security and risk

Results 1 - 25 of 493Sort Results By: Published Date | Title | Company Name
Published By: Lenovo and Intel     Published Date: Oct 16, 2019
Every decision made for an institution requires security to match. Otherwise vulnerabilities can be created and exploited. We believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, and improve the end-user experience.
Tags : 
    
Lenovo and Intel
Published By: MuleSoft     Published Date: Oct 10, 2019
API security has become a strategic necessity for your business. APIs facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With data breaches now costing $400m or more, senior IT decision-makers are right to be concerned about API security. In this whitepaper, you'll learn: The top API security concerns for today's enterprises. How IT leaders can protect identity, integrity, and confidentiality of information without risking availability. The top three qualifications you need to keep your APIs secure.
Tags : 
    
MuleSoft
Published By: Dell EMC     Published Date: Oct 10, 2019
Security leaders have been in front of boards and executive committees long enough to know that security metrics that simply portray statistics from monitoring tools, or count the number of malware attacks, add relatively little value to strategy and budget decisions. Protecting sensitive customer and company data shouldn’t be just a compliance obligation, it should be a business imperative. This is exactly why the right technology partners will help push security, risk, and compliance objectives forward. In March 2019, Dell commissioned Forrester Consulting to evaluate the evolving security trends and technology needed to protect and enable employees. Our study found that empowering employees while adhering to security protocols improves employee productivity. Forrester conducted an online survey of 887 senior business and IT decision makers to explore this topic. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: AWS     Published Date: Oct 09, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: Canon     Published Date: Oct 09, 2019
THE NOTIFIABLE DATA BREACHES (NDB) SCHEME came into effect on Feb 22nd 2018 making it obligatory for every organisation covered by the Australian Privacy Act to notify the Australian government of certain security breaches. The 2019 Canon Security Report is a guide to understanding which organisations are affected by this policy, the types of security breaches that require notification and what your organisation can do to help mitigate the risk of such breaches happening in the first place. Download this handy guide and protect your business from the business costs and legal ramifications of security breaches.
Tags : 
    
Canon
Published By: Nozomi     Published Date: Oct 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: AWS     Published Date: Oct 07, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data. Register for our webinar to learn how Pacific Dental leveraged McAfee’s CASB solution, McAfee MVISION Cloud, to address these challenges and fulfill their security responsibility.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Forcepoint     Published Date: Oct 03, 2019
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. This webinar explores how companies should rethink data security, focusing on the following three principles: Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of context and user intent Learn more about how to embrace a risk-adaptive approach to data protection.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Oct 03, 2019
In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs. Understanding the location of all data, whether at-rest, in-use, or in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify their riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data. This webinar explores how companies should rethink data security. Protecting critical data and intellectual property requires a risk-adaptive, dynamic approach, including these three main components. Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of c
Tags : 
    
Forcepoint
Published By: Mimecast     Published Date: Oct 02, 2019
If you are an moving to or already using Office 365 then it’s essential for you to formulate a plan toward a risk-free cyber resilience experience. Cyber resilience requires you to prepare for the before, during and after an attack/outage/incident. Doing so will protect your organization from security threats, compliance concerns, unplanned outages and more. To mitigate concerns and form a resilient strategy you have to first KNOW the risks. The right third-party solution can ensure email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Microsoft Office 365™. But, what are the key areas of concern around Office 365 email you should be aware of? Read what Microsoft Office Apps and Services MVP J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
    
Mimecast
Published By: Forcepoint     Published Date: Oct 02, 2019
If you want greater—and earlier—visibility into indicators of security threats like intellectual property theft, compromised accounts, and insider risk, behavioral analytics may be the answer. Download this Gartner Market Guide if you’re considering or planning to integrate User and Entity Behavior Analytics (UEBA) to augment other security solutions or achieve risk-adaptive protection.
Tags : 
    
Forcepoint
Published By: SailPoint Technologies     Published Date: Oct 01, 2019
Find out how government agencies can use machine learning and artificial intelligence to discover and prevent potential cybersecurity gaps and risks. Download the brief.
Tags : 
    
SailPoint Technologies
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
According to the latest research from Gartner, SOAR solutions are gaining visibility and real-world use driven by early adoption to improve security operations centers (SOCs). The first market guide from Gartner to cover the SOAR solution market provides analysis and direction on the current state of the SOAR market, as well as recommendations and key findings to help security and risk management leaders evaluate how a SOAR solution can improve their ability to prioritize security operations activities, formalize triage and incident response, and automate response.
Tags : 
    
Group M_IBM Q4'19
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over time remains unclear for respondents to a new SANS Institute research study sponsored by BlackBerry Cylance. Opinions varied about the maturity of AI, its benefits and risks, and the baseline requirements for an AI-enabled security solution. Download the report today for the complete survey results and learn: 1) How perceptions of AI vary across industry sectors and organizational roles and responsibilities; 2) How AI technologies compare and contrast with human intelligence; 3) How machine learning is driving advances in the field; 4) What respondents believe to be the greatest risks and benefits of AI; and, 5) The most significant barriers to broader AI adoption.
Tags : 
    
BlackBerry Cylance
Published By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library