"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 151 - 175 of 954Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Jul 15, 2015
This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.
Tags : 
intelligence technology, security management, threat intelligence, intelligence protection, security solutions
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
Examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions
    
IBM
White Paper Published By: CDW     Published Date: Jul 08, 2015
Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.
Tags : 
dlp, data loss, security, best practices, access control
    
CDW
White Paper Published By: CDW     Published Date: Jul 08, 2015
Keep data safe, even as it moves outside the perimeter of the traditional network.
Tags : 
security, vulnerability management, analytics, threat prevention, mobile security
    
CDW
White Paper Published By: CDW     Published Date: Jul 08, 2015
A key to safeguarding data and apps is finding the right partner.
Tags : 
security, vulnerability management, analytics, threat prevention, mobility
    
CDW
White Paper Published By: CDW     Published Date: Jul 08, 2015
An effective data loss prevention program requires the right technologies and policies in place and working together.
Tags : 
dlp, leakage, security, strategy, security management
    
CDW
White Paper Published By: CDW     Published Date: Jul 08, 2015
Addressing vulnerabilities in this growing risk environment.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
CDW
White Paper Published By: CDW     Published Date: Jul 08, 2015
Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.
Tags : 
security, data protection, dlp, data breach, vulnerability management
    
CDW
Webinar Published By: Cisco     Published Date: Jun 29, 2015
Ron the CIO challenges IT operations to cut 70% off of the application deployment schedule. Are his application, security, and network teams up to the task? How can SDN in the data center provide a powerful answer?
Tags : 
cisco, cisco aci, technology, security, data center
    
Cisco
Webinar Published By: Cisco     Published Date: Jun 29, 2015
Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.
Tags : 
csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement
    
Cisco
Webinar Published By: CDW     Published Date: Jun 26, 2015
Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.
Tags : 
software asset management, network security, licensing, cloud-based apps, licensing security
    
CDW
White Paper Published By: Cisco     Published Date: Jun 25, 2015
This paper will help you get started with Software Defined Architecture in Several ways, depending on where you are in your journey.
Tags : 
sdn, cisco, cisco aci, software defined architecture, automation
    
Cisco
White Paper Published By: Cisco     Published Date: Jun 24, 2015
This paper explores the main benefits of Cisco ACI Security.
Tags : 
cisco aci security, csico, virtualization, integration, security
    
Cisco
White Paper Published By: Mimecast     Published Date: Jun 22, 2015
To find out if your data is being put at risk, get practical advice on how to eliminate this risk, and find out which vendor hits the ‘Bloor Bullseye’.
Tags : 
file sharing security, file sharing services, best practices, storage services, security management
    
Mimecast
White Paper Published By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity
    
Mimecast
White Paper Published By: Tricentis     Published Date: Jun 22, 2015
This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.
Tags : 
testing, tosca testsuit, test, sap, test portfolios
    
Tricentis
White Paper Published By: Tricentis     Published Date: Jun 22, 2015
This paper reveals the reason why people love E2E tests.
Tags : 
end to end testing, testing, test, e2e testing, manual testing
    
Tricentis
White Paper Published By: Cisco     Published Date: Jun 22, 2015
Read this paper to find out how the Cisco and Microsoft data center solutions provide your IT infrastructure with the flexibility and agility needed to address your changing business needs and achieve your business goals.
Tags : 
cisco and microsoft data center, it infrastructure, security risks, data center, data center solutions
    
Cisco
White Paper Published By: IBM     Published Date: Jun 16, 2015
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, compliance requirements, it risk management strategies, it solutions, security breach
    
IBM
White Paper Published By: IBM     Published Date: Jun 16, 2015
Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.
Tags : 
cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies
    
IBM
White Paper Published By: Riverbed     Published Date: Jun 02, 2015
The transition to a hybrid environment has created challenges in optimizing application performance because the primary compute location has shifted and become distributed. Learn to ease these challenges adapt to transitions.
Tags : 
hybrid network, cloud infrastructure, increase reliability, reduce costs, hybrid networking
    
Riverbed
Case Study Published By: Acronis EMEA     Published Date: May 19, 2015
This case study explores how Acronis Access changed the way Parrish Construction Group communicates.
Tags : 
build a mobile workforce, control access, share documents, security, acronis access solution
    
Acronis EMEA
Case Study Published By: Acronis EMEA     Published Date: May 18, 2015
Download this case study now to find out about choosing Acronis backup solution and the benefits it came with.
Tags : 
acronis backup solution, backup solution, backup, recovery, protection
    
Acronis EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory