it controls

Results 126 - 150 of 256Sort Results By: Published Date | Title | Company Name
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Entrust Datacard     Published Date: Jul 21, 2014
To help protect access to this sensitive information, a strict set of security controls is defined in the FBI’s CJIS Security Policy and must be adhered to by organizations that access CJIS information.
Tags : 
authentication, cjis, compliance, sensitive information, security, controls, fbi, policy
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
For law enforcement, courts and other public safety departments that access or exchange information with the Federal Bureau of Information (FBI) Criminal Justice Information Services (CJIS) division, a strict set of security controls must be followed.
Tags : 
cjis, compliance solutions, security control, law enforcement, courts, public safety departments, software authentication
    
Entrust Datacard
Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss, data security standard, data encryption, access controls, activity monitoring, logging, retail, merchants, cardholder data
    
ArcSight
Published By: IBM Business Analytics     Published Date: Mar 04, 2011
Download this paper written by BPM partners to see how the 'last mile' has become a very complex and challenging process for companies and their CFO's and the strategic need to automate the controls around these processes.
Tags : 
bpm partners, last mile, finance, finance automation, risk, business process
    
IBM Business Analytics
Published By: IBM Business Analytics     Published Date: Jun 03, 2011
With this book, you find out how a unified CCR process gives leaders timely and accurate insights to make smarter decisions. You also discover features of the ideal CCR solution and learn what to look for in the selection process. And, you come to understand the close/consolidate/report process and how integrated CCR solutions enhance internal controls and provide better insight into business performance. Find out how a unified CCR process gives leaders timely and accurate insights to make smarter decisions. Download this book to discover features of ideal CCR solution and learn what to consider in the selection process.
Tags : 
ccr, business insight, business performance, business decison making, ccr, dummies book
    
IBM Business Analytics
Published By: IBM     Published Date: Apr 27, 2012
During this Webcast, Axendia Industry Analyst Daniel Matlis discusses with Mr. Lentz how The Johns Hopkins Hospital uses its Integrated Asset and Service Management solution to improve uptime to support patient care; control costs for procurement, maintenance, labor and materials; support regulatory compliance activities; and use workflow capabilities for internal controls.
Tags : 
healthcare, ibm, labor, maintenance, patient care
    
IBM
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: EVault Inc.     Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more. This white paper explores: . Defining security policies for endpoint backup and recovery . Enforcing endpoint controls . Ensuring employee adoption . Keeping IT costs in check
Tags : 
white, paper, best, practices, for protecting, laptop, data, endpoint, corporate, risk, regulatory, financial, exposure, security, policies, backup and recovery
    
EVault Inc.
Published By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : 
dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Traditional antivirus or intrusion prevention systems are no match for the new breed of attacks; enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
security connected, stealthy attacks, rootkits, os level protection, hardware assisted security, endpoint security
    
McAfee
Published By: McAfee     Published Date: Jul 24, 2013
The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organizations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
stealthy attacks, malware, intrusion prevention system, siem, layered security controls
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Tags : 
sans, siem, information and event correlation, critical security controls, reporting
    
McAfee
Published By: AlienVault     Published Date: Jun 05, 2015
Practical security controls that won't break the bank
Tags : 
threat management, security, network, web application, network
    
AlienVault
Published By: Concur Technologies     Published Date: Oct 01, 2015
Read how Columbia College, with the help of Concur, put good internal controls over their travel and expenses, and implemented policies to help reduce spending.
Tags : 
t&e expenditures, internal controls, implement policies, reduce spending
    
Concur Technologies
Published By: LogRhythm     Published Date: Aug 08, 2016
Security threats continue to be more sophisticated and advanced with each day, with the majority often going completely undetected. • Organizations are usually scrambling to keep up and implement new security controls to protect themselves, which adds a new layer of complexity. • With the rise of Advanced Persistent Threats (APTs) and insider attacks, it becomes extremely difficult for security staff to detect all the risks. • Many IT and IT Security staff are already stretched thin by keeping track of many different security technologies that already exist.
Tags : 
security, technology, best practices, information technology
    
LogRhythm
Published By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : 
logrhythm, sans, cloudai, ueba
    
LogRhythm
Published By: Kronos     Published Date: Jul 26, 2017
Now is a great time to start building a case for updating your organization’s payroll system. New payroll technology automates and streamlines processes, eliminates redundant data entry and multiple customizations, and increases productivity, while reducing costs and improving compliance controls. But to make this change, you need to make the most effective business case. Discover five key business drivers in payroll that will help make the case for change and persuade leaders to invest their time and money in your business case.
Tags : 
payroll, organization, redundant data, productivity increase, compliance controls
    
Kronos
Published By: Anaplan     Published Date: Mar 29, 2018
To support these principles, Anaplan was deliberately crafted as a highly distributed global company that allows for significant resiliency against threats and disasters. All functions within Anaplan are geographically distributed across the globe, reducing risks associated with regional events. The U.S. offices host most of the sales, marketing, and support activities. Staff in the U.K. and Singapore offices provide regional coverage, in addition to backup support.
Tags : 
anaplan, architecture, security, controls, geographically, regional, global
    
Anaplan
Published By: Citrix Systems     Published Date: Feb 14, 2019
"As work moves beyond walls, you need a new security framework that enables more flexibility, productivity, and innovation, not less. Citrix offers a comprehensive security approach that delivers the secure contextual access you need to provide an enhanced user experience while you maintain control. Get this brief to explore how Citrix can help you: - Put the right controls in place to secure SaaS and Internet access - Use a single solution to deliver an integrated experience for end-users and admins alike - Consolidate multiple and disparate access solutions into one"
Tags : 
    
Citrix Systems
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The top concern of all of respondents with moving to IaaS is having consistent security controls that provide integrated security with central management across all cloud (private and public) and traditional data center infrastructure. The top concern of all of respondents with moving to IaaS is having consistent security controls that provide integrated security with central management across all cloud (private and public) and traditional data center infrastructure.
Tags : 
cloud, usage, data, infrastructure, private, public, security, integration
    
McAfee EMEA
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations, target validation logic, delegate privilege management, access phone support, access email support, digital certificate verification, windows, activex
    
Dell Software
Published By: Symantec.cloud     Published Date: Sep 01, 2010
This is the third part of a three-part white paper series. Part 3 describes how to move on from the basic controls and how each organization should decide which, of all the extra security controls available, are right to be brought in next.
Tags : 
messagelabs us, it security, smb, activity logging, vulnerability check
    
Symantec.cloud
Published By: Okta     Published Date: Feb 24, 2015
This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
Tags : 
identity and access management, security and risk, extended enterprise, it trends, business agility
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.