security as service

Results 226 - 250 of 297Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: Apr 23, 2010
This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach.
Tags : proofpoint, saas, email security, software-as-a-service
     Proofpoint
By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
     ProofSpace
By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : technology, firewall, security, cloud, data, anti-virus, business technology, research
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This whitepaper discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smalles to multinational enterpries, to put trust back into the security equation.
Tags : cloud based services, security, it security, data breach, ssl, ssl governance, business technology
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services, disaster recovery, data security, vulnerabilities management, security services, web applications, virtualisation, mobility
     Qualys
By: Rackspace     Published Date: Mar 28, 2018
With Rackspace Managed Security and Compliance Assistance for GCP, Rackspace is now a leading managed security services provider that offers services on all of the major public cloud platforms. In IDC’s 2017 CloudView Survey of over 6,000 enterprise respondents, nearly 50 percent indicated concerns about security in the cloud, and about 40 percent cited superior security capabilities available from service providers as a major incentive to move to the cloud.¹ With RMS, Rackspace security experts help customers with strategic planning for best practice multi-cloud security, tactical day-to-day security monitoring and threat analysis to deter, detect and respond to potential threats around the clock.
Tags : 
     Rackspace
By: Rackspace     Published Date: Mar 20, 2019
Banks embarking on any cloud activities must first overcome the compliance of rigorous security policies and regulations. For its 100th anniversary commemorative website, The Bank of East Asia (BEA) partnered Rackspace Professional Services – for expertise and advice on advanced cloud management, best practices and security – to help with the designing of a highly secured and compliant AWS environment to host the new, celebratory website.
Tags : 
     Rackspace
By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
     Rackspace
By: Rackspace     Published Date: May 28, 2019
Tokio Marine Life Insurance Singapore (TMLS), an established general and life insurance firm, and subsidiary of the first insurance company in Japan, Tokio Marine Holdings, envisioned an e-services portal to improve user experience by providing a single platform for all customer interactions. For its infrastructure and environment development, the insurer engaged the professional managed security and managed public cloud services of Rackspace, to help with the optimization of its Azure cloud platform, as well as to ensure that the migration is compliant to Singapore’s strict regulations on public cloud use by financial services institutions. The new portal that went live recently had Rackspace instrumentally involved in its building, running, managing and optimizing for the Azure cloud, including a best-practice infrastructure design with the latest resiliency and security features. Building on the success of this year-long project, a future collaboration to tap Rackspace’s PCI DSS
Tags : 
     Rackspace
By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing, data breach, breach
     Rapid7
By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : java, network security, security breach, security flaws, network intrusion
     Rapid7
By: Reactivity     Published Date: Aug 21, 2009
This white paper discusses the three critical Web services deployment issues-security, provisioning connections, and operations. As each is owned by different factions within an enterprise, each can become a 'show stopper' to Web services deployment initially, and every time a change must be made.
Tags : web service security, secure web services, web service, internet security, web applications, file sharing, network security, reactivity, software development
     Reactivity
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
     Red Hat
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, security, data center
     Red Hat
By: Red Hat     Published Date: Jun 23, 2016
The Middleware Services Group within Information Technology Services (ITS) at the University of North Carolina at Chapel Hill needed a comprehensive, dynamic solution for frequent server provisioning requests and, in particular, managed servers. Without such a solution, the likelihood that users would employ outside vendors significantly increased. Use of outside vendors would potentially increase security concerns, present additional costs, and further complicate system administration. Moving to a fully-interoperable Platform-as-a-Service (PaaS) offering, built on OpenShift Enterprise by Red Hat, has allowed the middleware services team to deliver a flexible development and hosting environment that has fostered innovation and increased peace of mind.
Tags : best practices, technology, productivity, enterprise, red hat
     Red Hat
By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
     SecureAuth
By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks Incident Management and Response team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents. This paper is designed to help you ask tough, dir ect questions of any incident response services provider to help you determine the vendor’s capabilities, and if that vendor represents the best fit based on your organization’s particular needs. We highly recommend using the following questions when evaluating any outside assistance with your incident response function.
Tags : 
     Secureworks
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: SilverSky     Published Date: Apr 16, 2013
In Forrester's 15-criteria evaluation of the emerging managed security services provider (MSSP) market, SilverSky was identified as a leader. Forrester identified the 10 most significant providers in this category and researched, analyzed, and scored them. SilverSky was given high ranks for business and technical value, SLA adherence, security services, and threat intelligence and analytics. Download this industry research paper now to learn why SilverSky is the MSSP you should be working with today.
Tags : managed security, msp, managed service provider, sla adherance, threat intelligence, analytics, mssp, forrester
     SilverSky
By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : vulnerability management, security, threat management, security, assessment
     SilverSky
By: SilverSky     Published Date: May 09, 2014
This white paper explores the problems with traditional network setups and ways to address these issues in a budget friendly manner.
Tags : silversky, fortune 500, business security, network security, it management, security products, security systems, log data, detects threats, protects network, it budgets, software-as-a-service, saas, log management, security
     SilverSky
By: SilverSky     Published Date: May 09, 2014
This paper provides an overview of the benefits of outsourced security solutions such as managed security services. The managed security services option saves money, improves the network security posture, and maximizes the efficiency of existing corporate resources.
Tags : silversky, business value, security services, the cloud, security conundrum, decrease threats, service providers, managed solutions, security solutions, security, it management
     SilverSky
By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : mssps, managed security service, security challenges, security professionals, security, it management, knowledge management, enterprise applications
     SilverSky
By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : singtel, vpn, wan, lan
     Singtel
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com