"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Security

IT Security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion.
Results 351 - 375 of 4042Sort Results By: Published Date | Title | Company Name
White Paper Published By: Lenovo and Intel     Published Date: Mar 23, 2016
Can your servers stand up to modern demand?
Tags : 
lenovo, servers, hardware, reliability, laptop
    
Lenovo and Intel
White Paper Published By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey, cloud computing
    
CloudEndure
White Paper Published By: CloudEndure     Published Date: Mar 23, 2016
While a public cloud provides an easy and scalable way to manage and deploy your app or website, you also need to have a contingency plan for business continuity and disaster recovery. Often overlooked on Amazon Web Services (AWS), an extremely effective cloud disaster recovery (DR) strategy is to spread the application stack across regions versus availability zones. This eBook provides a guide for planning and implementing a robust cross-region cloud disaster recovery (CDR) plan for business continuity and critical application uptime on AWS-based applications.
Tags : 
cloudendure, aws, cloud disaster recovery plan, disaster recovery, cloud
    
CloudEndure
White Paper Published By: IBM     Published Date: Mar 21, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
security
    
IBM
White Paper Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s security battle is being waged on the endpoint, and traditional tools are ineffective against today’s sophisticated attackers. Every analyst firm is producing research about Next-Generation Endpoint Security (NGES), and they all reach the same conclusion: every organization needs to upgrade their endpoint security to a modern solution. Download this white paper to learn more.
Tags : 
next generation, endpoint security, nges, next generation endpoint security, security
    
CarbonBlack
White Paper Published By: CarbonBlack     Published Date: Mar 16, 2016
Carbon Black has integrated with Microsoft endpoint technologies to provide enhanced prevention, detection, and response capabilities. This paper from EMA provides an overview of these integrations and discusses the key benefits of Carbon Black’s partnership with Microsoft.
Tags : 
endpoint security, carbon black, ema, microsoft, protection
    
CarbonBlack
White Paper Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s cyber-attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today’s advanced attackers are using to break into your organization and why you require a defense-in-depth cyber security program that incorporates automatic detection and incident response.
Tags : 
carbon black, cyber attacks, cyber security, attacks, security
    
CarbonBlack
White Paper Published By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : 
service providers, ddos, security, cyber security, cyber threats
    
Cisco
White Paper Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection
    
Cisco
White Paper Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
White Paper Published By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : 
web security, best practices, mitigation services, network management, automotive
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Mar 15, 2016
The richness of the data combined with the increasing interconnectedness of healthcare technologies makes the industry ripe for cyberattacks.
Tags : 
healthcare, information security, web security, data management, technology
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention
    
Akamai Technologies
White Paper Published By: Telx     Published Date: Mar 15, 2016
The cloud isn't just for startups and enterprises. Typically, businesses with 20-1,000 employees do not have huge IT teams or budgets. As result, understanding the potential of the Cloud hasn’t been easy and figuring out the benefits of the Cloud can be a huge challenge. The FierceCIO Midmarket and SMB Guide to Cloud Computing sponsored by Digital Realty | Telx and accompanying webinar shows how you can benefit from the Cloud, too.
Tags : 
cloud, telx, smb, midmarket, security
    
Telx
Free Offer Published By: LogicNow     Published Date: Mar 10, 2016
Layered Security in less than 10 minutes. All from a single, easy to use dashboard. Try MAX free for 30-days!
Tags : 
msp, layerd security, web protection, antivirus, patch management
    
LogicNow
White Paper Published By: LogicNow     Published Date: Mar 10, 2016
Cyber crime is one of the most innovative businesses in existence today – and make no mistake, it is a business. This guide looks at how cyber crime has evolved and continues to evolve - and the necessity now of taking a user-focused approach to network security. If you’re in the business of helping your customers businesses stay secure – or if you’re thinking about it
Tags : 
logicnow, web protection, cyber crime, cyber security, security
    
LogicNow
White Paper Published By: LogicNow     Published Date: Mar 10, 2016
Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).
Tags : 
managed services, cyber security, logicnow, cyberdefense, security
    
LogicNow
White Paper Published By: LogicNow     Published Date: Mar 10, 2016
Our annual health check of the global IT support market looks at the relationships between IT Service Providers and IT departments and asks, are the two sides working together in harmony, or in a state of Discord? Based on the views of over 1,300 IT departments and almost 700 IT Service Providers, this report delivers the data and vital insights that will help every IT Service Provider to focus on improving sales figures, growing their portfolio and ensuring their service matches customer expectations. Overlook at your peril!
Tags : 
logicnow, it service providers, cyberdefense, cybersecurity, security
    
LogicNow
White Paper Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security
    
Akamai Technologies
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Crime alone costs businesses dearly – as much as 5 percent of gross revenue each year.
Tags : 
tyco, security, control, freedom, crime
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Tyco Integrated Security Video Auditing enables the company to leverage their existing quality control and production procedure, providing more functionality without a huge investment.
Tags : 
tyco, security, food processing, manufacturing, quality control
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
With thorough planning and the help of basic access control measures as well as innovative technologies, a more secure school campus can be achieved.
Tags : 
tyco, security, access control, visitor management
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Whether it’s worrying about a possible break-in or an employee theft, protecting your business is always a concern. For busy warehouses and manufacturing companies, the worry is even greater, as time lost to responding to a crime means revenue loss. With expensive inventory, an active production site, and workers entering and leaving around the clock, reliable security is a must.
Tags : 
tyco, security, threat, employee theft
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Mobile Security Management can help give you the flexibility and control you need to check on your business wherever you go.
Tags : 
tyco, security, mobile security management, threat
    
Tyco Integrated Security
White Paper Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
In today’s challenging retail world, businesses have little time to spare. Every day, retailers are under extreme pressure to reduce shrink, improve store operations, increase profits and enhance the customer experience, all at the same. When every minute counts, time-saving solutions like source tagging, can help.
Tags : 
tyco, security, source tag, time-saving, retail
    
Tyco Integrated Security
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End


Sub-Categories: Access Control, Application Security, Authentication, Business Continuity, Disaster Recovery, Encryption, Security Management, Security Policies

Search      

Special Report

Learn more about what’s slowing your operations, the cost of inaction, and how you can start driving availability to meet the speed of customer expectations.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory