security manager

Results 51 - 75 of 118Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance, security
     McAfee
By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology, access control, networking, security
     Aruba Networks
By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : cyber threat, cyber risk, technology, best practices, security
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : security, technology, best practices, information technology
     LogRhythm
By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : security, security application, siem, siem architecture, it security managers
     Logrhythm
By: McAfee EMEA     Published Date: Nov 15, 2017
The transition to the SDCC gives IT managers and security professionals the opportunity to build in a security architecture that is designed from the ground up to meet the needs of the cloud era. With the right architectural model, security can be much simpler to deploy, provision, manage, and scale. Organizations can save money, enhance protection, and leverage the agility of private and hybrid cloud infrastructures. IT teams can expand their visibility from the data center into the cloud, uncovering threats wherever they appear and coordinating an appropriate and comprehensive response.
Tags : software, data center, security, managers, professionals, organizations, money
     McAfee EMEA
By: McAfee EMEA     Published Date: Mar 14, 2018
McAfee advanced threat defense, McAfee Threat Intelligence Exchange, and McAfee enterprise security manager can cut through the grey to provide a clear understanding of risk.
Tags : mcafee, webinar, security, product, technology
     McAfee EMEA
By: McAfee EMEA     Published Date: Nov 15, 2017
Security Innovation Alliance Partners have integrated, tested, and certified their security solutions to work with McAfee Enterprise Security Manager. We have collaborated with our partners to simplify the integration of these products in even the most complex customer environments. This provides a truly connected security ecosystem that optimizes the value of your existing investments, improves efficiency, maximizes protection, and reduces operational costs.
Tags : entity, analytics, mcafee, enterprise, security, customer, environments
     McAfee EMEA
By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
     Secunia
By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
     Secunia
By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
     Secunia
By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : ciso, mobile, computing, security, idg, symantec, managers, enterprise, email, devices, apps, it management
     CDW Symantec
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
     IBM
By: Intel     Published Date: Aug 10, 2012
Watch this McAfee ePO Deep Command* animation to see security management beyond the operating system, Intel® AMT to optimize security and reduce costs.
Tags : enterprise security, it management, it managers, mcafee, data center, data management, animation, security, data security, data warehousing, enterprise applications
     Intel
By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with Intel® CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : remote repair, it management, operatin systems, pc repair, enterprise security, it managers, productivity, cloud storage, virtualization, security
     Intel
By: McAfee     Published Date: Mar 31, 2017
UEBA provides added visibility within SIEM for compliance and user monitoring, improving security alerts, and more insightful investigations. Today’s most advanced security operations use the technologies together to maximize each tool’s strengths.
Tags : ueba, uba, siem, analytics, secops, soc, threat hunting, correlation, incident response
     McAfee
By: McAfee     Published Date: Apr 06, 2017
Kevin O'Sullivan, Security Service Director, Kinetic IT, explains how this Australian managed security services provider relies on McAfee Enterprise Security Manager to deliver visibility of risks and threats for its customers.
Tags : siem, secops, security operations, threat visibility, compliance, integration
     McAfee
By: NetSpi     Published Date: Oct 01, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify any misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
     NetSpi
By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Dec 17, 2008
All businesses face a daily bombardment of email spam that consumes valuable IT staff time as well as end-user productivity. In addition, email is an attack vector for many types of security threats to businesses, including phishing, viruses, spyware, and malicious URLs. Given that all businesses are experiencing the financial pressures of a tightening world economy, coupled with the uncertainty of any near-term recovery, small and medium-sized business (SMB) managers are searching for ways to cut costs while continuing to maintain a consistent level of service and protection for their businesses.
Tags : saas, trend, trend micro, software as a service, smb, spyware, hacker, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
     Trend Micro SaaS
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com