technology security

Results 426 - 450 of 531Sort Results By: Published Date | Title | Company Name
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence
    
Q1 Labs
Published By: Riverbed     Published Date: Sep 05, 2014
Storing data in the cloud using a Whitewater™ cloud storage gateway from Riverbed Technology overcomes what is becoming a serious challenge for IT departments: how to manage the vast, and ever-growing, amount of data that must be protected. Whitewater eliminates concerns about data security, data transmission speeds over the Internet, and data availability, while providing great flexibility and a favorable return on investment. Moving data to the cloud replaces the high costs of tape and disk storage systems with a pay-as-you-go cloud storage tier. This paper makes the business case for cloud storage, outlining where capital and operational costs can be eliminated or avoided by using the cloud for backup and archive storage.
Tags : 
data storage, cloud, it departments, security, transmission speeds, storage, data management
    
Riverbed
Published By: Oracle     Published Date: Mar 04, 2014
In This Paper • Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud • Understand the business and regulatory requirements around the data to be moved to the cloud • Know your cloud provider’s security and privacy commitments, and what responsibilities you retain
Tags : 
oracle, oracle cloud services, security, cloud provider, privacy
    
Oracle
Published By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
What is it about e-commerce that causes online businesses to fail?Take a look at this E-commerce 101 Guide to help with avoid pitfalls and be successful when selling on the web.
Tags : 
nethawk, geotrust, ecommerce, web security, ssl, online selling, technology, solution
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
Learn more about typical situations where multiple domain certificates are the ideal solution. After this whitepaper, you'll know how to select the right multi-domain certificate for your needs.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: Symantec     Published Date: Sep 19, 2012
This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Tags : 
applications, information technology, symantec, verisign, web security, security, business technology
    
Symantec
Published By: Symantec     Published Date: Sep 19, 2012
The solutions to problems of computing security are varied and must be explored individually, but one technology shows up often: TLS or Transport Layer Security, often known by the name of the predecessor technology, SSL or Secure Sockets Layer.
Tags : 
business computing, information technology, symantec, verisign, web security, security, business technology
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management
    
Aventail
Published By: PKWARE     Published Date: Aug 21, 2009
The Butler Group provides a technology audit on PKWARE's SecureZIP cross-platform data file security software.
Tags : 
data security, security audit, auditing, compression, data compression, zip file, zip, compress
    
PKWARE
Published By: Quocirca     Published Date: Sep 18, 2008
Whether we like it or not we are all IT users now. Through the ubiquity of networks of devices that we rely on for information, security and day-to-day transactions even those who eschew technology now rely on it, even if they do not acknowledge it. The failure of these networks can lead to widespread disruption, unhappy customers, unproductive employees and lost business. Ensuring their availability, security and efficiency is a job for experts who need powerful tools to carry out the task.
Tags : 
quocirca, service management, high availability, security
    
Quocirca
Published By: Quocirca     Published Date: Dec 02, 2008
The internet offers any business the opportunity to present a commercial image independent of the organization's size and location. Small and medium sized businesses (SMBs) across the UK have exploited the internet as it has evolved from an interesting medium for the technology-aware to an essential commercial platform. With this increasing importance, and the internet’s ability to extend the reach of a business, it is valuable to realize precisely what different internet service providers (ISPs) offer before buying. This includes evaluating service level and support capabilities and understanding how these vary throughout the UK.
Tags : 
quocirca, smbs, internet service providers, information technology, security
    
Quocirca
Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises need to utilize software testing that can automatically review applications for security problems. This document examines the market drivers and technology associated with software security code review products and discusses how Cenzic is addressing this urgent need.
Tags : 
web applications, application security, web application security, security code, cenzic, security
    
Cenzic
Published By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : 
scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance
    
PEAK Technologies, Inc.
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd
    
AT&T
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee