Get your company's research in the hands of targeted business professionals.
Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
White Paper Published By: Iovation
Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Developed by Borer in conjunction with AND-Group, the CruSafe software and hardware system provides a state-of-the-art safety system specifically developed to address the key requirement for real-time tracking of personnel. AND CruSafe is a state-of-the-art safety system which has been specifically developed to address the key requirement for real-time tracking of personnel (often known as POB- Personnel On Board). CruSafe has already been proven to reduce muster times by 70%.
White Paper Published By: Imperva
Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world
attacks and APTs, the shortcomings of legacy security solutions,
the capabilities of next-generation firewalls, and security best
White Paper Published By: Diligent
Published Date: Aug 05, 2016
This article provides an evaluation framework for directors and senior management. Focus is on three main factors: where data is stored, the strength of “locks” that provide access, and the control of “keys” for entry.
Webinar Published By: ESET, LLC.
Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
White Paper Published By: ESET
Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
White Paper Published By: IBM
Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
White Paper Published By: McAfee
Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
White Paper Published By: Forcepoint
Published Date: Apr 20, 2016
Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.