effective security

Results 226 - 250 of 290Sort Results By: Published Date | Title | Company Name
By: Preventsys     Published Date: Aug 21, 2009
Security professionals are constantly being asked to justify every security project. Security risks can often be difficult to measure and even more difficult to understand by people outside the department. The key to demonstrating improvement is to translate security information into business terms.
Tags : security, metrics, business metrics, security management, information management, aligning, alignment, business integration
     Preventsys
By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
     Q1 Labs
By: Q2 eBanking     Published Date: Jul 30, 2017
Each year we examine trends in fraud reported to Q2 by our partner institutions, and every year we continue to see online banking fraud attempts in great frequency. While we may see patterns emerge or spikes in new trending behavior, the foundation of an effective defense remains consistent. Examining trends in online banking and cybercrime is crucial to navigating the current threat landscape, as is maintaining a solid defense-indepth security foundation.
Tags : 
     Q2 eBanking
By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
     Qualys
By: RSA Security     Published Date: Oct 24, 2013
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Tags : rsa, emc, big data, security, security analytics, scale, security management
     RSA Security
By: SafeNet     Published Date: Jun 04, 2013
This paper uncovers the key strategies that banks can employ in order to effectively and efficiently combat today's threats, and ensure identity and transaction security in eBanking.
Tags : ebanking, identity protection, transaction protection, authentication
     SafeNet
By: SailPoint     Published Date: Feb 08, 2011
Learn the three best practices IT should follow to ensure that business managers actively and effectively participate in identity management compliance and security processes.
Tags : sailpoint, business management, identity management, compliance, security, government regulation
     SailPoint
By: SailPoint Technologies     Published Date: Aug 02, 2019
Find out how cloud identity governance cost-effectively reduces security and compliance risk, while also providing timely access to information. Download the brief.
Tags : 
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Sep 05, 2019
Every day, employees upload vast numbers of presentations, PDFs, emails and reports to cloud storage providers like Box and Dropbox. Did you know this exposes your organization to serious risk of security breaches and compliance violations? Download this brief to find out the most effective way to close your security gaps.
Tags : 
     SailPoint Technologies
By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement
     SAP
By: SAP     Published Date: Mar 22, 2016
In the new digital economy, competition, consumer engagement, and operational effectiveness are fundamentally changing, and accelerating. New competitors are redefining the landscape at unprecedented rates. Building and keeping trust mean delivering exceptional brand experiences, every time, via agile processes that balance consumer needs with cost to serve. One size does not fit all. Engaging consumers and capitalizing on new opportunities depend on the capacity to identify, act on, and deliver high-value experiences and outcomes like joy, confidence, security, and control, all in the span of a moment, exactly where and when a consumer or business need arises. Miss the moment, miss the opportunity.
Tags : digital economy, value creation, sap, consumer engagement, business technology
     SAP
By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
     Schneider Electric
By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : secnap, network security, data security, compliance, osi, malware, antispam, anti-spam
     SECNAP Network Security Corporation
By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection
     Secure Computing
By: Shavlik Technologies     Published Date: Apr 14, 2011
This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.
Tags : shavlik, power management, security, cyberattacks, internet attacks, lan, wake-on-lan, csci
     Shavlik Technologies
By: Silver Peak     Published Date: Jun 24, 2013
Background and Goals of the 2013 Application and Service Delivery Handbook Throughout the 2013 Application and Service Deliver Handbook, the phrase ensuring acceptable application and service deliver will refer to ensuring that the applications and services that an enterprise uses: Can be effectively managed Exhibit acceptable performance Incorporate appropriate levels of security Are cost effective
Tags : application, service delivery, cost effective, security, technology, encryption, supporting chatty protocols, transmitting files
     Silver Peak
By: SilverSky     Published Date: May 09, 2014
This paper discusses how to cost-effectively turn the tables and ultimately win the battle for securing the network. It discusses different options and the methodology for making critical decisions about how to tackle your network security challenges.
Tags : silversky, outsource, network security, the cloud, value proposition, network security solutions, security options, security challenges
     SilverSky
By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : singtel, vpn, wan, lan
     Singtel
By: Software Security Solutions     Published Date: Jun 28, 2010
Ready to change Antivirus Software? Read this comparison white paper first!
Tags : software security, endpoint security, antivirus software, malware
     Software Security Solutions
By: SunGard     Published Date: Aug 13, 2012
A leader in performance management, marketing, and training, Frontline Focus required a new data solution to keep information flowing and secure. Any solution had to be resilient, highly available,completely scalable, and cost-effective.
Tags : cloud, scalable, cost-effective, sunguard, virtual, cloud, iaas, capital
     SunGard
By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security
     Sybase
By: Symantec     Published Date: Nov 02, 2006
Remote control software has proven to be a cost-effective way of providing remote support. This paper examines how these products provide a cost-effective help desk tool and defines necessary security requirements.
Tags : remote control, help desk, remote access, remote network management, remote support, network security, symantec, networking
     Symantec
By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : data loss prevention, data breaches, threats and mobility, security executives, corporate data, security
     Symantec
By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
     Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com