security issues

Results 76 - 100 of 129Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : 
mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime, kaspersky
    
Kaspersky
Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses
    
Webroot UK
Published By: Motorola     Published Date: Feb 06, 2008
Maintaining security while providing mobile workers with access to the information they need, when and where they need it, is complex. This white paper helps you understand the risks associated with mobile applications, handhelds and wireless networks—then shows you how Good Mobile Messaging helps you address these issues.
Tags : 
wireless, mobile, wireless security, mobile messaging, motorola, motorola good
    
Motorola
Published By: NETIQ     Published Date: Jun 20, 2014
Contractors entail a unique challenge for businesses and for IT. They’re necessary, but provisioning them correctly and deprovisioning them at the right time is difficult. Read this paper to learn to minimize risk and streamline provisioning for contractors and others.
Tags : 
netiq, it contractors, security, enterprise security, risk issues
    
NETIQ
Published By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn more about how OneDrive creates these security issues when used as a backup solution.
Tags : 
onedrive,  backup solution,  backup,  restore data,  cyber protection, data security,  security issues
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Read the white paper today to learn more about how EFSS creates these security issues when used as a backup solution.
Tags : 
    
Code42
Published By: Proofpoint     Published Date: Apr 23, 2010
Email security and compliance issues related to HIPAA healthcare privacy regulations for 2012.
Tags : 
    
Proofpoint
Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy, encryption policy, remote access policy, firewall, vpn, intrusion prevention, content security
    
Cisco
Published By: IBM Software     Published Date: Aug 04, 2010
Implementing source code vulnerability testing in the software development life cycle. Finding and fixing security issues early is an application project can help reduce development costs while improving software quality. Source code security tools implemented and used across the software development life cycle are known to provide such results.
Tags : 
ibm ouncelab, software development life cycle, automated source code, security testing
    
IBM Software
Published By: CDW     Published Date: Dec 29, 2014
Learn the best practices for migrating to a new server operating system and see how the switch may be challenging, but will allow your organization to vastly improve IT operations to support new technologies such as cloud computing.
Tags : 
server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing, software, security risks, compliance issues
    
CDW
Published By: CDW     Published Date: Dec 29, 2014
Learn how to reap the benefits of an operating system migration and see how you can transition to a modern data center to accommodate the latest technologies in order to increase the efficiency and productivity of your IT team.
Tags : 
server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing, software, security risks, compliance issues
    
CDW
Published By: CDW     Published Date: Dec 29, 2014
Learn why the time is now for data center transformation due to the end of Microsoft support to Windows Server 2003 and see what your organization must do to upgrade performance, scalability, availability, manageability, and security.
Tags : 
server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing, software, security risks, compliance issues
    
CDW
Published By: NEC     Published Date: Nov 26, 2013
This paper exposes—and debunks—the top 10 DaaS myths, which range from supposed cost, user experience and security issues, to ease of use, licensing and integration limitations. It shows how, by consuming virtual desktops as a cloud-hosted service, businesses can deliver high-performing desktops to users on any device in minutes, easing IT management burdens and reducing the total cost of desktop ownership.
Tags : 
nec, daas, cloud, cloud computing, desktop myths, desktops as a service
    
NEC
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture
    
Box
Published By: LogicNow     Published Date: Mar 10, 2016
Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).
Tags : 
managed services, cyber security, logicnow, cyberdefense
    
LogicNow
Published By: Globalscape     Published Date: Aug 13, 2014
Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
Tags : 
globalscape, mobile, business, byod, security
    
Globalscape
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
    
Microsoft Office 365
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment
    
Centrify Corporation
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: OKTA     Published Date: Apr 24, 2018
"It’s important to understand the role that an Identity platform plays in modern enterprise IT. In the past, Identity and Access Management systems were an afterthought. They were put into place after making many of your other architectural decisions. With the move to web, cloud and mobile, IAM has become a key variable in hardware and software deployment, as well as in operational strategy. This webinar will reveal why leveraging an IAM platform, built as a single cloud-based platform for security across on-prem and cloud, can solve these issues."
Tags : 
    
OKTA
Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : 
intermedia, email security, exchange 2007, archiving, encryption, content management
    
Intermedia
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
    
McAfee Inc
Published By: Intel Corp.     Published Date: Apr 26, 2012
Download this report to read critical feedback from 200 IT managers in both SMB and enterprise organizations - find out how they are addressing challenges of cloud computing, especially cloud computing security issues.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition, cloud, private cloud, challenges, virtualization
    
Intel Corp.
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.