"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

security operations

Results 1 - 25 of 124Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
This book helps you understand both sides of the hybrid IT equation and how HPE can help your organization transform its IT operations and save time and money in the process. I delve into the worlds of security, economics, and operations to show you new ways to support your business workloads.
Tags : 
hpe synergy, api, infrastructure, hybrid it, workloads, code
    
Hewlett Packard Enterprise
Published By: Gigamon     Published Date: Oct 19, 2017
Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a platform-based approach to visibility in which data, analytics and reports from multiple tools are aggregated and consumed in one control panel. Download to learn more.
Tags : 
    
Gigamon
Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing, it management, business intelligence
    
Digital Realty
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals how Security Operations teams can eliminate these outages.
Tags : 
security, security operations, outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls, application security, encryption, security management
    
Venafi
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
This workshop explains and demonstrates how to secure your infrastructure, protect your digital assets, and automate threat detection and incident correction—providing complete visibility into your data center security operations.
Tags : 
    
Hewlett Packard Enterprise
Published By: Secureworks     Published Date: Nov 11, 2016
This paper explores why the older “all or nothing” kind of relationship between business organisations and information security services providers (ISSPs) is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Tags : 
managed security services, cybersecurity, issps, security, threat and vulnerability management
    
Secureworks
Published By: ThingWorx     Published Date: Dec 02, 2015
Security is a primary concern of ThingWorx customers — especially device manufacturers and end-customers that deliver and use connected products. These customers demand a proven solution that protects them and their customers against hackers, malware and unsafe operations.
Tags : 
thingworx, security, operations, audit, customer, network, networking
    
ThingWorx
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data, ibm
    
IBM APAC
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection, application security, authentication, security management
    
CA Technologies
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: IBM     Published Date: Jan 09, 2017
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : 
ibm, security, services operations, ibm emergency response services, cybersecurity, cyber crime, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. This paper provides four key steps that can move you toward a more mature solution now.
Tags : 
ibm, security, services operations, iam programs, enterprise applications
    
IBM
Published By: Splunk     Published Date: Aug 21, 2018
Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks. This white paper, “The Five Essential Capabilities of an Analytics-Driven SOC”, dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels. Download this white paper to to learn about: *How advanced analytics and machine learning are now critical hallmarks of the modern security platform *How proactively hunting and investigating threats can shore up defenses *Why adaptive security architectures, like Splunk’s, are needed to prevent, detect and respond to attacks in today’s security landscape
Tags : 
    
Splunk
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Jul 05, 2017
Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Best-of-breed managed DNS service providers have the global DNS infrastructure and deep DNS network operations expertise to ensure your success. Adding a secondary DNS service can help you deliver consistent, high-quality user experiences across the world and mitigate outage risk. To learn more read our white paper: High Availability DNS Reduces Downtime Risk and Improves End-User Experience
Tags : 
dns, service, serve traffic, corporate firewall, service features, api daemon
    
Oracle
Published By: IBM     Published Date: Jul 26, 2017
While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.
Tags : 
data security, threat intelligence, security operations, advanced security analysts
    
IBM
Published By: Workday     Published Date: Aug 08, 2018
Cloud-based systems are the future for cities and counties looking to reduce budgets and use staff wisely. The cloud allows governments to end constant upgrades to legacy systems, improve security, and invest in operations—not capital expenses. Join the Governing Institute for an overview of the benefits of a migration to the cloud and gain valuable insights from the City of Rochester’s successful transition.
Tags : 
cloud-based systems, improve security
    
Workday
Published By: Rackspace     Published Date: Mar 28, 2018
Many businesses want to realize the power of Google Cloud Platform (GCP) without having to incur the challenge and expense of managing it themselves. Some businesses lack the technical expertise or capacity to operate cloud infrastructure, tools and applications while others may have the ability but choose to maintain focus on their core business. Many larger businesses are on a multi-phased journey to the cloud, requiring transition and management services that can adapt to an evolving set of needs. Rackspace Managed Services for Google Cloud Platform is the answer for businesses facing these challenges. As Google’s first Premier Managed Services Partner, Rackspace blends technology and automation plus human expertise to deliver ongoing architecture, security and 24x7x365 operations backed by GCP-certified engineers and architects.
Tags : 
    
Rackspace
Published By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organization’s security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
    
Carbon Black
Published By: Lenovo and Microsoft     Published Date: Aug 13, 2013
In the wake of major security, management, and interface limitations, Microsoft has decided to end support for Windows XP. This decision has important implications for corporate management as it presents a number of risk, security, operations, and compliance issues. This white paper looks at the top five issues that business management must be aware of and provides non-technical business justifications for driving a migration program forward.
Tags : 
windows xp, migration, managment, top 5 threats to business
    
Lenovo and Microsoft
Published By: EMC Corporation     Published Date: May 27, 2014
ESG Whitepaper: New security risks and old security challenges often overwhelm legacy security controls and analytical tools. This ESG white paper discusses why today's approach to security management—that depends on up-to-the-minute situational awareness and real-time security intelligence—means organizations are entering the era of big data security analytics.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
    
EMC Corporation
Start   Previous   1 2 3 4 5    Next    End
Search      

Special Report

Learn more about what’s slowing your operations, the cost of inaction, and how you can start driving availability to meet the speed of customer expectations.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory