security and compliance

Results 151 - 175 of 401Sort Results By: Published Date | Title | Company Name
Published By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : 
forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
ForeScout
Published By: Intralinks     Published Date: May 29, 2013
The monolithic corporation we grew up with is being replaced by ecosystems of more specialized business entities, sometimes called “extended enterprises.” With this evolution has come a need for closer inter-enterprise collaboration and information flow – but with it also comes increased security and compliance risks.
Tags : 
secure, collaboration, cloud, inter-enterprise, information, compliance, strategies
    
Intralinks
Published By: Intralinks     Published Date: May 29, 2013
Ensuring the security of confidential, sensitive information is an essential element of enterprise Security and Governance, Risk Management and Compliance programs. Regulations, such as the HIPAA, FDA, and SOX, place significant requirements on organizations for securely sharing sensitive data such as confidential personally identifiable information (PII) and personal health information (PHI).
Tags : 
security, sensitive information, sharing, mobile file sharing, solutions, confidential
    
Intralinks
Published By: Tripp Lite     Published Date: Jun 28, 2018
Credit, debit and ATM card fraud costs consumers, merchants and financial institutions billions in losses every year. The payment card industry has responded by creating the PCI security standard. Merchants that fail to comply with PCI face increased risk of security breaches and substantial contractual penalties. Tripp Lite Wall-Mount Rack Enclosures help merchants achieve PCI compliance by securing network/telecommunications hardware and storage media in retail point-of-sale environments and other locations.
Tags : 
    
Tripp Lite
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Security Event & Threat Analysis Service, a full service security monitoring, mitigation and compliance solution.
Tags : 
at&t, security event, threat analysis, security monitoring, compliance, regulations, security tools, threat identification
    
AT&T
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Cloud Connectivity and Security for Every Branch With each new branch and remote employee, your distributed networks become more complex, and your organization’s digital transformation continues moving full speed ahead. Traditional networking and security infrastructures often buckle under the pressure. In this ebook, Guide to Cloud Connectivity and Security in Distributed Networks, we’ll share a better approach. Integrating connectivity and security, and moving them to the cloud, can help you achieve higher productivity, reduce cost, and ease compliance. Specific topics include: Ways to augment or replace expensive MPLS for more powerful connectivity Types of security every internet-connected site needs for holistic protection Advantages of an integrated solution over a patchwork of point products Read our ebook for more on how to connect and protect across your distributed networks.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Traditional security infrastructures can't keep up with the growing complexity of today's distributed networks. To power true digital transformation via the cloud, you need to integrate connectivity and security in a way that allows for higher productivity, reduced costs, and easier compliance. Download our eBook to learn about a better approach to cloud security, including how to augment or replace expensive MPLS, the types of security needed for holistic protection, and the advantages of an integrated solution instead of a patchwork of point products.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Learn how Forcepoint Solutions can help you successfully adopt Office 365 and protect your entire cloud environment Driving Office 365 adoption is an important goal—87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance, and poor user experience caused by network architecture limitations and constraints. Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite. Enhance Microsoft's integrated cloud security and regain visibility and protection against advanced attacks and data loss Extend compliance consistently into the Microsoft ecosystem and beyond Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to t
Tags : 
    
Forcepoint
Published By: Ahead     Published Date: Aug 08, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, they’re realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is well-intended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular-- Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through missteps and how to get it right.
Tags : 
    
Ahead
Published By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : 
security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber
    
Tenable
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Microsoft Windows     Published Date: Mar 31, 2017
This IDC Executive Brief uses recent research and IDC thinking to outline some of the challenges facing client computing, security, and compliance teams. In particular, it outlines how many of these challenges can be addressed through the deployment of Windows 10. It then looks at how well current hardware takes advantage of these core functions and features, concluding that for many organizations their current approach to hardware may well fall short of expectations.
Tags : 
    
Microsoft Windows
Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
LogRhythm
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss)
    
TriGeo Network Security
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : 
trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance
    
TriGeo Network Security
Published By: McAfee     Published Date: Nov 01, 2010
McAfee Total Protection for Server: Security and Compliance from a Single Solution
Tags : 
mcafee total protection, server, security, compliance
    
McAfee
Published By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Citrix Systems     Published Date: Feb 27, 2014
New ways of working call for new ways of managing risk. Mobility, flexwork, bring-your-own device (BYOD) and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. The challenge is to allow people the flexibility they need for optimal business productivity while ensuring the security and compliance required by the enterprise. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.
Tags : 
citrix, information security, desktop virtualization, virtualization
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.