security technology

Results 126 - 150 of 412Sort Results By: Published Date | Title | Company Name
By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management
     HP - Enterprise
By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : fortify, open source, business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
     HP - Enterprise
By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, ciso, cyber crime, breaches, information technology, c-level
     HP - Enterprise
By: Intel Corp.     Published Date: Jul 09, 2012
Enterprise performance and embedded security technology benefits are covered in the 3rd gen Intel® CoreT vProT processor overview.
Tags : intel, 3rd generation, core vpro
     Intel Corp.
By: ForeScout     Published Date: Feb 18, 2014
Read the new Enterprise Strategy Report (ESG) analyst report. ESG projects that as NAC transforms into EVAS (Endpoint Visibility, Access & Security) it will become even more of a mainstream IT technology.
Tags : forescout, network access control, nac, enterprise strategy report, esg, endpoint visibility, access, security, end-user mobility, byod, enterprise, networking, it management, knowledge management, enterprise applications
     ForeScout
By: Enterprise Mobile     Published Date: Sep 23, 2013
Gone are the days when mobility involved simply choosing a standardized device. Today, Enterprise IT leaders have to think about not just devices, but apps, data, storage, management (of devices, apps, content, and telecom expenses), security, and support. If you don’t consider your overall business goals as you develop and refine your mobility strategy, you risk investing in mobile technology for mobility’s sake alone. Smart decisions make it easier to adapt over time while keeping a lid on costs. Skyrocketing mobility costs are a common fear for organizations, but careful planning will help keep your mobility spend safely earthbound.
Tags : mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, mobility planning, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
     Enterprise Mobile
By: NetApp     Published Date: Oct 08, 2013
Learn how efficient NetApp IT empowers the Denver Broncos to invest in the future by providing asychronous disaster recovery and data protection.
Tags : data protection, security, netapp, disaster recover, technology, best practices, it management, data management, business technology
     NetApp
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : firewall, network security, urls, ips, adequate protection, security
     Webroot Inc
By: Polycom     Published Date: Mar 13, 2015
As the financial services industry moves away from its historic focus—on high margin business, banking, brokerage, insurance, trading, wealth management, and payment companies—they must rethink and strengthen the ways they interact with markets and customers. Organizations that fail to provide personalized services for their clients or to satisfy increasingly demanding customers will struggle to keep their position as competitors innovate at every turn.
Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
     Polycom
By: Polycom     Published Date: Mar 13, 2015
The Dominion Group of Companies offers clients a wide range of professional services, including investment advising, trust services, wealth management, and insurance. Based in Virginia Beach, Virginia, the company has three main offices as well as independent affiliate offices in multiple locations throughout the United States. Dominion is a small but growing company, currently employing 40 people. A recent opportunity for expansion of the trust side of the business required Dominion to branch out from its Virginia Beach headquarters, opening an office in Florida and relocating one of the firm’s principals to that location. A top priority during that transition was maintaining effective communication, despite the distance, to limit any disruption to existing client services and workflows.
Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
     Polycom
By: Polycom     Published Date: Mar 13, 2015
United Bank for Africa (UBA) Group is one of Africa’s leading financial institutions offering banking services to more than seven million customers via 750 branches in 18 African countries. With further offices in New York, London and Paris, UBA is connecting people and businesses across the world through retail and corporate banking, innovative cross-border payments, trade finance and investment banking. Over the past three years, UBA had undergone a period of rapid expansion that had seen affiliate banks in 16 African countries come on board. This expansion has naturally put the group’s communication infrastructure under pressure.
Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
     Polycom
By: Polycom     Published Date: Mar 13, 2015
Korean securities and investment firm boosts profits through secure and reliable financial transmissions. Secure financial video data transmission of up to 25,000 concurrent sessions, help boost Woori client confidence and profits for Korean investment and securities firm.
Tags : investment, security, financial transmission, profits, innovative technology, unified communication, data management
     Polycom
By: G Suite     Published Date: Jun 28, 2016
Now you can experience the ease and flexibility of open, collaborative tools while gaining better protection for your data. As Google security experts and customers share their vision for a safer Internet, discover how Google’s innovative security technology meets the unique challenges of working and living in the cloud.
Tags : 
     G Suite
By: AWS     Published Date: Nov 15, 2018
"Cloud migration can be fraught with inevitable speed bumps. IT management must keep pace while infrastructures grow more complex, and security teams must safeguard their organization’s posture even as they relinquish control over some key technology—all while business teams must continue to predict and manage costs along the way. There are ways to navigate this process more effectively. Register for your complimentary copy of the ebook How to Get Your Cloud Migration Strategy Right. You’ll learn how to make your cloud migration journey successful, including: • How to make the transition to the cloud as seamless as possible • Why you need full visibility into your infrastructure before, during, and after migration • How IT, security, and operations teams can maximize the ROI from moving to the cloud"
Tags : 
     AWS
By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
     Ciena
By: AWS - ROI DNA     Published Date: Nov 19, 2018
Cloud migration can be fraught with inevitable speed bumps. IT management must keep pace while infrastructures grow more complex, and security teams must safeguard their organization’s posture even as they relinquish control over some key technology—all while business teams must continue to predict and manage costs along the way. There are ways to navigate this process more effectively. Register for your complimentary copy of the ebook How to Get Your Cloud Migration Strategy Right. You’ll learn how to make your cloud migration journey successful, including: • How to make the transition to the cloud as seamless as possible • Why you need full visibility into your infrastructure before, during, and after migration • How IT, security, and operations teams can maximize the ROI from moving to the cloud
Tags : 
     AWS - ROI DNA
By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
     Trend Micro
By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : security, cloud, application delivery, authentication, access control, application security, silos, password fatigue, iam
     F5 Networks Inc
By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture
     ESET
By: Kaspersky     Published Date: Feb 05, 2015
The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime, kaspersky
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks
     Kaspersky
By: Entrust Datacard     Published Date: Jan 24, 2014
Mobile Security Gains Traction as Enterprises Embrace New Technology
Tags : entrust, security, mobile, mobile security, mobile devices, malware
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities.
Tags : cybersecurity, small and medium businessess, technology, protect, smbs, security
     Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com