ca security

Results 426 - 450 of 3328Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Dec 29, 2014
Learn the best practices for migrating to a new server operating system and see how the switch may be challenging, but will allow your organization to vastly improve IT operations to support new technologies such as cloud computing.
Tags : 
server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing, software, security risks, compliance issues, it management
    
CDW
Published By: IBM MaaS360     Published Date: Sep 30, 2014
There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
application security, mobile enterprise, malm, device compliance, data loss prevention, it management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
mobile application lifecycle, application lifecycle management, security, malm, app protection, networking, software development, it management
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management, malm, mam, mdm, enterprise, emm, networking, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 01, 2016
Best practices for mobile application lifecycle management: Security from design through deployment
Tags : 
ibm, mobile, mobile applications, application lifecycle
    
IBM MaaS360
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM
Published By: IBM MaaS360     Published Date: Apr 15, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security
    
IBM MaaS360
Published By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : 
security, best practices, web services, amazon, workload, aws, data centers, enterprise, cloud, infrastructure, it management
    
Evident.io
Published By: Qualys     Published Date: Nov 05, 2013
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or a million.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Qualys     Published Date: Jun 03, 2015
Learn the 8 best practices for selecting a Web Application Scanning solution and see how you can select the right solution for your organization’s needs.
Tags : 
qualys, web application scanning, was solution, security solution, was choices, it management
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
With attackers getting more sophisticated every day, manual methods of locating and testing web-based apps are no longer enough. The right Web Application Scanning (WAS) solution can help you systematically: discover web apps running in your network, determine whether or not they are vulnerable to attack, understand how to fix them, and protect your business while fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Ping Identity     Published Date: Feb 12, 2016
Combine Risk-based Step-up MFA with Passive Contextual Authentication to Get the Best Combination of Cost Effectiveness, Usability and Security.
Tags : 
    
Ping Identity
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : 
tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe, storage
    
CA Mainframe
Published By: Oracle Corp.     Published Date: Oct 15, 2012
Roxana Bradescu, Director of Database Security Product Management at Oracle, will discuss how these pitfalls can be avoided by following best practices for data encryption throughout the enterprise using Oracle Advanced Security.
Tags : 
database security, data, data encryption, it security
    
Oracle Corp.
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan, wlan security, ids, intrusion prevention, intrusion detection, security policy, wireless security policy, airdefense
    
AirDefense
Published By: Pure Storage     Published Date: Jan 12, 2016
This guides provides insight into the various benefits and challenges associated with VDI implementation and ultimately culminates in an overview of the many use cases for VDI in healthcare. VDI is not the solution for all practices, but for many it is enabling higher efficiency and faster innovation.
Tags : 
virtual desktop infrastructure, vdi, healthcare, pure storage, vdi implementation, data security, mobility, it management
    
Pure Storage
Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis, nevis networks, precision prospects
    
Nevis Networks
Published By: FICO     Published Date: Feb 06, 2018
The FICO® Enterprise Security Score measures the likelihood that you will suffer a data breach in the coming 12 months. To deliver the FICO Enterprise Security Score, we access billions of external data points at internet scale and apply our analytics to give you an empirically derived score. You can measure the cybersecurity risk of your organization, or any organization you want to work with, to see the risk you are inheriting from your supply chain. We provide the information behind your cybersecurity score so you can see where you need to take action, and you can measure the effect of improvements on your overall cybersecurity posture.
Tags : 
grow, optimize, business, enterprise, security, data, breach
    
FICO
Published By: Ping Identity     Published Date: Jan 29, 2013
Corporate security compliance requirements are driving new demands/requirements for identity and access management (IAM). Learn how you can extend your enterprise beyond the perimeter with stronger security, less risk and higher efficiency.
Tags : 
access management, age of cloud computing, cloud, ping, iam, enterprise security, knowledge management, data management, business technology, data center
    
Ping Identity
Published By: Flexera     Published Date: May 06, 2019
Using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is a challenge. Enterprise Architecture (EA), IT Service Management (ITSM) and Security teams need enriched technology asset data and accurate analytics so they can keep the enterprise running like a well-oiled machine. Join us to hear R “Ray” Wang, Principal Analyst and Founder of Constellation Research, and Alan Lopez, Senior Director of Global Product Marketing from Flexera, discuss use cases where asset data and analytics are becoming business-critical. Watch the webinar.
Tags : 
    
Flexera
Published By: Qualys     Published Date: Jan 11, 2017
Companies lack the in-house expertise required to analyze threats and keep up with day-to-day security operations. And so, despite the best intentions, many security strategies fall short of their goals and leave companies vulnerable just as threats become more sophisticated and targeted.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Microsoft Office 365     Published Date: Sep 20, 2016
Going with a single-vendor collaboration platform is an easy call, right? Employees can communicate and share more easily, and your IT team only has to deal with implementation from one vendor, not dozens. But, in case you’re still pondering, here are five reasons a collaboration suite makes sense: Saved time and increased productivity Lower costs and less complexity End-to-end security compliance Scaling at your pace Control over the back end Download the Better Together eBook for complete details.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
Going with a single-vendor collaboration platform is an easy call, right? Employees can communicate and share more easily, and your IT team only has to deal with implementation from one vendor, not dozens. But, in case you’re still pondering, here are five reasons a collaboration suite makes sense: 1.Saved time and increased productivity 2.Lower costs and less complexity 3.End-to-end security compliance 4.Scaling at your pace 5.Control over the back end Download the Better Together eBook for complete details.
Tags : 
productivity, enterprise, complexity, compliance, employees, security
    
Microsoft Office 365
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.