curit

Results 1 - 25 of 7317Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha
    
Entrust Datacard
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Une transformation fondamentale englobant le personnel, les processus et la technologie permet aux entreprises de rester compétitives dans l’économie d’aujourd’hui, basée sur l’innovation. Des initiatives telles que la sécurité avancée, les services de détection des fraudes, l’Internet des objets (IoT) avec ses consommateurs connectés, l’expérience de réalité virtuelle ou augmentée, l’apprentissage machine et approfondi et les applications cognitives optimisent les avantages pour l’entreprise comme la maintenance et le marketing prédictifs.
Tags : 
    
Dell and VMWare
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn how to properly assess the security needs for your organization and see what areas your team needs to focus its attention on in order to protect your data.
Tags : 
data breaches, protection, free assessment tool, prevent data breaches, avoid costs, security, data management
    
HP Enterprise Services
Published By: G Suite     Published Date: Jun 28, 2016
Now you can experience the ease and flexibility of open, collaborative tools while gaining better protection for your data. As Google security experts and customers share their vision for a safer Internet, discover how Google’s innovative security technology meets the unique challenges of working and living in the cloud.
Tags : 
    
G Suite
Published By: Juniper Networks     Published Date: Jan 11, 2016
Découvrez comment Juniper Networks a aidé une institution financière internationale à construire un réseau plus flexible et plus sûr. La simplification de la sécurité et la consolidation des data centers ont permis une réduction des dépenses d'exploitation.
Tags : 
    
Juniper Networks
Published By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : 
veracode, security, devops, appsec, enterprise applications, business technology
    
Veracode
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
    
uberVU via HootSuite
Published By: Dell EMC EMEA     Published Date: Nov 26, 2018
En décembre2017, Dell a demandé à ForresterConsulting de mener une étude pour déterminer comment les organisations d'entreprises sont structurées en termes de services informatiques. L'étude a exploré deux types de profils technologiques, les contrôleurs numériques et les transformateurs numériques, ainsi que les tendances et défis rencontrés dans l'approvisionnement en ordinateurs. Les contrôleurs numériques sont souvent associés à l'approche descendante, la structure linéaire, et mettent l'accent sur la sécurité et l'exactitude. En revanche, les transformateurs numériques mettent l'accent sur l'innovation, s'orientent vers l'employé et le client, et donnent la priorité à la rapidité et la souplesse. En comprenant les deux groupes, les entreprises peuvent surmonter les défis qui découlent de la gestion du cycle de vie des ordinateurs. En investissant dans les outils de gestion des ordinateurs existants et en s'associant avec une entreprise spécialisée dans le déploiement et la gestion
Tags : 
    
Dell EMC EMEA
Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
Published By: Oracle     Published Date: Sep 06, 2016
Learn why our world-leading, unified solution is relied on by market-leading companies across the planet.
Tags : 
supply chain, supply chain management, oracle, security, security application, cloud computing, unified solution, risk
    
Oracle
Published By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : 
healthcare, data protection, patient medical data
    
Mimecast
Published By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : 
    
Secunia
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Cybercriminals have been upping their game this year; the use of file-less attacks with macros and PowerShell scripts to evade preventive defenses and sandboxes mean that they are getting better than ever at using phishing, social engineering and drive-by techniques to gain initial footholds in private domains – and once they arrive, they are often avoiding detection for extended periods of time. Between April and July 2018, Fidelis interviewed over 580 security professionals from around the globe to understand how they are shifting their detection strategies and how confident organizations are in their ability to not only prevent targeted attacks – but root out threats that have by-passed traditional preventive defenses.
Tags : 
    
Fidelis Cybersecurity
Published By: IBM     Published Date: Jan 07, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : 
ibm, security, maturity, mobile, wireless, business technology
    
IBM
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management
    
Polycom
Published By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Here’s a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of today’s reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: iboss     Published Date: Jan 22, 2018
While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.
Tags : 
iboss, device security, intrusion, network security, business technology
    
iboss
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee