> White Papers > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 126 - 150 of 2298Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 15, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : ibm, security intelligence, bigfix, technology, best practices, security
     IBM
By: IBM     Published Date: Jul 15, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : cyberattack, ibm, security, access protection
     IBM
By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : best practices, security, technology, next gen
     IBM
By: IBM     Published Date: Jul 15, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : economics, forresster, ibm, security, network protection, performance
     IBM
By: IBM     Published Date: Jul 15, 2016
Discover how an integrated approach to access management can reduce complexity and thwart security breaches
Tags : security, technology, access management, security breaches
     IBM
By: IBM     Published Date: Jul 15, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : ibm, security, access manager, best practices
     IBM
By: IBM     Published Date: Jul 15, 2016
Read Tolly's assessment of web application protection, federation capabilities, risk-based access features and overall performance of IBM Security Access Manager.
Tags : ibm, security, security access manager, federation capabilities, risk management, best practices, technology, it management
     IBM
By: IBM     Published Date: Jul 15, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : security, best practices, fraud management, financial organizations, business management, ibm
     IBM
By: IBM     Published Date: Jul 14, 2016
Safely connect users to cloud applications and help protect the business against cloud-based threats
Tags : ibm, security, cloud applications, cloud, cloud-based threats, networking, enterprise applications
     IBM
By: IBM     Published Date: Jul 14, 2016
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as ""shadow IT,"" is uncontrolled growth of cloud services, away from the watchful eyes of company IT departments.
Tags : ibm, ovum, cloud, cloud security, ibm cloud security enforcer, saas, security, enterprise applications
     IBM
By: IBM     Published Date: Jul 12, 2016
Join IBM and partner Zementis in this webcast to hear how Predictive Model Markup Language (PMML), an industry standard, is helping solve business obstacles and enabling users to: - Drive timely and relevant insights via in-line predictive analytics - Score thousands of data records per second, scaling with business needs to enable instantaneous decisions - Improve performance and cost efficiency by reducing or eliminating movement data off-platform to conduct analysis
Tags : ibm, z systems, predictive analytics, analytics tools, zementis, predictive model markup language, pmml, security
     IBM
By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi, security
     IBM
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
IT security used to be about keeping intruders out and selectively letting in friendly visitors, which was best accomplished with a range of perimeter security and end-point solutions. Download this asset to learn more how the landscape has fundamentally shifted since, with much of this shift accelerating in the last 2-3 years. Sponsored by: HPE and Intel®
Tags : best practices, technology, security, business management, intel, hpe
     Hewlett Packard Enterprise
By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications
     BitSight Technologies
By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection
     Commvault
By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
     Commvault
By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Unsanctioned file sharing creates serious security and regulatory compliance issues. Read this infographic to learn how to sync, share and control data securely!
Tags : commvault, data security, protecting corporate data, commvault file sharing, virtual host costs, virtualization, networking, security
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Data conversations continue to change as all businesses are trying to figure out today's reality of the move to the cloud, anywhere/anytime computing, and the explosive growth of data. These trends have drastically reshaped the IT industry and data management forever. With continued market innovations in storage, cloud, and hyper-converged infrastructures, there are six key modern IT needs that are increasingly the focus of CIO and technology leaders.
Tags : commvault, modern data protection, data security, storage, cloud, hyper converged infrastructures, access and collaboration, new recovery mandates
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions that have been overwhelmed by data growth. The challenge is that native array snapshot tools – and alternative 3rd party solutions – have varying degrees of functionality, automation, scripting requirements, hardware support and application awareness. These approaches can add risk as well as administrative complexity and make it more difficult to realize the full potential of snapshots – whether in single disk vendor estates or in heterogeneous storage environments. This checklist will enable you to build a shortlist of the 'must have' features needed for snapshots to deliver exactly what you require in your application environment or Private Cloud.
Tags : commvault, snapshot management, replication, array based snapshots, data protection solutions, gui driven, intellisnap, no scripting
     Commvault
By: Commvault     Published Date: Jul 06, 2016
The cloud is changing everything. It’s transforming IT organizations with agility and efficiency like never before, enabling them to realize new IT-as-a-Service delivery models. Yet, with change also comes new challenges. Read more to see how you can solve them so that you can realize the full potential of your next cloud project.
Tags : commvault, cloud data, cloud data protection, it as a service, cloud security, cloud infrastructure, cloud optimization, cloud storage
     Commvault
By: Dell EMC     Published Date: Jul 05, 2016
EMC Global Data Protection Index 2016 Key Findings and Results Report
Tags : data management, business practices, data center. data application, enterprise applications, business intelligence, security
     Dell EMC
By: IBM MaaS360     Published Date: Jul 01, 2016
Mobile is the new playground for thieves: How to protect against mobile malware
Tags : ibm, mobile, security, mobility
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 01, 2016
Best practices for mobile application lifecycle management: Security from design through deployment
Tags : ibm, mobile, mobile applications, application lifecycle, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 01, 2016
The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace.
Tags : ibm, mobile, mobile applications, security
     IBM MaaS360
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com