security data management

Results 1 - 25 of 238Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : 
astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco
    
Astaro
Published By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : 
security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit, enterprise applications
    
Oracle
Published By: Company Name     Published Date: May 04, 2016
Lorem ipsum dolor sit amet, urna eu posuere. Nec vitae amet. Elementum ut erat. Nascetur neque, accumsan lorem et placerat consequat. Rutrum ut duis, nibh velit velit metus eleifend nnc
Tags : 
cloud, cloud security, it security, firewall, networking, data security, data management, security management, it management
    
Company Name
Published By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle CX
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Published By: Oracle     Published Date: May 08, 2019
Oracle DBAs Share Insights about the Future of Cloud, Security, Artificial Intelligence, and Autonomous Computing. This year, in addition to canvasing analysts, pundits, and executives for their strategic insights, Oracle is interested in the tactical views, predictions, and opinions of master DBAs, database product experts, and Oracle ACE Directors. We gathered insights about database management, security, artificial intelligence, autonomous computing, and many other topics and cover how future trends will impact DBA careers during 2019, and beyond. The Intelligent Enterprise Era. Download predictions.
Tags : 
    
Oracle
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure
    
Blue Coat Systems
Published By: Secureworks     Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Tags : 
managed security services, data breach, security, hackers, security, threat and vulnerability management, cost
    
Secureworks
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security
    
Adobe
Published By: Riverbed     Published Date: Jul 17, 2013
As a network manager, application manager or security manager, you need systems in place that can collect data across your WAN, continuously analyze the data to discover problems, and allow you to troubleshoot issues as soon as they occur. A packet capture and analysis solution is an essential part of your toolset, since it provides the most granular level of information and can help troubleshoot the toughest problems. Riverbed Cascade has fundamentally changed the economics of network performance management. Learn more..
Tags : 
network, troubleshooting, wan, network manager, network performance management
    
Riverbed
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC
Published By: Skillsoft     Published Date: Apr 23, 2015
This paper explains how embedding 7 key skills within your IT team can keep your organisation’s data safe and its employees productive. From data storage and security to database design and management, these key skills will ensure that your business is able to make the most of new technology as it develops.
Tags : 
fundamental it skills, it staff development, professional it development, skillsoft
    
Skillsoft
Published By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : 
sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection, encryption keys, vulnerability management
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management, apt, automated applications
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls, digital certificates, mobile application security, security management
    
Venafi
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee