> White Papers > Technology > Security
 

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 276 - 300 of 2280Sort Results By: Published Date | Title | Company Name
By: QTS     Published Date: Feb 04, 2016
Download Vormetric’s Annual Data Threat Report, featuring key insights from 451 Research, to learn more about the latest trends in data encryption and data security and how your business can best protect its most vital asset: it’s data.
Tags : vormetric, 451 research, data encryption, data security, threat report, security, data management
     QTS
By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : cybersecurity, security risk, acquisition target, security ratings, risk-based conversations, security, it management, enterprise applications
     BitSight Technologies
By: Niara     Published Date: Jan 27, 2016
Download this whitepaper to learn some common myths to consider when deploying security analytics solutions.
Tags : security analytics, security analytics solutions, analysts, attack detection, security, incident response, security monitoring, behavioral analytics
     Niara
By: Niara     Published Date: Jan 27, 2016
Download this white paper to learn the must-have tactics organizations can use to quickly detect attacks on the inside and severely limit the damage they can do.
Tags : advanced attacks, attack detection, cybercriminals, perimiter defenses, security breach, learning-based security analytics, security monitoring, behavioral analytics
     Niara
By: EMC Converged Platforms     Published Date: Jan 27, 2016
In the spring of 2015, the IDC organized a study on the business value Vblock systems bring VCE customers. The organizations that took part in this study ranged from 400 employees to 200,000 employees, with an average employee count of 27,113. These organizations represent a wide array of industries and countries. The results of this study were published in the VCE-sponsored IDC white paper entitled, “The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility, May 2015”. This report identifies the challenges faced by financial services industry today and how VCE’s Vblock Systems are being used to address them.
Tags : vce, vblock systems, idc analysis, innovation, customer experience, it solutions, financial benefits, security
     EMC Converged Platforms
By: IBM     Published Date: Jan 27, 2016
This paper describes how predictive analytics can play a critical role in your threat and risk strategy.
Tags : ibm, threat, risk, management, security, analytics, fraud, enterprise applications
     IBM
By: IBM     Published Date: Jan 27, 2016
This white paper reveals seven strategic objectives that can be attained to their full potential only by employing predictive analytics.
Tags : ibm, analytics, predictive, strategy, competitive advantage, security, enterprise applications
     IBM
By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : rackspace, cloud, application, software development, security
     Rackspace
By: Rackspace     Published Date: Jan 19, 2016
In this whitepaper, we will illustrate some of the factors an organization needs to consider when contemplating a migration to the cloud.
Tags : rackspace, cloud, economics, private cloud, public cloud, security, software development, data center
     Rackspace
By: Rackspace     Published Date: Jan 19, 2016
Containers are certainly a hot topic. The OpenStack® User Survey indicates over half of the respondents are interested in containers in conjunction with their OpenStack clouds for production uses. Thanks to new open source initiatives, primarily Docker, containers have gained signicant popularity lately among Developer and Ops communities alike.
Tags : rackspace, containers, openstack, cloud, data, security, data center
     Rackspace
By: Rackspace     Published Date: Jan 19, 2016
Rackspace® Private Cloud Powered by OpenStack® is backed with our results-obsessed service known as Fanatical Support.® Our exceptional customer service means we’re in it with you every step of the way. From initial design to ongoing management for your production environment, we manage your cloud so you can focus on your core business.
Tags : rackspace, cloud, information technology, security, data center
     Rackspace
By: Rackspace     Published Date: Jan 19, 2016
San Francisco-based RockYou purchases the rights to existing social video games, then incorporates in-game ads, and rebrands them as RockYou games.Delivering interactive media content to engaged audiences online, RockYou boasts a portfolio of free-to-play games including dozens of company-owned and partner titles across key platforms, genres and demographics.
Tags : rackspace, social gaming, private cloud, data, rockyou, security, data center
     Rackspace
By: Salesforce     Published Date: Jan 15, 2016
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : salesforce, cloud, security, webinar, best practices, enterprise applications
     Salesforce
By: IBM     Published Date: Jan 15, 2016
How can your organization better prepare for a security incident?
Tags : ibm, cyber security, threats, precaution, detection, security, enterprise applications
     IBM
By: IBM     Published Date: Jan 15, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : ibm, identity governance, security, protection, enterprise applications
     IBM
By: IBM     Published Date: Jan 15, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations.
Tags : ibm, identity governance, compliance, risk control, security, enterprise applications
     IBM
By: IBM     Published Date: Jan 15, 2016
IBM BigFix is recognized as a leader in Gartner's Magic Quadrant for the fourth year in a row.
Tags : ibm, gartner, bigfix, client management, magic quadrant, security, enterprise applications
     IBM
By: IBM     Published Date: Jan 15, 2016
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : ibm, gartner, security, managed security services, magic quadrant, enterprise applications
     IBM
By: IBM     Published Date: Jan 15, 2016
When a cyber-attack occurs, you can’t fix what you can’t see.
Tags : ibm, security, endpoint, endpoint platform, enterprise applications
     IBM
By: CDW     Published Date: Jan 15, 2016
Even with the latest devices, your mobile workforce may not have what they need to get the job done. Without a strategy to provide them with data and applications, they’re forced to work without them or find workarounds that can compromise security. Today’s workers are constantly on the move, and IT departments are scrambling to keep up. Access to email is not enough. You must address the legacy applications that your employees can’t easily access from their mobile devices, knowing that app development can be cost prohibitive and complex. And you have to have a strategy in place to secure and manage every application in use.
Tags : cdw, client virtualization, mobile workforce, mobile strategy, best practices, networking, security, software development
     CDW
By: CDW     Published Date: Jan 15, 2016
A growing number of organizations are realizing the benefits of mobile devices, including increased productivity, enhanced efficiency and speedier response times. Yet while the use of mobile devices typically leads to lower costs and additional revenue opportunities, it also brings challenges associated with device and application procurement, data connections, service costs, content management and — most important — security.
Tags : cdw, effective mobile policy, mobile devices, revenue opportunities, application procurement, networking, security, software development
     CDW
By: Code42     Published Date: Jan 13, 2016
BACKUP ISN’T JUST A COPY IN THE CLOUD. IT’S THE ANTIDOTE TO EVERYTHING. Be it user error, natural disaster, hardware failure, malware, theft or litigation—there’s a countermeasure to restore your business to normal. Skeptical? Click through the eBook to ?nd out how backup makes the enterprise impervious.
Tags : code42, endpoint backup, cloud storage, data migration, data storage solutions, e-discovery, security, it management
     Code42
By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : code42, data protection, payment data, data protection, corporate data security, security, it management, enterprise applications
     Code42
By: Code42     Published Date: Jan 13, 2016
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : code42, best practices, platform-specific data, endpoint backup, data migration, real-time data backup, data solutions, security
     Code42
By: Code42     Published Date: Jan 13, 2016
Read this white paper to learn how the common approaches to e-Discovery miss the mark and how endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : code42, e-discovery, endpoint backup, e-discovery methods, data collection, compliance requirements, security, it management
     Code42
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com