security process

Results 226 - 250 of 295Sort Results By: Published Date | Title | Company Name
Published By: K2     Published Date: Jan 07, 2016
Microsoft SharePoint users rely on forms daily; it’s where the nitty-gritty work gets done. SharePoint forms that only work for current business needs can stagnate overall business growth. It’s important to plan today for a form that can carry your business processes into tomorrow. You have three options when looking for a SharePoint forms solution: should you buy, code or configure your own forms? Forms that can be delivered quickly, in an adaptable, affordable and future-ready way, are ideal.
Tags : 
microsoft sharepoint, best practices, security, sharepoint solutions, business processes
    
K2
Published By: LookingGlass Cyber Solutions     Published Date: Apr 26, 2016
The Internet of Things (IoT) is expanding in a dramatic way, bringing to question the issue of availability versus security, as security measures are having a difficult time keeping pace with the development of IoT devices. The introduction of more efficient semiconductors, coupled with revolutionary technology that allows semiconductors to store as well as process complex instructions, means that the IoT may be a more attractive target for hackers. IoT devices from healthcare and industrial systems (i.e., SCADA) could be the most at risk for significant service interruptions and may have secondary and/or tertiary effects on other industries.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
LookingGlass Cyber Solutions
Published By: Tripwire     Published Date: Jul 25, 2008
Tripwire surveyed IT professionals to learn how virtualization is expanding and if security, change controls and compliance requirements are keeping pace. Read this white paper to learn more about the state of virtualization today and why most of the respondents agree that a dedicated configuration tool is needed and are in the process of evaluating or planning to acquire such a tool.
Tags : 
virtual, virtualization, tripwire, configuration, change managemement
    
Tripwire
Published By: IBM MaaS360     Published Date: Apr 15, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
iOS: The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Tags : 
ios 8, apple, macintosh, security, information sharing, business process readiness
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management, malm, mam, mdm, enterprise, emm
    
IBM MaaS360
Published By: IBM     Published Date: Feb 11, 2015
IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, data breaches, it attacks, cyber-crime, forensics solution
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
Download this leading-edge research today to learn about the critical business and performance metrics that can be used to assist an organization in choosing the optimal security platform.
Tags : 
security, platform security, cyber criminal, security software, security appliances, cloud architecture, electronic exposure, business models, process security
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
IBM Security and Ponemon Institute are pleased to present the 2017 Cost of Data Breach Study: United States, our 12th annual benchmark study on the cost of data breach incidents for companies located in the United States. The average cost for each lost or stolen record containing sensitive and confidential information increased from $221 to $225. The average total cost experienced by organizations over the past year increased from $7.01 million to $7.35 million. To date, 572 U.S. organizations have participated in the benchmarking process since the inception of this research.
Tags : 
data breach, data protection, trends, research study, information protection
    
IBM
Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection
    
Cisco
Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach, hackers, business security, security
    
bitglass
Published By: Lenovo and Intel®     Published Date: Jan 15, 2019
A private cloud delivers control, security and customization–which are non-negotiable criteria for many businesses. But for those undeniable benefits, private cloud environments come at a cost, requiring significant initial and ongoing investment of both capital and human resources, as well as requiring expert technical support for architecting and upkeep. In this study by Principled Technologies, read how the highly automated Lenovo ThinkAgile CP composable cloud solution, powered by the Intel® Xeon® Platinum processor, deliver key private cloud benefits while remaining cost effective, rapid to deploy, and simple to manage.
Tags : 
    
Lenovo and Intel®
Published By: DocuSign     Published Date: Apr 24, 2018
"The healthcare industry struggles along the entire paper trail from start to finish. The current process is slow, costly, inefficient, full of errors, vulnerable to security breaches and hurts the people they are chartered to care for. Download this complimentary whitepaper and discover how DocuSign’s eSignature solutions modernize healthcare and life sciences organizations by eliminating paper and antiquated signature processes while meeting compliance requirements and reducing costs and errors. You will learn how DocuSign helps the healthcare industry to: • Reduce turnaround times for diagnostic result documents by weeks • Cut excessive administrative expenses and eliminate manual rekeying errors • Increase efficiency by eliminating time spent sending paper forms with doctors’ signatures"
Tags : 
    
DocuSign
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
With a myriad of endpoint security solutions available, making the right choice for your business can be difficult. To help you simplify the selection process, download our guide which presents the most critical capabilities to assess. It’s a simple, authoritative reference that takes the guesswork out of evaluating endpoint security.
Tags : 
    
BlackBerry Cylance
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm
    
Rapid7
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS, Inc.
Published By: Cisco     Published Date: Aug 18, 2014
IT can be one of the biggest concerns for businesses today. Security, compliance, enablement, cost control and scalability must all be considered. Additionally, with insurgent trends such as mobility changing the face of business, choosing a partner who is able to consultatively deliver multiple services and solutions is increasingly important. We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Fill in your details to the right to download your free white paper and learn how we have become the key supplier of converged technology and services in this space.
Tags : 
ucs, scope, cisco, security, compliance, servers, data, innovative, data center, architecture, performance, processors, blade, equipment
    
Cisco
Published By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : 
fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack, central security cloud
    
Fireblade
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.