mitigate

Results 126 - 150 of 278Sort Results By: Published Date | Title | Company Name
Published By: NAVEX Global     Published Date: Jul 31, 2018
Learn everything you need to know about creating an engaging training programme—from defining your strategy to measuring effectiveness—in our comprehensive guide. What you'll learn: How to prevent misconduct through training How to create an engaging training programme - from defining strategy to measuring effectiveness How to develop the foundation of an ethical culture Tips, advice and examples to help organisations develop cost-effective, high-value and successful ethics and compliance training programmes How to mitigate risk and promote adherence to compliance objectives How to improve employee engagement and trust and strengthen alignment around a set of core values
Tags : 
    
NAVEX Global
Published By: HP - Enterprise     Published Date: Jan 24, 2013
This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk.
Tags : 
cloud, security, attacks, risk, virtualization, encryption, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, disaster recovery, email security, internet security, intrusion detection, intrusion prevention
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jan 24, 2013
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Tags : 
mobile, vulnerability, byod, dast, sast, testing, risk management, security management, anti spyware, anti virus, business continuity, compliance, email security, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, network security appliance
    
HP - Enterprise
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times.
Tags : 
sap, lean, lean enterprise, three-tierd, operations, lehman, costs, operations, shared services level, corporate level, division level, leadership, crisis management, corporate strategy, enterprise visibility, enterprise applications, governance, united pipe, benchmark, procurement
    
SAP Inc.
Published By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: Tenable     Published Date: Nov 06, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
    
Tenable
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
In a world where IT has become increasingly complex, cyber threats are unrelenting, and the cost to mitigate is becoming overwhelming, organizations are reconsidering the DIY approach to security and embracing the idea of outsourced security services. And while there are caveats to outsourcing security services, many organizations are reaping the OpEx and CapEx benefits while freeing themselves from becoming in-house security experts - refocusing on their core business. Read the whitepaper to learn more.
Tags : 
enterprise security, managed services, security
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
By thinking proactively about DDoS defense, organizations can build a comprehensive strategy to mitigate attacks. Choosing from on-premises security devices, cloud-scrubbing services, and a hybrid approach to DDoS protection allows organizations to customize their security strategy to their application architecture and business needs.
Tags : 
ddos, ddos defense, security
    
F5 Networks Inc
Published By: Skillsoft     Published Date: Oct 03, 2014
With the recent increase in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in Europe and other regions, knowledge of bribery rules and regulations has never been more critical. In the US alone, the total fines for FCPA violations levied by the Department of Justice (DOJ) and Securities and Exchange Commission (SEC) in 2013 exceeded $720 million1. Fortunately, effective training and internal communication have been identified as strategies to mitigate your compliance risk. Here are five things you need to know about anti-bribery enforcement trends.
Tags : 
skillsoft, foreign corrupt practices act, fcpa, department of justice, doj, securities and exchange, anti-bribery, enforcement trends, anti-corruption
    
Skillsoft
Published By: EVault Inc.     Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more. This white paper explores: . Defining security policies for endpoint backup and recovery . Enforcing endpoint controls . Ensuring employee adoption . Keeping IT costs in check
Tags : 
white, paper, best, practices, for protecting, laptop, data, endpoint, corporate, risk, regulatory, financial, exposure, security, policies, backup and recovery, storage, compliance, disaster recovery, business intelligence
    
EVault Inc.
Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected, access control, anti spam, anti spyware, anti virus, application security, auditing, compliance, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, analytical applications
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Windows 8 includes many new security features, such as secure password storage, secure boot functions, anti-malware defenses, and even enhanced reputation capabilities. Will these features be enough to mitigate risks to users and corporate networks?
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000, windows xp, windows defender, boot time protection, 2012 windows server security, endpoint protection 2012, smartscreen technology, adobe flash security, security, windows
    
McAfee
Published By: Dell     Published Date: Sep 12, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell
Published By: Polycom     Published Date: May 12, 2015
To mitigate their risk and maintain the trust of the customer, smart FSIs are learning how to collaborate so they can incorporate all compliance programs necessary to keep them in good standing throughout their integrated businesses.
Tags : 
polycom, enterprise, collaboration, fsi, compliance, enterprise resource planning
    
Polycom
Published By: Great Bay Software     Published Date: Apr 12, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: Genesys     Published Date: Nov 02, 2017
This is the central finding of a global survey of over 550 senior executives conducted by MIT Technology Review to examine the pressures that shape their customer experience processes and the tools and strategies they employ to mitigate those challenges and continuously improve customer engagement.
Tags : 
customer experience technology, mit technology review, technology solutions
    
Genesys
Published By: Rizepoint     Published Date: Feb 13, 2017
Consumers and other stakeholders increasingly want to know where their products come from and how they are produced. A successful Responsible Sourcing program strengthens the corporate brand by making it more predictive and adaptive to changing market needs and helping the company develop resilience, mitigate risk, improve efficiency, and better manage supplier relationships. Download this complimentary guide to read about key concepts and principles that apply to virtually any organization when managing Corporate's Responsible Sourcing guidelines, and ensuring franchisee compliance for protection of your brand and commitment.
Tags : 
    
Rizepoint
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection, database security
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : 
ssl, ssl solutions, networking, privacy, security, network security, enterprise applications
    
F5 Networks Inc
Published By: Genesys     Published Date: Jun 19, 2019
Success is defined by the quality of your customer relationships. Outdated infrastructure hinders your ability to deliver consistent service across all channels and touchpoints. With rising customer and business demands, you might not have time to wait and see what long-term options a vendor will offer, and when. Proven, market-leading customer experience solutions let you optimize customer engagement across existing channels. And with a partner who’s focused on both innovation and your success, you can future-proof your business as it evolves. Read this executive brief to learn how to incorporate an open, stable and proven customer experience platform—and provider. Discover the advantages of a proven prescriptive migration methodology that will guide your successful customer experience transformation, including: Establishing a solid foundation for customer engagement channels and touchpoints as they emerge Extending omnichannel engagement across departments and processes outside of
Tags : 
    
Genesys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.