> Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 126 - 150 of 2280Sort Results By:Published Date | Title | Company Name
White Paper Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control
    
CloudFlare
White Paper Published By: HPE_OMG_7.16     Published Date: Jul 22, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security
    
HPE_OMG_7.16
White Paper Published By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security
    
Hewlett Packard Enterprise
White Paper Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile
    
Okta
White Paper Published By: Okta     Published Date: Jul 19, 2016
77 Energy uses Okta to automate provisioning and deprovisioning tasks, so IT can focus on identifying and deploying business solutions, rather than worrying about whether or not users can access them. Hear Chris Dodds share how IT staff help people work efficiently and keep the company free of legacy business practices.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile
    
Okta
White Paper Published By: IBM     Published Date: Jul 15, 2016
This Market Guide helps CISOs identify emerging data-centric audit and protection tools. IBM is positioned with a centralized management console approach across multiple silos and has coverage of all the key capabilities evaluated by Gartner.
Tags : 
ibm, gartner, data, dcap, data-centric audit protection
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : 
ibm, data, security, virtualization, data management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments.
Tags : 
ibm, data, security, big data, data management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, security intelligence, bigfix, technology, best practices
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
cyberattack, ibm, security, access protection, business technology
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
technology, security, information technology, best practices, ips
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
economics, forresster, ibm, security, network protection
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
In this study commissioned by IBM, Forrester Consulting evaluates the changing security threats enterprises face today, as well as the evaluation and adoption trends regarding IPS as a result.
Tags : 
forrester, ibm, security, consulting, access security
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
Discover how an integrated approach to access management can reduce complexity and thwart security breaches
Tags : 
security, technology, access management, security breaches, business technology
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : 
ibm, security, access manager, best practices
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
Read Tolly's assessment of web application protection, federation capabilities, risk-based access features and overall performance of IBM Security Access Manager.
Tags : 
ibm, security, security access manager, federation capabilities, risk management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
security, best practices, fraud management, financial organizations, business management
    
IBM
White Paper Published By: IBM     Published Date: Jul 14, 2016
Fraud can happen in any organization—big or small— even in yours. Read this e-book to learn how to identify risks in your organization. It details how and why fraud happens in many organizations, four steps to prevent and detect fraud through internal controls, and why properly designing controls is a crucial step.
Tags : 
best practices, detect fraud, business management, internal control, security
    
IBM
White Paper Published By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : 
ibm, security, cloud applications, cloud, cloud-based threats
    
IBM
White Paper Published By: IBM     Published Date: Jul 14, 2016
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as ""shadow IT,"" is uncontrolled growth of cloud services, away from the watchful eyes of company IT departments.
Tags : 
ibm, ovum, cloud, cloud security, ibm cloud security enforcer
    
IBM
Webinar Published By: IBM     Published Date: Jul 12, 2016
Join IBM and partner Zementis in this webcast to hear how Predictive Model Markup Language (PMML), an industry standard, is helping solve business obstacles and enabling users to: - Drive timely and relevant insights via in-line predictive analytics - Score thousands of data records per second, scaling with business needs to enable instantaneous decisions - Improve performance and cost efficiency by reducing or eliminating movement data off-platform to conduct analysis
Tags : 
ibm, z systems, predictive analytics, analytics tools, zementis
    
IBM
Webinar Published By: IBM     Published Date: Jul 12, 2016
As most companies now realize, analytics is increasingly more of an integral part of their day-to-day business operations. In a recent survey by a global research firm, 80% of CIOs stated that transition from backward-looking, passive analysis must shift to forward-looking predictive analytics. The challenge is that many analytic solutions are aligned to a specific platform, tied to inflexible programming models and requiring vast data movement. In this webcast, Forrester and experts from IBM will highlight how technology like Apache Spark on z/OS allows businesses to extract deep customer insight without the cost, latency and security risks of data movement throughout the enterprise.
Tags : 
ibm, forrester, apache spark, spark technology, z systems
    
IBM
Webinar Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention
    
IBM
White Paper Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
IT security used to be about keeping intruders out and selectively letting in friendly visitors, which was best accomplished with a range of perimeter security and end-point solutions. Download this asset to learn more how the landscape has fundamentally shifted since, with much of this shift accelerating in the last 2-3 years. Sponsored by: HPE and Intel®
Tags : 
best practices, technology, security, business management, intel
    
Hewlett Packard Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.