Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 4755Sort Results By: Published Date | Title | Company Name
Webinar Published By: Mimecast     Published Date: Sep 27, 2016
Join Howard M. Cohen, Senior Resultant, Tech Channel Partners Results and Orlando Scott-Cowley, Cybersecurity Strategist, Mimecast for this webcast and hear from industry experts regarding the latest email phishing and whaling schemes penetrating the market and the steps needed to protect your employees and organization.
Tags : 
mimecast, phishing, whaling, internet security, email security
    
Mimecast
Webinar Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices, security
    
LogRhythm
Webinar Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar, three cyber security veterans will discuss todays rapidly evolving cyber threat landscape and LogRhythms new Security Intelligence Maturity Model (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats.
Tags : 
cyber security, security intelligence, best practices, technology, security
    
LogRhythm
White Paper Published By: Cisco - Lancope     Published Date: Sep 15, 2016
Digitization is rapidly changing the way we do business, but it is also creating more attack vectors for cybercriminals. Threat actors are taking advantage of mobility, the cloud, and the Internet of Things to infiltrate your infrastructure and steal data. So what can you do? The answer lies in network visibility. By providing you with insight into your attackers behaviors and location within your environment, network visibility can help you prevent a security event from becoming a full-blown data breach.
Tags : 
cisco, lancope, it security, infrastructure, network visibility
    
Cisco - Lancope
White Paper Published By: Cisco - Lancope     Published Date: Sep 15, 2016
Many organizations today are drowning in fears and concerns surrounding sophisticated cyber-attacks such as Advanced Persistent Threats (APTs), DDoS, ransomware and zero-day exploits. While this constant onslaught of attacks can be difficult to keep up with, businesses and government organizations also need to be mindful of perhaps the most alarming type of attack out there the insider threat. According to a report by Forrester Research, insiders are the top source of data breaches, with 36 percent of breaches stemming from the inadvertent misuse of data by employees. Additionally, 25 percent of respondents in the Forrester report said that abuse by a malicious insider was the most common way in which a breach occurred over the course of one year.
Tags : 
cisco, lancope, insider threat, ddos, apt
    
Cisco - Lancope
White Paper Published By: Cisco - Lancope     Published Date: Sep 15, 2016
Network flow records provide a valuable source of Information for security analysts seeking to respond to security incidents and implement other controls. I hope that this short book will get you started with NetFlow for incident response and whet your appetite for more information about this cutting-edge technology.
Tags : 
cisco, lancope, incident response, netflow, security analyst
    
Cisco - Lancope
White Paper Published By: Cisco - Lancope     Published Date: Sep 15, 2016
In this white paper, IT and security team members will learn about the necessary components of an effective incident response plan, including: - Why current incident response plans are failing - Putting together the right incident response team - Developing successful response procedures - Selecting appropriate security technologies - How NetFlow and security analytics can dramatically improve incident response and forensics
Tags : 
cisco, lancope, security analytics, incident response, security
    
Cisco - Lancope
Webinar Published By: Cisco - Lancope     Published Date: Sep 15, 2016
Get visibility and security intelligence across the extended enterprise.
Tags : 
cisco, lancope, it security, security intelligence, security
    
Cisco - Lancope
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : 
cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry
    
Oracle
White Paper Published By: Verisign     Published Date: Sep 06, 2016
This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services from April 1, 2016 through June 30, 2016 (Q2 2016) and the security research of Verisign iDefense Security Intelligence Services conducted during that time. It represents a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q2 2016.*
Tags : 
verisign, denial of service, ddos, protection services, security
    
Verisign
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This white paper is focused on the advantages of Oracles new SCM Cloud solutions.
Tags : 
scm cloud solutions, cloud computing, cloud, cloud solutions, oracle scm
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
The transformation of supply chain management is happening now. IoT is driving that change, but supply chain analytics is instrumental in taming the massive amounts of data generated by IoT sensors, devices and objects and turning it into insight and into a competitive edge. Smart companies recognize this.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This survey presents the attitudes towards and future plans for the adoption of cloud-based supply chain management (SCM) solutions.
Tags : 
cloud computing, cloud, supply chain management solutions, scm, oracle
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
With order channels multiplying, supply, chains growing more complex, and customer expectations increasing, fulfilling orders consistently and efficiently - while meeting customer demands - is harder than ever.
Tags : 
oracle scm cloud, supply chain, security, application security, security management
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Manufacturing faces many challenges in the 21st century with an explosion of new technologies, increasing regulations and ever-rising customer expectations. Its time to re-imagine manufacturing.
Tags : 
oracle scm cloud, cloud computing, cloud, scm, security
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This white paper is focused on the advantages of Oracles new SCM Cloud solutions.
Tags : 
cloud solutions, cloud, cloud computing, scm, supply chain management
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
This survey presents the attitudes towards and future plans for the adoption of cloud-based supply chain management (SCM) solutions.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance
    
Oracle
White Paper Published By: Oracle     Published Date: Sep 06, 2016
There is little question that cloud is well established as a way to deliver business applications.
Tags : 
supply chain, supply chain management, oracle, security, security application
    
Oracle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, PCI Compliance, Phishing, PKI, Policy Based Management, Secure Instant Messaging, Security Management, Security Policies, Single Sign On, SSL, Vulnerability Management, Web Service Security

Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.