mitigate

Results 51 - 75 of 269Sort Results By: Published Date | Title | Company Name
Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control, business intelligence, cloud computing
    
CloudFlare
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
    
Determine (Selectica)
Published By: IBM     Published Date: Aug 07, 2012
Leading companies applying? Predictive intelligence? To proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
Tags : 
combating, combat, risk, predictive, intelligence, companies, applying, proactively
    
IBM
Published By: IBM     Published Date: May 12, 2017
In today’s world, the data is flowing from all directions: social media, phones, weather, location and sensor equipped devices, and more. Competing in this digital age requires the ability to analyze all of this data, and use it to drive decisions that mitigate risk, increase customer satisfaction and grow revenue. Using a combination of proprietary software and open source technology can give your data scientists and statisticians the analytical power they need to find and act on insights quickly. IBM® SPSS® Statistics provides all of the data analysis tools you need, and integrates with thousands of R extensions for maximum power and flexibility. In this next Data Science Central Webinar event, we will show how SPSS Statistics can help you keep up with the influx of new data and make faster, better business decisions without coding.
Tags : 
ibm, spss, data analysis, statistics, risk mitigation
    
IBM
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security, application security, network security appliance
    
Fortinet, Inc.
Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv
Published By: illusive networks     Published Date: May 18, 2016
The growing need for cyber insurance is undeniable, yet the landscape is currently operating without standards, mostly due to the high number of unknowns regarding cyber risks. As a result, understanding how cyber insurance can help mitigate the costs for your company, if a cyber attack occurs, is quickly emerging as a best practice. Download this whitepaper and learn about what to consider when purchasing a cyber insurance plan, cyber Insurance Coverage: What Is (and Isn't) Covered, How Much Will the Coverage You Need Cost?, and how to step up cyber security efforts.
Tags : 
    
illusive networks
Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security
    
Cisco
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
By thinking proactively about DDoS defense, organizations can build a comprehensive strategy to mitigate attacks. Choosing from on-premises security devices, cloud-scrubbing services, and a hybrid approach to DDoS protection allows organizations to customize their security strategy to their application architecture and business needs.
Tags : 
ddos, ddos defense, security
    
F5 Networks Inc
Published By: NAVEX Global     Published Date: Jul 31, 2018
Learn everything you need to know about creating an engaging training programme—from defining your strategy to measuring effectiveness—in our comprehensive guide. What you'll learn: How to prevent misconduct through training How to create an engaging training programme - from defining strategy to measuring effectiveness How to develop the foundation of an ethical culture Tips, advice and examples to help organisations develop cost-effective, high-value and successful ethics and compliance training programmes How to mitigate risk and promote adherence to compliance objectives How to improve employee engagement and trust and strengthen alignment around a set of core values
Tags : 
    
NAVEX Global
Published By: Wyng     Published Date: Jan 13, 2016
The explosion of User Generated Content, or UGC, has drastically shifted the way people interact with brands. And as brands turn to UGC in place of their brand produced content, there are new risks that come with the rewards. To help mitigate these potential legal issues, we have developed a guide with everything you need to know about rights management.
Tags : 
    
Wyng
Published By: NAVEX Global     Published Date: Dec 07, 2017
The Definitive Guide to Third-Party Risk Management is a comprehensive resource full of insight, advice and examples to help organisations identify and address their third-party risk. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with third party business partners. It will also protect your organisation from the risks that third parties can present. This guide is divided into three main sections: PLAN, IMPLEMENT and MEASURE. In these sections you’ll find the information and tools you need to develop a risk-based strategy, define third-party risk and a standard due diligence process, implement continuous monitoring of third parties and identify areas in which you need to improve your programme’s effectiveness.
Tags : 
risk management, third – party risk, navex, safeguard, risk – based strategy
    
NAVEX Global
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: Oce Business Services     Published Date: Mar 24, 2008
IDC has found a direct correlation between effective document management and improved business performance. Yet recent research reveals that half of organizations rate their document process management processes as ineffective. This best-practices paper gives you insight into how you can reduce costs, increase productivity, mitigate risk and enhance business performance through the strategic outsourcing of document lifecycle management.
Tags : 
document management outsourcing, document process management, document lifecycle management, outsourcing document management, document management best practices, document process, document, oce
    
Oce Business Services
Published By: Thinksoft     Published Date: Dec 03, 2007
This white paper acts as a tool, for CEO's and Business and IT heads, helps reduce application deployment risks and costs. This paper attempts to establish how outsourcing test services to an independent domain-focused specialist company can substantially mitigate deployment risks. Business users are assured of receiving reliably better quality application well within cost and time budgets.
Tags : 
outsourcing, outsourced software testing, software testing, testing vendor, stages in outsourced software testing, independent software testing, thinksoft, software development
    
Thinksoft
Published By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : 
gdpr, risk mitigation, email resiliency, personal data protection
    
Mimecast
Published By: CDW Symantec     Published Date: Sep 06, 2012
See what happens if you neglect to protect your mission-critical applications and data, and learn what you can do to mitigate disaster.
Tags : 
data protection, data recovery, backup and recovery, disaster recovery, cloud-based backup services, virtualization, storage virtualization, cloud computing
    
CDW Symantec
Published By: ServiceNow     Published Date: Nov 05, 2012
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
itam, servicenow, it asset management, software asset management, sam, security, drive standardization, it management
    
ServiceNow
Published By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
asset management, technology, software asset management, compliance, mitigation of security risks, automation, security, it management
    
ServiceNow
Published By: Gigamon     Published Date: Sep 03, 2019
Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layer is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs). EMA recommends that today’s network operations teams modernize their approach with full application visibility. EMA research has found that network teams are increasingly focused on directly addressing security risk reduction, service quality, end-user experience, and application performance. All of these new network operations benchmarks will require deeper application-level visibility. For instance, a network team focused on service quality will want to take a top-down approach to perfo
Tags : 
    
Gigamon
Published By: SAP     Published Date: May 04, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times. Discover how streamlining common processes can reduce costs, and how you can increase the effectiveness and efficiency of the processes that differentiate you from the competition.
Tags : 
sap, lean enterprise, erp, enterprise resource planning, financial objectives, integrated platforms, business management, business process management
    
SAP
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times.
Tags : 
sap, lean, lean enterprise, three-tierd, operations, lehman, costs, operations
    
SAP Inc.
Published By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : 
hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
    
Druva
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.