it protection

Results 201 - 225 of 1576Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : 
quocirca, bank, banks, financial services, finserve, finserv, network security, customer data, data protection, intrusion prevention, data security, database security, security
    
Quocirca
Published By: IBM     Published Date: Jul 31, 2015
Threats from within.
Tags : 
data, security, threats, protection, hacker detection, intrusion detection, intrusion prevention, productivity
    
IBM
Published By: Mimecast     Published Date: Jan 19, 2018
The importance of information security and data protection is growing by the day for organizations. This is due to an evolving threat landscape and a higher adoption of internet dependent services, which, in the process of creating new opportunities, also lead to more vulnerabilities. As a consequence, national and international regulations are also changing according to the new challenges, calling for better preparedness. The new BCI Information Security Report 2017 sponsored by Mimecast looks to benchmark how organizations handle sensitive data and how resilient organizations are when it comes to data protection.
Tags : 
bci information, security and data protection, security report, data protection
    
Mimecast
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco
Published By: Symantec     Published Date: Apr 09, 2012
In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. Find out more about SSL - in this complimentary white paper!
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security, infrastructure
    
Symantec
Published By: IBM     Published Date: Feb 11, 2015
This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent solutions from IBM can detect and help prevent threats - from the network perimeter to remote endpoints.
Tags : 
behavior-based protection strategies, remote endpoints, ibm, network perimeter, vulnerability decodes, security, best practices, business intelligence, data protection, database security
    
IBM
Published By: VMware     Published Date: Oct 08, 2010
This white paper covers the benefits of virtualization, including reduced costs, simplified management, and improved application availability and disaster protection.
Tags : 
wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery, data growth, backup and recovery, storage virtualization, disaster recovery, it spending, database development, data integration
    
VMware
Published By: Symantec     Published Date: Jan 04, 2012
Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, application security, authentication, ddos, disaster recovery, hacker detection
    
Symantec
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
    
Hewlett Packard Enterprise
Published By: Citrix Systems     Published Date: Feb 18, 2012
Ready for 2048-bit SSL? The Iron Age is officially over. The Cloud Age is here. Don't let stronger security compromise performance. Download the Citrix and Verisign White Paper and the NetScaler Performance Comparison now.
Tags : 
2048-bit ssl, security, ssl, performance, citrix, verisign, netscaler, cloud, protection, hacking, ecommerce, traffic, ssl everywhere always-on, encryption, application, application performance management, best practices, business activity monitoring, risk management, database security
    
Citrix Systems
Published By: IBM MaaS360     Published Date: Sep 30, 2014
There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices, risk management, secure content management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection, networking, software development, it management, wireless
    
IBM MaaS360
Published By: Cisco     Published Date: Jul 08, 2016
Modern networks and their components are constantly evolving and traditional next-generation firewalls are not able to provide the level of protection organizations require. In this paper you will learn: • Why typical next-generation firewalls that focus primarily on application visibility and control offer an incomplete approach to threat defense • What organizations need to defeat advanced threats in a resource-constrained environment • What benefits you can gain with the Cisco Firepower™ Next-Generation Firewall (NGFW), the industry’s first fully integrated, threat-focused NGFW
Tags : 
    
Cisco
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: McAfee EMEA     Published Date: Mar 14, 2018
As every business decision-maker should now know, the E.U. General Data Protection Regulation (GDPR) enforcement date is coming. The GDPR will be enforced starting May 2018 and will apply to those collecting, storing or using the personal data of the residents of the European Union’s 28 member states. The Regulation changes requirements around protecting the personally identifiable information of over 500 million people, and occupies the minds of anyone around the world concerned with data protection. To better understand data decision-making, McAfee® commissioned Vanson Bourne to survey the views of 800 senior business professionals across eight countries around the world from a range of industry sectors.
Tags : 
    
McAfee EMEA
Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking, security, it management, knowledge management, data management
    
IBM
Published By: Lumension     Published Date: Jan 18, 2013
Watch this great technical webcast on-demand to help you jump start your effort to protect data on endpoints. Don't miss this real training for free™.
Tags : 
encryption, bitlocker, data protection, endpoint, security, best practices, application integration, business activity monitoring
    
Lumension
Published By: BlackBerry     Published Date: Oct 03, 2012
This presentation on NFC security will provide an overview of the security protections built into the BlackBerry platform to protect users, application developers and enterprises.
Tags : 
blackberry, security, mobile security, blackberry, smart phones, wireless security
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
An overview of BlackBerry PlayBook OS 2.0 security capabilities and features, including: BlackBerry® Balance technology, BlackBerry® Bridge, data-at-rest protection, and secure connectivity to support native email and corporate intranet access.
Tags : 
mobile security, corporate intranet, blackberry, secure connectivity, wireless hardware, wireless security, collaboration
    
BlackBerry
Published By: Symantec     Published Date: Jul 30, 2014
A paper on 6 things that can kill your website and how to stop them.
Tags : 
website security, website protection, website threats, symantec, norton, networking
    
Symantec
Published By: Neustar Registry     Published Date: Oct 03, 2011
A brand Top-Level Domain is the next Internet shift. Learn the four benefits of TLDs that every marketer needs to know: campaign management, brand trust, SEO and ROI, and build & protect my brand.
Tags : 
domain, domains, domain names, new tlds, ntlds, brand marketing, campaign management, cmo, "chain of trust, " domain names, search results, natural search, search engine, web traffic, company reputation, marketing, brand affinity, counterfeit protection, neustar, registry
    
Neustar Registry
Published By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.