoying, but fundamentally benign in nature. However, once the initial concept of malicious propagating code became established, the actors creating viruses became more sophisticated in their approach. Ultimately, the results of a successful infection were more significant and the impact on an enterprise more severe.
Tags : 
technology, security, best practices, solutions, network management
    
Cyphort
White Paper Published By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : 
technology, security, best practices, solutions, network management
    
Cyphort
White Paper Published By: Workday     Published Date: Jun 27, 2016
AAA Northern California, Nevada & Utah offers a wide array of automotive, travel, insurance, DMV, financial services, and consumer discounts to more than 4.2 million members. AAA has been a leader and advocate for the safety and security of all travelers since it was founded more than 100 years ago. With Workday, AAA Northern California, Nevada & Utah can keep its focus on its members and look forward to its next 100 years. See the infographic to learn more about the benefits AAA Northern California, Nevada & Utah has experienced with Workday.
Tags : 
automotive, security, info graphic, travel, access control
    
Workday
White Paper Published By: Oracle Hardware     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : 
security, c-suite, data, cyber risk, enterprise
    
Oracle Hardware
White Paper Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies, anti spyware
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 16, 2016
As much as the Digital Economy and the Internet of Everything (IoE) create opportunities for companies and consumers - over $19 trillion in value to organizations over the next decade - they also create opportunities for hackers and cybercriminals. With an expanded attack surface represented by the IoE, cybercriminals look to cash in on the estimated value of $450 billion to over $1 trillion of the Hacker Economy.
Tags : 
security, technology, digital, cyber attack, data
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
security, technology, security tactics, data, application security
    
Cisco
White Paper Published By: Avaya     Published Date: Jun 15, 2016
Solving critical healthcare IT challenges with software-defined networkingDigitization is changing healthcare forever as organizations look to deliver better quality services, improve patient safety and provide the highest levels of security. Healthcare IT leaders should look to leverage a software-defined network. Read the latest from ZK Research to learn more.
Tags : 
healthcare, information technology, networking, security, access control
    
Avaya
White Paper Published By: Flexera Software     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics
    
Flexera Software
White Paper Published By: SAS     Published Date: Jun 10, 2016
Understanding security analytics can be a daunting job. It is more than just analyzing log files but it is less than a full-blown information security platform. In fact, according to Anton Chuvakin, research vice president for security and risk management at Gartner, it is not yet even a market, but rather still just a concept that has yet to define best practices.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
SAS
White Paper Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Download this paper now to learn how you can prevent such an attack and protect your business
Tags : 
prevent cyber-attacks, cyber-attacks, security application, security, anti spam
    
Kaspersky Lab Australia and New Zealand
White Paper Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security
    
Kaspersky Lab Australia and New Zealand
White Paper Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.
Tags : 
kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions
    
Kaspersky Lab Australia and New Zealand
White Paper Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
This white paper explains the benefits of using Kaspersky Security for Virtualization and its Light Agent technology.
Tags : 
security application, virtualisation, security, kaspersky, security solutions
    
Kaspersky Lab Australia and New Zealand
White Paper Published By: HPE     Published Date: Jun 06, 2016
This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.
Tags : 
data, data recovery, data backup, midsized business, disaster recovery
    
HPE
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.