security risks

Results 301 - 325 of 329Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure
    
Dell Storage
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
asset management, technology, software asset management, compliance, mitigation of security risks, automation
    
ServiceNow
Published By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This paper contains three simple steps for maintaining visibility and control when moving to the cloud and explains how NetIQ can help with each.
Tags : 
netiq, cloud infrastructure, cloud computing, security risks, regulations, information security, compliance management, public cloud
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection
    
IBM
Published By: IBM     Published Date: Sep 06, 2013
An Assessment Of The Current Security Landscape And How to Overcome It -- Technical information security skills are in higher demand today than ever before. As IT environments become more complex and the threat landscape grows more malicious , organizations need skilled technical staff to meet increasing security and compliance demands. Read this white paper and learn how to survive the technical security skills crisis.
Tags : 
forrester, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability
    
IBM
Published By: Symantec     Published Date: Oct 07, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.
Tags : 
intelligence, cyber security, threats, trends, malware, spam, business risks
    
Symantec
Published By: FireEye     Published Date: Feb 28, 2014
If I were to boil down these survey results to a single sentence, it would be this: To keep pace with today’s advanced threats, incident response teams need tools and techniques that give them greater speed, accuracy and insight.
Tags : 
fireeye, incident response, greater speed, greater accuracy, advanced threats, response teams, detect malware, persistent threats
    
FireEye
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Oct 02, 2019
If you are an moving to or already using Office 365 then it’s essential for you to formulate a plan toward a risk-free cyber resilience experience. Cyber resilience requires you to prepare for the before, during and after an attack/outage/incident. Doing so will protect your organization from security threats, compliance concerns, unplanned outages and more. To mitigate concerns and form a resilient strategy you have to first KNOW the risks. The right third-party solution can ensure email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Microsoft Office 365™. But, what are the key areas of concern around Office 365 email you should be aware of? Read what Microsoft Office Apps and Services MVP J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
    
Mimecast
Published By: DocuSign     Published Date: Apr 24, 2018
Life science companies are experiencing a significant transformation in how they bring new products to market. Organizations must adapt to changes in the marketplace, such as global product commercialization, specialized medicine, new regulations, new payment models, and new technology that are driving more product variety, smaller drug volumes, and shorter product life cycles. To meet the needs of this new commercial model, life science companies must re-envision the global supply chain and evolve the tools they use to run their business. The supply chain that was designed for launching blockbuster products will not work in the future. Today, the global supply chain relies on a manual, paper-based process centered on printing documents and sending them via overnight mail, fax, or e-mail with scanned attachments. This time-consuming and costly process is errorprone, tedious for customers and team members, and vulnerable to security and compliance risks.
Tags : 
    
DocuSign
Published By: IBM     Published Date: Jul 12, 2016
As most companies now realize, analytics is increasingly more of an integral part of their day-to-day business operations. In a recent survey by a global research firm, 80% of CIOs stated that transition from backward-looking, passive analysis must shift to forward-looking predictive analytics. The challenge is that many analytic solutions are aligned to a specific platform, tied to inflexible programming models and requiring vast data movement. In this webcast, Forrester and experts from IBM will highlight how technology like Apache Spark on z/OS allows businesses to extract deep customer insight without the cost, latency and security risks of data movement throughout the enterprise.
Tags : 
ibm, forrester, apache spark, spark technology, z systems
    
IBM
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
The rapid adoption of SaaS-based applications in organizations today continues at a breakneck pace. These applications provide critical functionality and enable greater productivity, but at the same time introduce potential new security and data theft risks if not properly controlled.
Tags : 
palo alto, saas, security, shadow it, applications
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge
Tags : 
palo alto, security framework, security, business leaders, digital
    
Palo Alto Networks
Published By: Lookout     Published Date: Mar 28, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting.
Tags : 
mobile, security, lookout, risks
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Mobile security presents one of the federal government’s biggest information technology challenges. Read the Lookout report to learn about the greatest risks, current security solutions, and the future for BYOD.
Tags : 
    
Lookout
Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.