threat

Results 1 - 25 of 1853Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
The rise of online social networking poses new risks for businesses and new challenges for IT Management. As sites such as Facebook, Myspace and Bebo become evermore popular with end-users, businesses must consider risks such as employee cyber-slacking, reputation damage, broken privacy, identity theft and the threat of virus and spyware infections. This guide will help you reduce the risks of uncontrolled social networking use within the workplace and prescribes seven simple steps for both you and your end-users.
Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, it management, anti spyware, anti virus, employee performance, productivity
     MessageLabs Australia
By: MessageLabs Australia     Published Date: Aug 04, 2008
At MessageLabs, we understand that deploying best practices in security means working with the people around you - and we'd like to help! Download this free pack of resources to help educate your employees about the latest threats and best practices around email and web security.
Tags : threats, threat, email security, web security, internet security, messagelabs, security, best practices
     MessageLabs Australia
By: SAP     Published Date: Jul 23, 2018
New market forces are creating unprecedented pressure for companies to move faster, with greater agility, and change in response to new threats and opportunities. Companies that are embracing a new approach built on Intelligent Cloud ERP are gaining valuable advantages such as boosting profits, growing faster, entering new markets, and disrupting their industries. Learn how Intelligent Cloud ERP empowers you to leverage the opportunities presented by changes to how we work, collaborate and achieve success in this practical, actionable overview.
Tags : 
     SAP
By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies dont have an access security solution -Why businesses must pivot from the common security mantra of trust but verify to verify and never trust in the new threat landscape
Tags : remote access, security
     Akamai Technologies
By: Tenable     Published Date: Aug 07, 2018
"Tenable Researchs analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Researchs analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attackers seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attackers first-mover advantage"
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
     Tenable
By: WorkBook from Deltek     Published Date: Jul 20, 2018
Competitive threats and mushrooming client demands erode the bottom line for many agencies. This eBook provides actionable steps to help you keep your best employees and deliver profit growth, by: Ensuring you get paid enough for every engagement Empowering your staff to reign in over-servicing Making your strategic value clear to clients
Tags : 
     WorkBook from Deltek
By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
     Lookout
By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: Lookout     Published Date: Apr 18, 2018
Mobile security is making the role of todays CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
     Lookout
By: Trimble     Published Date: Jul 24, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projectsor losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesnt need to. In this free eBook, youll learn specific strategies to: Minimize costly errors before they destroy your profit margin Retain the knowledge of your top estimators, even if they leave Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators makeand get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
     Trimble
By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be securedbut not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: how cloud adoption is reshaping the threat landscape why identity and access management must be a priority what are cybersecurity best practices in a modern IT environment which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
     KPMG
By: Lenovo     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forresters newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
     Lenovo
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
     Ounce Labs, an IBM Company
By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco, remote access, remote network management, wireless security, total cost of ownership, configuration management
     Astaro
By: SAP     Published Date: Feb 03, 2017
Companies across the globe are all facing the same economic headwinds: business change in the form of competitive threats and new opportunities is coming at an unprecedented pace. The watchword for meeting these challenges is innovation both in terms of business processes as well as the underlying technology that enables those processes. The sum of the experiences discussed in this report showcase how SAP S/4HANA, running on-premise or in the cloud, can form the basis for a broad-based business transformation that does not require a big bang implementation to succeed.
Tags : 
     SAP
By: SAP     Published Date: Mar 09, 2017
Small and midsize retailers around the world are seeing their businesses transform in a variety of ways. These firms, typically with fewer than 1,000 employees, have been transforming themselves as customers seek new types of engagement and as suppliers expect higher levels of efficiency and effectiveness. New business models and new competitors are changing the way retailers do business. Rather than simply react to new threats, successful retailers are leveraging technology in new ways to sharpen business practices, improve agility, and better serve customers while strengthening the role of retailers in the supply chain. Through digital transformation including the effective engagement of the internet of things (IoT) to track inventory, the opportunity to maintain and gain competitive advantage can be significant.
Tags : 
     SAP
By: HPE APAC     Published Date: Jun 16, 2017
This white paper examines the various threats faced by mid-sized businesses and explains why a comprehensive approach to protection and resilience makes good business sense, and helps IT managers benchmark their companys security posture against their peers.
Tags : 
     HPE APAC
By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks, access control, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, intrusion prevention
     Cisco
By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Ciscos Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services, access control, application security, internet security, intrusion prevention, security management
     Cisco
By: QTS     Published Date: Nov 04, 2016
Watch this video to hear from American Hacker, Jeff Moss, about the security threats faced by companies today!
Tags : information security, security threats, data security, security, it management, data management
     QTS
By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : hyperflex, systems, data platform, storage efficiency, business, cisco
     Cisco EMEA Tier 3 ABM
By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the internet. As a global market leader in our industry, we help our customers connect, digitize, and thrive. Together, we change the way the world works, lives, plays and learns.
Tags : ransomware, threat landscape, operations, risks, enforcement, defend, firewalls, network
     Cisco EMEA Tier 3 ABM
By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Enterprise IT is changing. Its evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with ITs changing requirements a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : networking, enterprise, architecture, applications
     Cisco EMEA Tier 3 ABM
By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
The Cisco Incident Response team is led by elite security specialists who can uncover the source of threats by analyzing and synthesizing intelligence from multiple sources. These sought-after specialists consistently deliver resolution in a shorter timeframe, returning businesses like yours to normal. Fast.
Tags : security, research, analyze, investments, cisco
     Cisco EMEA Tier 3 ABM
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With todays increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
     Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.