enterprise security

Results 201 - 225 of 1011Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Even if one minute a day is lost to productivity drains because of PC horsepower allocation to security scans and remediation, the cost over a year across a medium-sized enterprise adds up quickly. A 10,000 employee operation would face over $10M in direct productivity losses alone. As an early trigger for expensive PC hardware refresh is an onslaught of help desk calls, many companies find that they can actually extend the hardware refresh cycle out another 12–24 months simply by employing a security solution that does not tax the PC as heavily. The indirect costs associated with brand reputation and opportunity losses add untold thousands of dollars per year as well. Further, some institutions under green initiatives monitor power consumption related to security measures favor solutions that use less energy. As such, forward-thinking enterprises are looking beyond the software license fees when evaluating security software alternatives.
Tags : 
system, resource, impact, testing, cylance
    
BlackBerry Cylance
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
This paper considers the use of email archives for compliance. It will also review how archives are trusted and look at what has to be done to ensure that integrity is maintained throughout the chain of events that take place within an email archive environment.
Tags : 
compliance, email archiving, data quality, records management, personal email, enterprise email, email security, c2c
    
C2C Systems, Inc.
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase, wireless
    
Sybase
Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map, business technology
    
Intralinks
Published By: Cyveillance     Published Date: Apr 03, 2015
Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these things are “intelligence.” They’re data. In this white paper, we define the difference between intelligence and data, and then illustrate the theoretical discussion in a concise case study in the tangible terms of a real-world practitioner and an actual event.
Tags : 
cyber threat, intelligence, centure capital, startup, enterprise, security, protection, data, networking, it management
    
Cyveillance
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
Published By: IBM     Published Date: Oct 13, 2015
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe cloud, information management, security, data, networking, wireless
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe, cloud, information management, security
    
IBM
Published By: Genesys     Published Date: Dec 20, 2018
If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: • The size of your contact center, and business requirements such as customer journey management • The location and quantity of contact centers being managed • The need for scalability, speed of deployment, and maintenance requirements
Tags : 
    
Genesys
Published By: Red Hat APAC     Published Date: Jun 27, 2019
Automation is an essential and strategic component of modernization and digital transformation. Modern, dynamic environments need a new type of management solution that can improve speed, scale and stability across the enterprise IT environment. Red Hat® Ansible® Tower builds on the underlying Ansible automation engine by adding control, security, and delegation capabilities. With Tower, your team can automate – and your business can innovate. Download the whitepaper ""Beginners guide: Control with Red Hat Ansible Tower"" to learn more.
Tags : 
    
Red Hat APAC
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : 
instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus, antivirus, worms, vulnerability management, internet security systems, it management
    
Internet Security Systems
Published By: IBM     Published Date: Jun 08, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, linux, windows, telecommunications, healthcare, oracle database
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, enterprise data, windows, linux, telecommunications, healthcare, consumer banking
    
IBM
Published By: IBM     Published Date: Sep 28, 2017
This paper presents a cost/benefit case for two leading enterprise database contenders -- IBM DB2 11.1 for Linux, UNIX, and Windows (DB2 11.1 LUW) and Oracle Database 12c -- with regard to delivering effective security capabilities, high-performance OLTP capacity and throughput, and efficient systems configuration and management automation. Comparisons are of database installations in the telecommunications, healthcare, and consumer banking industries. For OLTP workloads in these environments, three-year costs average 32 percent less for use of DB2 11.1 compared to Oracle 12c.
Tags : 
ibm, enterprise database, oltp, telecommunications, healthcare, consumer banking
    
IBM
Published By: McAfee     Published Date: Jul 24, 2013
The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organizations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
stealthy attacks, malware, intrusion prevention system, siem, layered security controls, security, data management, business technology
    
McAfee
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions, it management, enterprise applications, business technology
    
PulseSecure
Published By: IBM     Published Date: Nov 24, 2009
Server sprawl can divert valuable time and resources away from pursuing your core business goals. This white paper will show how System z can give you the visibility, control and automation your business needs to become more successful.
Tags : 
ibm tivoli, leveraging middleware, service management, system z, new enterprise data center, business continuity management, security, process automation
    
IBM
Published By: CA Technologies EMEA     Published Date: May 23, 2018
To move your business from its current state to the connected enterprise, you have to define a common API to your database and other systems, while providing the infrastructure to support the new model. The new systems must incorporate the security safeguards while ensuring the infrastructure can support the new growing, but variable, load. With the rapid adoption of mobile and web-based services across the industry, the REST architecture has emerged as the de facto standard for API integration across systems. This white paper addresses the concepts of REST, creating REST APIs for your databases and integrating with other systems: • What is REST? • Why use REST for database access? • Building REST infrastructure for database access • The REST enabled database • Integrating REST with other services • Criteria for selecting REST services platform
Tags : 
    
CA Technologies EMEA
Published By: BlackBerry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
Blackberry
Published By: Cisco     Published Date: Dec 27, 2017
Among your primary responsibilities as a board member is providing advice on both business strategy and enterprise risk. A general understanding of risk management is essential when looking at cyber risk specifically. Ultimately, an enterprise should consider adding cybersecurity expertise to its board membership, but all members can benefit from increasing their understanding about how cyber risk affects corporate strategy and the overall enterprise risk profile. To provide effective strategic advice to company leadership on cyber risk, you must ask the right questions, including whether a company does ongoing cyber risk assessment and management, and how.
Tags : 
    
Cisco
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Time has become a critical capability in being able to extract the business value enterprises want from their data and computing infrastructure, as well as to protect the business value that has already been created. In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing an advantage of time can help defenders to reduce their risk, in the fundamental categories of data protection, threat detection and incident response, data center / cloud security, and endpoint security.
Tags : 
cyber, security, defenders, business value, infrastructure, data, business, protection
    
McAfee EMEA
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee