security

Results 26 - 50 of 7657Sort Results By: Published Date | Title | Company Name
Published By: Delta Risk     Published Date: Jan 30, 2020
The cloud movement is rapidly transforming today’s business landscape, and not surprisingly, this has led to an increasing number of security incidents and data breaches. In this white paper, we’ll look at some of the biggest cloud breaches in recent history, how they happened, and how you can avoid making similar mistakes.
Tags : 
    
Delta Risk
Published By: Delta Risk     Published Date: Jan 30, 2020
Without careful consideration and planning, adopting Office 365 can complicate security and compliance efforts. In this white paper, we discuss the wealth of security features within Office 365, along with third-party products and services that can enable organizations to achieve a strong security and compliance posture.
Tags : 
    
Delta Risk
Published By: Delta Risk     Published Date: Jan 30, 2020
Organizations of all sizes find it challenging to implement security controls across their various cloud environments. In this white paper, we discuss configuration risk factors for cloud infrastructure, SaaS, and DevOps, and how to identify and prioritize them.
Tags : 
    
Delta Risk
Published By: Delta Risk     Published Date: Feb 18, 2020
For the last 20-plus years, the primary solution for endpoint protection has been signature-based antivirus (AV). When most network traffic was unencrypted and threats were unsophisticated, reactive endpoint AV combined with perimeter defense was sufficient to protect most organizations. Today’s reality dictates a new approach to endpoint security. It requires new solutions that provide greater control and insight into what’s happening on endpoints. If you’re considering moving to a next-gen endpoint security solution, it can be confusing. Here are five areas to consider if you know you need to move beyond antivirus solutions but aren’t sure where to start.
Tags : 
    
Delta Risk
Published By: FM Global     Published Date: Jan 02, 2020
Cyberattacks are expensive and prevalent. The average cost of a cyber-data breach rose to US$7.5 million in 2018, according to the U.S. Securities and Exchange Commission. Since it's your job to understand and quantify the financial risk of a cyberattack – in fact, it's the number-one thing you must know – we’ll help you break it down in this white paper. Let’s begin with three truths for 21st-century CFOs: Your company will likely be attacked. If an attack is successful, the total financial loss could outstrip even the best insurance. The cost of major security improvements pales next to the potential total financial loss.
Tags : 
    
FM Global
Published By: Forcepoint     Published Date: Feb 03, 2020
When your security team is alerted to a threat, investigating and addressing it swiftly makes all the difference. But, when alert volumes are high, how can they distinguish events that need their attention from those that don’t? This eBook explains how shifting from event-centric to people-centric data protection can provide the context needed to make the right call. Download yours to learn how human-centric data protection can help you: • Secure your data while leaving your employees free to work • Reduce false positive alerts • Keep your security team focused where they’re needed most
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Feb 03, 2020
When it comes to data security, the best-case scenario is to prevent data from being compromised entirely. However, as any security team knows, blocking every threat can impede workflows and productivity across a company. But it doesn’t have to be this way. This infographic outlines the nine steps you can take today to guard against data security incidents in the future while giving employees the freedom to get their work done efficiently. Download to learn how to: • Identify and categorize risks to your data security • Proactively define responses before incidents arise • Integrate data loss prevention controls across your business
Tags : 
    
Forcepoint
Published By: Lenovo - StudioNorth     Published Date: Jan 09, 2020
Healthcare was the only industry in which insider threat created more data breaches than external attacks. Download the eBook to learn steps you can take today to prevent negligent security breaches.
Tags : 
    
Lenovo - StudioNorth
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Flexential     Published Date: Jan 31, 2020
Software, IT and computer services firms are among the leaders in edge data storage and processing, with a combined 68% of companies processing data at the edge, either on the data-generating device or on nearby IT infrastructure. As IoT continues to take shape, organizations will develop a better understanding of the demand for real-time data on devices. The top concerns of software, IT and computer services firms when selecting the location of data and applications include supporting demand for low-latency connectivity to devices, security of data, cost to store and transport data, and preparing for what lies ahead. The need for proximity to customers will create a requirement for cost-effective, multi-geography footprints, with a growing focus on secondary markets as demand for devices develops. Software, IT and computer services firms will find that colocation facilities are most likely to serve the current need while positioning them for the changes that could lie ahead.
Tags : 
    
Flexential
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company
Published By: Adobe     Published Date: Jan 27, 2020
The CIO's role has evolved beyond their traditional role as a gatekeeper to the role of an innovative partner to businesses as they digitally transform. This is great news, but also means there are added responsibilities to work in close partnership and collaboration with the CMO. IT leaders who take the time to understand the company's goals and its customers will continue to have a bigger seat at the strategy table. WHY SHOULD THE TARGET AUDIENCE CARE? n the midst of digital transformation, CIOs may be hesitant to make decisions as quickly as the CMO, while CMOs often prefer to focus on innocation first and consider established processes, standardization, or security concerns later. This means there is more reason than ever to find common ground--it is crucial for the two departments to be in lockstep with each other by unifying around shared business goals and speaking a common language.
Tags : 
    
Adobe
Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound
    
Nuance Communications
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers
    
StrongMail
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
    
123Together
Published By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
    
Endeavour Software Technologies
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.