oss security

Results 176 - 200 of 428Sort Results By: Published Date | Title | Company Name
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: OneLogin     Published Date: Oct 24, 2017
Corporate data spreads across an ever-growing number of applications. Users (employees, contractors, partners, and customers) access those applications over a wide range of devices. Those devices take different forms: desktops, laptops, tablets, smartphones, smartwatches. Each device may use a different operating system. The locations from where people access your data can be on-premises or off, and in any number of places around the globe. Data, users, apps, devices, locations—the sheer number of permutations and combinations is mind-boggling. This complex nature of today’s IT environment opens security gaps and exposes your business to undue risk. To illustrate, try to envision all the permutations and possible entry points for risk in your organization. Imagine that you have 400 users, each using 25 apps. When you multiply those together, that’s 10,000 potential access permissions to manage. Access permissions change as users come and go, roles change, new apps are added, and
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: First Advantage     Published Date: Apr 30, 2018
Screening your company’s existing workforce can be a critical component in your overall security plan. But the process is far from simple—and is often intimidating. Learn from one company that has navigated the complexities, and consider their strategies to help you plan the process. Pre-employment background screening is now considered a standard practice in Corporate America. Very few companies, however, are crossing the threshold to conduct screens on their existing workforce. It’s a complex endeavor, and to be successful, companies need to walk a fine line between addressing legitimate business and security risks and not alienating employees along the way.
Tags : 
    
First Advantage
Published By: Boardwalktech     Published Date: Jun 05, 2018
Blockchain is reimagining the way enterprises operate. It’s a powerful new enterprise technology that can be used across vertical and application domains to realize greater efficiency, support new business models and revenue sources, and enhance the security and elevate the trust of enterprise transactions.
Tags : 
    
Boardwalktech
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Security leaders across all industries face mounting challenges. Cyberattacks are continually growing in volume, complexity, and sophistication, and incident response (IR) teams are pushed to the limit of their time, skill, and resources. Additionally, the average Security Operation Center (SOC) uses more than 75 different security tools – making full visibility nearly impossible and integrating those tools challenging as well.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Mar 01, 2019
Security leaders across all industries face mounting challenges. Cyberattacks are continually growing in volume, complexity, and sophistication, and incident response (IR) teams are pushed to the limit of their time, skill, and resources. Additionally, the average Security Operation Center (SOC) uses more than 75 different security tools – making full visibility nearly impossible and integrating those tools challenging as well.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
    
Group M_IBM Q2'19
Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Published By: MarkLogic     Published Date: Nov 07, 2017
Business demands a single view of data, and IT strains to cobble together data from multiple data stores to present that view. Multi-model databases, however, can help you integrate data from multiple sources and formats in a simplified way. This eBook explains how organizations use multi-model databases to reduce complexity, save money, lessen risk, and shorten time to value, and includes practical examples. Read this eBook to discover how to: Get unified views across disparate data models and formats within a single database Learn how multi-model databases leverage the inherent structure of data being stored Load as is and harmonize unstructured and semi-structured data Provide agility in data access and delivery through APIs, interfaces, and indexes Learn how to scale a multi-model database, and provide ACID capabilities and security Examine how a multi-model database would fit into your existing architecture
Tags : 
    
MarkLogic
Published By: Diligent     Published Date: Jul 10, 2017
You may already know what a board portal is. You Probably know that paper is heavy and hackers are a risk, and by now, you know there are multiple vendors that offer board portals. You may not realize that by making the right choice, a board can improve governance and efficiency while collaborating in a secure setting. With lots of vendors to choose from, here are the most important questions to ask during your search, divided into the five essential categories. For private, public, non profit and government boards alike, finding an app that excels across all five categories will lead to better electronic security and a more productive board.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
Diligent
Published By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : 
data protection, clearswift, data management
    
Clearswift
Published By: Workday     Published Date: Mar 26, 2019
The Texas A&M university system has always been on the cutting edge of the academic world. Read the case study to learn how a single cloud-based system for HR enables this world-class institution to streamline and standardize processes across 20 different schools and worksites, cut payroll processing time by 30 percent, and empower IT to focus on major cybersecurity initiatives.
Tags : 
    
Workday
Published By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : 
security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence
    
Splunk
Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
It’s practically impossible to be completely prepared for a security incident – invariably something happens that best laid plans don’t address. But that doesn’t mean organizations shouldn’t try.
Tags : 
resilient systems, cyber security, incident response, plan, guide
    
Resilient Systems, Inc.
Published By: VMware     Published Date: May 10, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. Download this whitepaper to discover how VMware Workspace ONE™ brings together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Inspirus     Published Date: Oct 04, 2017
When we set out to conduct this study, we thought there would be quite marked differences between needs and expectations of employees from different countries and generations. In the end, we found that to be untrue." Sodexo Benefits and Rewards Services conducted a study across five countries comparing Millennials and non-Millennials in the workplace and found that the top five expectations of each group were exactly the same: Security and protection for their future, health and family Manage own time/work-life balance Monetary recognition for personal contribution Career development, regular and ongoing feedback Personal development inside as well as outside of the workplace Read the study now to learn more!
Tags : 
    
Inspirus
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As enterprises contine to adopt web-based apps, users spend more time their web browser than ever before. With Chrome Browser, IT can set a variety of policies to help users be more productive across the web. From enabling security policies that protect users, to making to making it easy to access needed boomarks and extensions, IT can offer users a better browsing experience to support users as they get their job done.
Tags : 
    
Google Chrome Enterprise
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Short Description (1000 characters max) Want the strongest cybersecurity possible? Download this brief to find out how Identity governance, combined with privileged access management, will give you the information you need to quickly identify and respond to security risks.
Tags : 
    
SailPoint Technologies
Published By: UPS Capital     Published Date: Feb 19, 2019
Transportation risk comes in many forms and can be very hard, if not impossible, to predict. These include extreme weather, theft, hijacked trailers, global crises, cargo lost at sea, catastrophic truck or rail accidents, truck fires and a whole lot more. In 2014, the University of Tennessee Global Supply Chain Institute published a white paper titled Managing Risk in the Global Supply Chain. The most surprising finding in the research was that even though 100% of supply chain executives acknowledged insurance as a highly effective risk mitigation tool, it was simply not on their radar screen, nor in their purview. Yet, the National Cargo Security Council estimates that there is an annual global financial impact from cargo loss of $50 billion.
Tags : 
    
UPS Capital
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.