evident

Results 1 - 25 of 29Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA Tier 3 ABM     Published Date: May 15, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco è imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che più necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA Tier 3 ABM
Published By: SolidFire_NetApp     Published Date: Nov 21, 2016
It’s no surprise that the Software-as-a-Service (SaaS) market is exploding; its benefits are evident and mounting. In fact, IDC predicts that the SaaS market will grow significantly by 2020. SaaS end users are reaping the benefits of greater software efficiency, agility, reduced operational headaches, and trading CapEx for OpEx. The SaaS model enables low cost to entry, scale, and no maintenance as opposed to traditional software which placed these burdens on the end user.
Tags : 
    
SolidFire_NetApp
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Oracle     Published Date: Feb 27, 2017
It is a common refrain that is getting increasingly louder: We want more control. And guests want it during every phase of the travel lifecycle. That growing desire became evident in our research as guests expressed their interest in various ways.
Tags : 
    
Oracle
Published By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : 
mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
    
McAfee
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Great thinkers like Aristotle, Descartes and Elon Musk have said that, in order to solve really hard problems, you have to get back to first principles. First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them.
Tags : 
palo alto, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: Evident.io     Published Date: Sep 13, 2017
Evident Security Platform (ESP) captures over 10 billion AWS cloud events each month. These events affect organizations of all types- from large to small, to seasoned and beginner cloud AWS users. Using our risk engine, we analyze, prioritize, and categorize these events to discover what is going unchecked. The ebook “Top 10 AWS Security Risks,” explores the most common security mistakes that users make and discusses how to remediate these threats
Tags : 
    
Evident.io
Published By: Evident.io     Published Date: Sep 13, 2017
For enterprises that use the cloud, ensuring protection starts with understanding the layers that make up the components of the cloud stack. Paying attention to each layer and addressing their unique security needs, will only bolster your enterprise’s environment. With “16 Ways to Protect Your Cloud from Ransomware,” you’ll learn about the layers that make up the cloud stack and in turn, increase your enterprise's resistance to ransomware.
Tags : 
    
Evident.io
Published By: Evident.io     Published Date: Sep 13, 2017
Defending your cloud environment from menacing threats requires conditioning and ongoing commitment. Using best practices and identifying issues before they explode into costly problems are critical to long-term cloud fitness. Automating the process of monitoring and reporting is crucial to ensuring that your cloud is in the best shape it can be. With the "AWS Security Fitness Guide," you’ll learn the 11 exercises that are critical keeping your organization’s data and systems secure in Amazon Web Services (AWS).
Tags : 
    
Evident.io
Published By: Evident.io     Published Date: Sep 13, 2017
Letting security slip for even a moment can be detrimental to your enterprise. Unfortunately, fast-moving and changing cloud environments don’t make things easier. To avoid making costly mistakes in the first place, everyone must do their part. With "The Six Essentials for DevOps Team Excellence," learn how DevOps teams can incorporate security and development and maintain agility.
Tags : 
    
Evident.io
Published By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper for 12 steps that ensure good evidential quality of email.
Tags : 
mimecast, email quality, civil procedures rules, email system, e-discovery
    
Mimecast
Published By: Evident.io     Published Date: Nov 19, 2015
Evident.io has a significant head start in this nascent corner of the cloud security space. Besides addressing a critical portion of the cloud's attack surface that isn't well covered by other vendors yet, Evident.io has built a platform that transcends the niche it currently addresses. The API/SDK consumption capabilities, data analytic and user workflow portions of the company's Evident Security Platform are valuable assets that it can leverage to grow into other areas in the future.
Tags : 
evident, cloud security, security platforms, datacenter, firewalls, public cloud, api consumption, networking, security, it management, data management, data center
    
Evident.io
Published By: Evident.io     Published Date: Nov 19, 2015
This report will help IT executives and development teams understand the new approaches to security required in a continuous deployment environment.
Tags : 
evident, security, continuous deployment environment, dev ops approach, networking, it management, data management, business technology
    
Evident.io
Published By: Evident.io     Published Date: Nov 19, 2015
Collaboration services, email, managed services, and backups and disaster recovery are the most common current use cases for cloud services, according to the results of a new SANS survey on cloud security. The 485 IT professionals who participated in the survey reported using a variety of cloud providers and service models, including software-as-aservice (SaaS) cloud offerings, along with a fairly even mix of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) implementations. Most respondents said they are investing in both public and private clouds as needs dictate.
Tags : 
evident, cloud security, collaboration services, 485 it, disaster recovery, cloud services, saas, networking, it management, wireless, data management, business technology
    
Evident.io
Published By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : 
security, best practices, web services, amazon, workload, aws, data centers, enterprise, cloud, infrastructure, it management, enterprise applications
    
Evident.io
Published By: Mimecast     Published Date: Sep 30, 2008
Infrastructures of potentially dozens of servers have built up around corporate email systems to provide better governance, reduced risk and improved legislative compliance - anti-virus, anti-spam, attachment handling, encryption, disclaimers, archiving and hot-standby mail servers to name a few.
Tags : 
mimecast, saas, software as a service, email archive, cpr, email evidence, ediscovery, medium-size business, esg, storage
    
Mimecast
Published By: Aria Systems     Published Date: Jan 28, 2015
At Aria Systems we spend a lot of time thinking about the ways in which our technology contributes to businesses seeking to capitalize on the ever-changing ways to engage with customers. Our collective interest in the IoT and its organic overlay with a long list of monetization models should be self-evident if you’ve been reading this Internet of Things anthology series. As We embarked upon this e?ort it quickly became obvious that it would be a disservice to our readers not to elevate our thinking. We needed to go beyond what was strictly relevant to the IoT’s capacity for monetization and include perspectives that looked at the IoT from other angles.
Tags : 
capitalization, monetization models, organic overlay, iot, it management, enterprise applications
    
Aria Systems
Published By: MoreVisibility     Published Date: Jan 18, 2010
The potential rise in usage and value of mobile search has been evident to Search Marketers for several years now, with the question always hanging in the balance - When will technology and usage reach its tipping point? The answer is fast becoming: Soon.
Tags : 
mobile search, more visibility, search marketers, b2b, b2c, applications, seo, google, social media, advertising
    
MoreVisibility
Published By: Symantec     Published Date: Nov 30, 2015
El año pasado, un 7% de los españoles1 realizaron sus compras navideñas por Internet, así que es evidente que los vendedores tienen que poner a punto la maquinaria del comercio electrónico. Entre las compras en línea, la opción de reserva por Internet y recogida en tienda y las cartas a los Reyes, estas navidades se disparará el volumen de datos y de ventas. Así que tendrá que garantizar la seguridad de los clientes que visitan su sitio web si no quiere recibir carbón
Tags : 
    
Symantec
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data, log law, authenticated log, netiq, net iq, networking
    
NetIQ Corporation
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.