security risks

Results 1 - 25 of 352Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Mar 12, 2020
Industry report from a global study of 1001 IT Security executives and directors. Assesses state of cybersecurity in terms of technology, process & people. To be used in vertical programing, campaigns and industry thought leadership initiatives.
Tags : 
    
VMware
Published By: Swimlane     Published Date: Dec 26, 2019
Is your cybersecurity team overwhelmed by security alerts? Overcome this challenge with incident response automation. This 17-page e-book examines the increasing pressures faced by cybersecurity teams, risks of ineffective alert triage and new automation capabilities that dramatically improve the efficiency of security operations. With automated incident response and security orchestration, your team can: Respond to every security alert Reduce mean time to respond (MTTR) Do more with current staff
Tags : 
    
Swimlane
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: Spirion     Published Date: Feb 26, 2020
In todayís world, data breaches are an increasingly common occurrence. The greatest financial damage typically comes when breaches expose sensitive data, such as social security numbers, credit card data, health information, business secrets, government records, and other valuable data that is costly to lose, especially when a breach captures the mediaís attention. Once public, such breaches result in tens or hundreds of millions of dollars in post?breach losses. In this book, youíll discover how to identify sensitive data, implement a data classification process, and minimize the risk of data breaches. Youíll also learn about the risks of not classifying data and the components of a data classification and sensitive data management life cycle. This book will arm you with the tools for managing risks and preventing the next financially damaging breach of sensitive data.
Tags : 
    
Spirion
Published By: Cisco EMEA     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : 
hyperflex, systems, data platform, storage efficiency, business, cisco
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Hybrid cloud drives innovationóbut digital transformation introduces more potential threats and vulnerabilities. Build security in and address risks upfront with proven capabilities from HPE, a global authority in IT security.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jun 22, 2015
Read this paper to find out how the Cisco and Microsoft data center solutions provide your IT infrastructure with the flexibility and agility needed to address your changing business needs and achieve your business goals.
Tags : 
cisco and microsoft data center, it infrastructure, security risks, data center, data center solutions
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information securityóor, the lack of itóis firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be securedóbut not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: ē how cloud adoption is reshaping the threat landscape ē why identity and access management must be a priority ē what are cybersecurity best practices in a modern IT environment ē which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG
Published By: Dell EMC EMEA     Published Date: Mar 13, 2020
VMwarecommissioned Forrester Consulting to conduct a Total Economic Impactô (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying its VMware Workspace ONEô Unified Endpoint Management solutionpowered by AirWatch,particularlyto manage Windows 10 devices across a distributed workforce.The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Workspace ONEfor an organizationís Windows 10 modern management transformation initiativetoreduce security risks,improve desktop management processes, reduce costs, and improve employee efficiency. Workspace ONEdelivers greater mobility to employees by managing Windows 10 desktop and laptop devicesusing a cloud-based, modern management architecture ólike the methodsadopted by IT to manage mobile phonesówith anywhere access, always up-to-date operational data,all whileadhering to strict corporate security and management standards.
Tags : 
    
Dell EMC EMEA
Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models werenít built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency" "Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery plat
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Feb 04, 2016
Not only do outdated systems pose security risks, they also prevent the organization from accessing the benefits of a modern operating system. Download this whitepaper to learn six of the most noteworthy.
Tags : 
    
Dell
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models werenít built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against todayís security risks.
Tags : 
hardware, tpm, it security, windows, telecommunication, byod
    
Dell
Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organizationís data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell
Published By: Dell     Published Date: Oct 24, 2014
The cloud, virtualization, and virtual desktop infrastructure (VDI) help make IT's life easier ó and the whole organization more agile ó but each of these features also presents serious security challenges. Although there is no one-size-fits-all solution to managing security in the enterprise 2.0 world, the enhanced security features and user-centric offerings in Microsoft Windows Server 2012 make security a much more comfortable proposition for IT. Read this technology brief to learn how Windows Server 2012 helps to mitigate risks and streamline compliance, as well.
Tags : 
virtualization, vdi, it compliance, it security
    
Dell
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
There are many attributes to consider when choosing sourcing options, some more obvious than others, such as hourly rate. However, when evaluating the true costs of sourcing, leading organizations also look at other critical factors associated with business-critical projects--such as agility, integration with other operations, security risks, scalability, public image, and business understanding-- that can make all the difference to ensuring successful project outcomes.
Tags : 
collaborative consulting, domestic solution, sourcing model, cost comparison, constrained workforce, offshore, financially constrained, user interaction
    
Collaborative Consulting
Published By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : 
mobile security, solutions, websense, mobile security, solutions, major it security strategy, security, it management
    
Websense
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.