Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 1 - 25 of 2297Sort Results By: Published Date | Title | Company Name
Webinar Published By: Staples Business Advantage     Published Date: Aug 01, 2017
Cybersecurity risks don’t begin and end with your PCs. Watch this webinar to hear HP’s top security expert Ron Chestang detail some surprising security issues lurking in your print network and outline specific controls you can use to minimize the risk.
Tags : 
mps, cybersecurity, print security, managed print, print networks
    
Staples Business Advantage
Webinar Published By: Mimecast     Published Date: Jun 15, 2017
Join Howard M. Cohen, Senior Resultant, Tech Channel Partners Results and Orlando Scott-Cowley, Cybersecurity Strategist, Mimecast for this webcast and hear from industry experts regarding the latest email phishing and whaling schemes penetrating the market and the steps needed to protect your employees and organization.
Tags : 
mimecast, phishing, whaling, internet security, email security
    
Mimecast
White Paper Published By: CyberX     Published Date: Feb 03, 2017
Arm yourself against the powerful cyberweapons and methods cyberattackers are using to compromise electrical grids, manufacturing, oil and gas, pharmaceuticals, and other critical infrastructure industries.
Tags : 
cyberx, ics hacking, hacking, cyberweapons, cyberattacks
    
CyberX
White Paper Published By: Mimecast     Published Date: Jan 11, 2017
Organizations that work with the personal data of European Union residents need to overhaul business processes to avoid the risks of violating the General Data Protection Regulation, which takes effect in May 2018. Penalties for non-compliance could cost your organization upwards of €20 million or 4% of total annual worldwide revenue, whichever is higher. Mimecast provides numerous ways to help simplify GDPR compliance. Learn how Mimecast Targeted Threat Protection helps ward against impersonation attacks, weaponized attachments, and malicious URLs – offering a comprehensive front-line defense for the personal data entrusted to you when it is attacked via the email vector.
Tags : 
mimecast, security, gdpr compliance, gspr risk management
    
Mimecast
White Paper Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security
    
Mimecast
White Paper Published By: Cyren     Published Date: Jan 03, 2017
By definition, a botnet is a series of Internet-connected computers, or bots, each infected with the same or different types of malware specific to the botnet’s operations. Download now to learn more about botnets and how to protect yourself from them.
Tags : 
botnet, malware, ddos attacks, internet threats, security
    
Cyren
White Paper Published By: Mimecast     Published Date: Dec 29, 2016
Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack.
Tags : 
mimecast, security, ransomware, cybersecurity
    
Mimecast
White Paper Published By: Citrix     Published Date: Oct 07, 2016
For the digital enterprise, the advantages of a high-performing network are clear. A powerful network supports mobility and a remote workforce with digital media. It manages high volume and traffic peaks. It maintains up-time and security. We explore how Citrix have delivered clients business objectves
Tags : 
networking, security, data center
    
Citrix
White Paper Published By: Mimecast     Published Date: Aug 30, 2016
Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
mimecast, email, email security, cyber security, whaling
    
Mimecast
White Paper Published By: Mimecast     Published Date: Aug 30, 2016
Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : 
mimecast, email, cloud, email archiving, email
    
Mimecast
White Paper Published By: SAS     Published Date: Aug 03, 2016
Tax fraud is already prevalent, and fraudsters are more sophisticated and automated than ever. To get ahead of the game in detecting fraud and protecting revenue, tax agencies need to leverage more advanced and predictive analytics. Legacy processes, systems, and attitudes need not stand in the way. To explore the challenges, opportunities, and value of tax fraud analytics, IIA spoke with Deborah Pianko, a Government Fraud Solutions Architect within the SAS Security Intelligence practice.
Tags : 
finance, tax fraud, security, protecting revenue, opportunities
    
SAS
White Paper Published By: Citrix     Published Date: Jul 14, 2016
Learn how Citrix NetScaler SD-WAN can keep your distributed organization up and running, in this FREE solution brief.
Tags : 
business, data center, citrix, networking, security
    
Citrix
White Paper Published By: Citrix     Published Date: Jul 14, 2016
Download the FREE infographic, showing the key benefits of Netscaler: 1. Significant Cost Savings 2. Hours saved 3. Boost ROI
Tags : 
data center, cost savings, citrix_uk/eu, networking, security
    
Citrix
White Paper Published By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : 
mimecast, whaling, phishing, email attacks, email security
    
Mimecast
White Paper Published By: Schneider Electric     Published Date: Jun 01, 2016
This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
edge schneider_uk, networking, security, data center
    
Schneider Electric
White Paper Published By: Mimecast     Published Date: Apr 21, 2016
Download the new E-book, Email Security Uncovered: The Five Faces of IT Preparedness, to learn the latest trends in email security and tips on how you can boost your security confidence.
Tags : 
email, security, trends, cyber attacks, threats
    
Mimecast
White Paper Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats
    
Mimecast
White Paper Published By: SAS     Published Date: Mar 31, 2016
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target, and likely already is. According to the Privacy Rights Clearinghouse, at the time of this writing, 884,903,517 records were breached in 4,621 incidents documented since 2005.
Tags : 
analytics, prevention practices, best practices, data security, data management
    
SAS
White Paper Published By: Mimecast     Published Date: Jan 15, 2016
Learn Office 365™ Migration Risks and How to Avoid a SaaS Monoculture.
Tags : 
mimecast, migration, microsoft office 365, storage, cloud backup
    
Mimecast
White Paper Published By: Mimecast     Published Date: May 27, 2015
White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.
Tags : 
mimecast, migration, microsoft office 365, storage, cloud backup
    
Mimecast
Software Download Published By: Acronis Inc.     Published Date: Jul 14, 2009
Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.
Tags : 
acronis, backup, recovery, windows servers, disaster recovery
    
Acronis Inc.
Software Download Published By: Acronis Inc.     Published Date: Jul 14, 2009
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. Register below to receive access for a free trial version.
Tags : 
acronis, backup, recovery, server, windows
    
Acronis Inc.
Webinar Published By: Silver Peak     Published Date: Dec 31, 9999
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
offsite data, remote replication, reliable, storage flexibility, cloud
    
Silver Peak
White Paper Published By: Delta Risk     Published Date: Mar 02, 2017
Optimize Your Security Teams Through Organizational Training. Download now!
Tags : 
security, cyber training, maximum roi, cyber training program
    
Delta Risk
White Paper Published By: Citrix ShareFile     Published Date: Feb 06, 2017
Do you know why data encryption is important for your business? Find out how using advanced encryption lets you: - Protect your data and reputation while meeting clients’ expectations. - Support your compliance with industry regulations and ethical obligations. - Eliminate paperwork and other overhead associated with data storage and sharing.
Tags : 
networking, security, enterprise applications
    
Citrix ShareFile
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.