> Technology > Data Security
 

Data Security

Data Security
Results 176 - 200 of 289Sort Results By: Published Date | Title | Company Name
White Paper Published By: Intralinks     Published Date: Oct 14, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : 
intralinks, mwd, volterra fietta, goldilocks zone, security
    
Intralinks
White Paper Published By: Intralinks     Published Date: Oct 14, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel. This document will help in the selection of an optimal solution.
Tags : 
kuppingercole, information sharing, security, data, intralinks
    
Intralinks
White Paper Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how Cisco® Advanced Malware Protection (AMP) is the integrated solution that provides visibility into potential threat activity and the control to rapidly contain and remediate malware.
Tags : 
cisco, malware protection, amp, advanced malware protection, global threat intelligence
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 14, 2015
The report is divided into two main areas: Threat Intelligence, which gives an overview of the latest threat research from Cisco. And, Analysis and Observations, where security industry consolidation and the emerging concept of integrated threat defense is discussed.
Tags : 
cisco, security report, cisco security report 2015, threat intelligence, network defenses
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 14, 2015
Malware knows no boundaries. Neither should your advanced malware protection solution. Cisco offers the industry’s broadest portfolio of Advanced Malware Protection (AMP) products available for all enforcement points in the extended network wherever threats can manifest: endpoints, network appliances, secure content gateways, mobile devices, and virtual environments.
Tags : 
cisco, malware protection, security, nss, malware protection solution
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how to seize new business opportunities by embedding security into the intelligent network infrastructure and across the extended network.
Tags : 
cisco, cisco security, digital economy, network infrastructures, network security
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 14, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a next-generation firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise.
Tags : 
cisco, nfgw, next generation firewall, enterprise management, network visibility
    
Cisco
White Paper Published By: IBM     Published Date: Oct 13, 2015
This e-book examines today’s enterprise threat landscape and introduces IBM Security’s new endpoint solution to help stop exploits & targeted attacks.
Tags : 
ibm, zero-day, enterprise, threat, security
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, threat, ciso, enterprise
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
How can your organization better prepare for a security incident?
Tags : 
ibm, x-force, threat intelligence, security, cybercriminal
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper focuses on how to respond to the inevitable incident.
Tags : 
ibm, cio, security, data, cybercriminal
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : 
ibm, soc optimization, it threat, soc, security operations center
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, ponemon institute, jp morgan, global analysis
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, ibm managed security services, cyber security, data, threat
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
Understanding the Deep Web and how it can endanger your organization. This paper offers a high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P.
Tags : 
ibm, security, mainstream media, deep web, dark web
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
White paper describes how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
Tags : 
ibm, security intelligence, identity assurance, intelligent iam, boost compliance
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : 
ibm, continuous compliance, reduced risk, security, threat intelligence
    
IBM
White Paper Published By: IBM     Published Date: Oct 13, 2015
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe cloud, information management, security
    
IBM
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
Up to 60% of all cloud deployments stall or fail during the implementation process. Don’t let your business be one of them. Read this checklist to help identify your business needs and help the cloud hosting provider identify what services are best suited for your business to avoid a failed cloud.
Tags : 
cloud, hosting, managed hosting, managed cloud, migration
    
INetU Managed Hosting
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
We have created the Ultimate Guide to Understanding the Cloud to help you better decipher the many aspects of cloud computing. Download the eBook and understand what the cloud is and the various service and deployment models available to you.
Tags : 
cloud, hosting, managed hosting, disaster recovery, saas
    
INetU Managed Hosting
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
By moving to the cloud technology company, VIIAD, reduced its costs by 50%. Read this Cloud Computing article to see how you can do the same by learning the 6 lessons that were learned when moving applications to the cloud.
Tags : 
cloud, hosting, managed hosting, private cloud, roi
    
INetU Managed Hosting
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
The way attackers are going after corporate data and infrastructure these days means that it’s not a matter of if, but when you’ll be forced to buy a ticket for the post-breach rollercoaster. But a little preparation and planning can go a long way toward making the ride as manageable and inexpensive as possible. This eBook walks you through how to get started on planning and executing an incident response for your business.
Tags : 
data breach, cyber-attack, cloud, post-breach, breach
    
INetU Managed Hosting
White Paper Published By: IBM MaaS360     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
fiberlink, ciso, security, mobile, mobilephobia
    
IBM MaaS360
Webinar Published By: IBM     Published Date: Oct 08, 2015
This 30-minute webcast is about analytics because without end-to-end analytics, organizations have little to no insight into what’s really happening with their mobile apps.
Tags : 
ibm, mobile, security, app, analytics
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com