security process

Results 151 - 175 of 295Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jun 26, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies
Published By: Entrust Datacard     Published Date: Jun 14, 2017
This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
    
Entrust Datacard
Published By: Marketo     Published Date: Jun 08, 2017
Read this complimentary copy of the SiriusView: Marketing Automation Platforms 2017 and learn more about Marketo’s key differentiators including its native multi-channel experience, live event management, and content recommendation functionalities. Marketo's powerful marketing automation capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 500 technology and service providers that offer best-of-breed solutions for today’s marketers. The full report includes: Market evaluation and analysis of 9 marketing automation platform vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying marketing automation platforms
Tags : 
automation, security process, virtualization, standardization, configuration management, it automation, circle it
    
Marketo
Published By: Okta     Published Date: May 12, 2017
This report describes how security and risk professionals (S&R pros) can apply risk concepts across the entire iAM process portfolio and use behavior-based trending methods to reduce security exposure, ease the burden of iAM policy management, and improve the user experience.
Tags : 
    
Okta
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
email security, ransomware, phishing, whaling, security strategy
    
Mimecast
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Securely store and share your firm's and your clients' tax information data. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption, compliance, data encryption, data protection, regulation compliance, efficiency
    
Citrix ShareFile
Published By: McAfee     Published Date: Apr 06, 2017
There are several steps along the SOC maturity curve and different paths to get there. Join the Foundstone Services team as they discuss the elements of a modern SOC, maturity levels, and strategic options.
Tags : 
secops, soc, siem, security strategy, soc maturity, threat management, process integrations, advanced threat defense
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Fragmented and siloed security infrastructure is not sustainable against today’s threats. Adopt an optimized approach that encourages collaboration and visibility across the enterprise.
Tags : 
secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
    
McAfee
Published By: CrowdStrike     Published Date: Mar 15, 2017
It’s time to upgrade your organization’s legacy Antivirus (AV). Here is what you need to know before replacing your AV solution. The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.
Tags : 
    
CrowdStrike
Published By: Dell EMC     Published Date: Feb 23, 2017
This study provides IT decision-makers with insight on various types of clouds and how they are used today along with a practical framework to evaluate converged infrastructure versus do-it-yourself approaches.  Based on interviews with organizations that implemented VCE solutions, Forrester Consulting quantified how VCE converged infrastructure drove significant increases in IT efficiency and productivity, as well as decreases in the cost associated with infrastructure, security, and compliance. The study describes a process for setting improvement goals and measuring success for infrastructure modernization. This process is supported by an intuitive template.
Tags : 
    
Dell EMC
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance
    
IBM
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge.
Tags : 
palo alto, pwc, advanced enpoint protection, strategy works, company protection, security
    
Palo Alto Networks
Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security
    
Veracode
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge
Tags : 
palo alto, security framework, security, business leaders, digital
    
Palo Alto Networks
Published By: Mimecast     Published Date: Aug 30, 2016
Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
mimecast, email, email security, cyber security, whaling, email security strategy
    
Mimecast
Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data
    
LogRhythm
Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
mobile maturity, mobileiron, mobile first, security risks
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.