Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

security support

Results 1 - 25 of 199Sort Results By: Published Date | Title | Company Name
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault
Published By: Automation Anywhere     Published Date: Feb 21, 2019
Robotic Process Automation was born with the vision of empowering business users to create software bots that could interact with enterprise systems just like humans. Its benefits include substantial time and cost savings, improved customer satisfaction, increased workforce morale, and the ability to build a competitive advantage over competitors. But to fully realize all these benefits, it’s important for businesses to select a solution with a robust RPA security architecture that supports core principles, such as least privileges and separation of duties while delivering end-to-end protection for the critical apps and sensitive data involved. This paper provides an overview of the industry’s highest standard for enterprise-grade security as demonstrated by the market’s leading Digital Workforce platform, Automation Anywhere Enterprise.
Tags : 
    
Automation Anywhere
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: BigCommerce     Published Date: Feb 13, 2018
Are you getting the most out of your ecommerce platform, for the best price? In this Ecommerce Comparison Chart, find out how Magento, Shopify Plus, and BigCommerce compare. See who checks the box for important keys features, security, and support, and learn what each pricing plan includes. How does your ecommerce platform stack up?
Tags : 
bigcommerce, magento, ecommerce, shopify, shopping cart, website, dropshipping, amazon, ebay, google shopping, demandware, wesbite design, ecommerce website, best ecommerce, omnichannel, b2b ecommerce, erp, payment gateway, saas, sell online
    
BigCommerce
Published By: BigCommerce     Published Date: May 30, 2018
Are you getting the most out of your ecommerce platform, for the best price? In this Ecommerce Comparison Chart, find out how Magento, Shopify Plus, and BigCommerce compare. See who checks the boxes for important key features, security and support, and learn what each pricing plan includes. How does your ecommerce platform stack up?
Tags : 
    
BigCommerce
Published By: BlackBerry     Published Date: Oct 03, 2012
Uncover the key attributes of one mobile device management solution that delivers the features every enterprise should demand when it comes to security, manageability, stability, and technical/customer support.
Tags : 
mobile device management, mobile solutions, security, mdm, blackberry, wireless
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
An overview of BlackBerry PlayBook OS 2.0 security capabilities and features, including: BlackBerry® Balance technology, BlackBerry® Bridge, data-at-rest protection, and secure connectivity to support native email and corporate intranet access.
Tags : 
mobile security, corporate intranet, blackberry, secure connectivity
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 11, 2013
Find out about the key factors in any Enterprise Mobility Management (EMM) solution, including manageability, security and support. Then learn how BlackBerry® 10 addresses each one, and more.
Tags : 
blackberry, enterprise, blackberry enterprise 10, smart choice, byod, bring your own device, addresses, enterprise applications
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Uncover the key attributes of one mobile device management solution that delivers the features every enterprise should demand when it comes to security, manageability, stability, and technical/customer support.
Tags : 
mobile device management, mobile solutions, security, mdm, blackberry
    
Blackberry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
To move your business from its current state to the connected enterprise, you have to define a common API to your database and other systems, while providing the infrastructure to support the new model. The new systems must incorporate the security safeguards while ensuring the infrastructure can support the new growing, but variable, load. With the rapid adoption of mobile and web-based services across the industry, the REST architecture has emerged as the de facto standard for API integration across systems. This white paper addresses the concepts of REST, creating REST APIs for your databases and integrating with other systems: • What is REST? • Why use REST for database access? • Building REST infrastructure for database access • The REST enabled database • Integrating REST with other services • Criteria for selecting REST services platform
Tags : 
    
CA Technologies EMEA
Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
IT departments must contend with an array of devices, operating systems and cellular carriers as well as new security threats. Even if IT departments can get a handle on the complex mobility landscape, the technology is so fluid that the picture is constantly changing. That means the IT staff has to devote time to learning about, procuring, deploying and supporting an array of devices. Busy IT departments now have another option for addressing these challenges: a monthly subscription package that provides a customizable web-based portal to automate mobile device procurement, expense management and support.
Tags : 
mobile, data, communication, tablet, smartphone, device, enterprise, tools, efficiency, wireless, enterprise applications
    
CDW
Published By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
    
CheckMarx
Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security, visibility, management, support, migration, services, applications, improve, proactive, protection
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.