security services

Results 276 - 300 of 415Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Apr 13, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : adobe, document security, cloud services, it research, global insights
     Adobe
By: Adobe     Published Date: Aug 11, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : adobe, enterprise, mobile, security, saas, document management, cloud, business technology
     Adobe
By: Adobe     Published Date: Nov 10, 2015
Download this white paper to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : adobe, document security, data security, mobile device, enterprise, mobile, security, saas, document management, cloud, data center
     Adobe
By: F5 Networks     Published Date: Mar 18, 2015
Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works and how to mitigate Neverquest.
Tags : f5 networks, malware, security, network security
     F5 Networks
By: Alert Logic     Published Date: Jun 12, 2014
The numbers show a clear trend: there is a growing consensus among CISOs that outsourcing security services is a viable option. In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market.
Tags : mssp, security services, cloud security, managed security, secure cloud, it management, enterprise applications
     Alert Logic
By: Alert Logic     Published Date: Jun 12, 2014
In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is not whether the cloud is part of their infrastructure plans, but which applications and workloads to move to the cloud and when. But even as the benefits of cloud and hosted models have become apparent, concerns persist about security, and an assumption lingers that the cloud is inherently less secure than an enterprise data center environment.
Tags : cloud security, public cloud, amazon web services, cloud pci, secure cloud, security, it management
     Alert Logic
By: SnowFlake     Published Date: Jul 08, 2016
In the era of big data, enterprise data warehouse (EDW) technology continues to evolve as vendors focus on innovation and advanced features around in-memory, compression, security, and tighter integration with Hadoop, NoSQL, and cloud. Forrester identified the 10 most significant EDW software and services providers — Actian, Amazon Web Services (AWS), Hewlett Packard Enterprise (HPE), IBM, Microsoft, Oracle, Pivotal Software, SAP, Snowflake Computing, and Teradata — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architect professionals select the right solution to support their data warehouse platform.
Tags : forrester, enterprise, data, technology, best practices, innovation, security, business technology
     SnowFlake
By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : security solutions, protecting data, secure management, cost-effective, security, it management
     Centrify Corporation
By: Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : cylance, endpoint, protection, cyber, security
     Cylance
By: Qualys     Published Date: Jan 11, 2017
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Symantec     Published Date: Mar 14, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
     Symantec
By: iDirect     Published Date: Oct 13, 2011
In an insightful report from iDirect, find out why satellite is the best option for delivering cost-effective, reliable, broadband connectivity to any location. Today's satellite networks are enterprise-class platforms built on IP; offering seamless integration with existing communications technology. In addition, satellite now delivers up to 99.99 percent network availability and meets new security regulations, such as AES encryption. Get the facts on satellite for the smart grid and learn how satellite services can deliver the security, latency, and reliability required for all core utility applications. Download the report.
Tags : idirect, satellite communications, technology, smart grid, utility companies
     iDirect
By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : intermedia, email security, exchange 2007, archiving, encryption, content management, security
     Intermedia
By: Intermedia     Published Date: Nov 10, 2008
Microsoft Exchange is the leading business email and collaboration solution for the small,up to the large, business markets, and this whitepaper compares the security of Microsoft Exchange Services deployed in-house versus a hosted model with SaaS service providers. By choosing Intermedia as their Hosted Exchange SaaS Solution Provider, businesses can achieve email and total messaging security, as well as a piece of mind, by leveraging Intermedia’s infrastructure and experience with running a secured messaging platform.
Tags : intermedia, email security, logical server security, software as a service, saas, microsoft exchange services, security assessment testing, security
     Intermedia
By: GoToAssist     Published Date: Oct 05, 2011
It used to be that having your head in the clouds was pejorative. Not anymore. Today, almost everyone wants to be in the cloud. But skepticism about cloud security is leaving a few folks stuck on the ground. This white paper explores key cloud security questions addressed during the 2010 Forrester Security Forum, including private versus public clouds, security standards and cloud services trends.
Tags : citrix, technology, cloud computing, data protection, security, standards
     GoToAssist
By: Microsoft Corporation     Published Date: Oct 19, 2010
Get a close look at Microsoft security measures for ensuring data protection and integrity, and learn how you can rest assured about the security and reliability of Microsoft Online Services with 24x7 IT professional support and a financially backed service level agreement (SLA) for 99.9 percent uptime.
Tags : microsoft online services, security measure, data protection, business productivity, collaboration, it administration
     Microsoft Corporation
By: Qualys     Published Date: Nov 16, 2012
This whitepaper discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smalles to multinational enterpries, to put trust back into the security equation.
Tags : cloud based services, security, it security, data breach, ssl, ssl governance, business technology
     Qualys
By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : carbon black, ema, endpoint, security, prevention, vendor, detection, response, it management, data management, business technology
     CarbonBlack
By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : singtel, vpn, wan, lan
     Singtel
By: IBM     Published Date: Sep 09, 2013
Learn about IBM's worldwide security operations and receive their free analysis of cyber security attacks and incident data
Tags : ibm security services, ibm, security services, cyber security intelligence, cyber security, index, cyber security intelligence index
     IBM
By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : on-the-job training, it professionals, cyber security services, security programs, security
     Symantec
By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : phishing, campaigns, antiphishing, security, social media, malware, block, network, technology, protection, web security, networking
     Webroot Inc
By: Rackspace     Published Date: Nov 24, 2015
Security is persistently top of mind for IT and business leaders because there is so much at stake. Can vendors help your organization take the topic of security from a challenge to a champion?
Tags : digital security, it security, data security, security risks, hosting, hosting providers, data services, big data, it management, enterprise applications, business technology
     Rackspace
By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
     Tripwire
By: IBM     Published Date: Oct 10, 2013
The security world is a scary place, and it’s getting scarier. Every day brings more risks, threats, customer demands, and regulations. Worse yet, it’s becoming more difficult to recruit and retain people who really get it and know how to help. It’s time for a new model. A survey conducted by Forrester Consulting and commissioned by IBM shows that security leaders are partnering with managed security services providers in increasing numbers—and the feedback is overwhelmingly positive.
Tags : security, risks, threats, security breach, customer demands, regulations, forrester consulting, ibm, security leaders, managed security services, it solutions, sercurity service providers, it management, data management, business technology
     IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com