• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

pos

Results 26 - 50 of 3683Sort Results By: Published Date | Title | Company Name
By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
    
Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
Databases represent the backbone of most organizations. And Oracle databases in particular have become the mainstream data repository for most mission-critical environments. Some of the largest companies and organizations in the world rely on Oracle databases to store their most important data. The biggest challenge organizations face relative to an Oracle database is to maintain these databases at optimum performance and reliability without breaking the bank. This paper discusses the storage capabilities customers should consider when choosing storage to support an Oracle database environment.
Tags : 
    
Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
Les solutions de stockage d’entreprise INFINIDAT® sont basées sur l’architecture de stockage exclusive et brevetée INFINIDAT, une couche d’abstraction logicielle des fonctions de stockage déployée sur des équipements matériels bon marché. En commercialisant le logiciel avec une plateforme matérielle de référence testée, INFINIDAT propose la première véritable solution de stockage dé?ni par logiciel pour entreprise.
Tags : 
    
Infinidat EMEA
By: Ahead     Published Date: Jun 05, 2019
Digital Business Continues to Move the Cyber Goal Posts Fortune magazine estimates that by the year 2020, US companies will spend $101 billion per year on cyber security, up 38% from 2016. With all of the money being invested in cyber security, why do the pace and complexity of new security threats continue to rise year after year? A big reason is that today’s digital business involves a more mobile workforce with expectations of immediate and on demand access to data fronted by intuitive and engaging user experiences, and often underpinned by public cloud infrastructure for increased agility and time to market.
Tags : 
    
Ahead
By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
With the rise of Office 365, IT departments are under pressure to adapt their security posture to protect the new ecosystem. But with a range of security concerns standing in the way of full adoption, teams are rushing to supplement Microsoft's out-of-the-box security with more robust third-party solutions. Download our whitepaper to find out which Office 365 security concerns are keeping your IT peers up at night – and how they're overcoming them to enable greater collaboration and agility across their businesses.
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
    
Forcepoint
By: Infosys     Published Date: Jun 14, 2019
Introduction Cloud along with other technologies such as Big Data, Internet of Things, Artificial Intelligence and Blockchain have made it possible for enterprises to have bolder visions for the future. The new technologies motivate them to accelerate tier digital transformation journey and deliver more rewarding experiences to clients.
Tags : 
    
Infosys
By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, business activity monitoring, business process automation, business process management, application integration, analytical applications, configuration management, database development, web service management
    
ASG Software Solutions
By: ASG Software Solutions     Published Date: Nov 09, 2009
Composite applications can provide multiple benefits, such as business agility, better utilization of business software assets through code reuse, development efficiencies, and cost optimization. Once companies are skilled at deploying them, many find that they roll out new applications and integrations faster, while maximizing the value of "tried and true" software components.
Tags : 
asg, cmdb, bsm, itil, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration, application performance management
    
ASG Software Solutions
By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration, application performance management, best practices
    
ASG Software Solutions
By: ASG Software Solutions     Published Date: Apr 07, 2009
Application Portfolio Optimization (APO) provides executives with tools and information to assess the quality and condition of application assets as well as a means for understanding the impact of proposed application changes.
Tags : 
asg, cmdb, bsm, itil, bsm, portfolio optimization, apo, mining tools, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions
By: ASG Software Solutions     Published Date: Jun 24, 2008
As IT evolves towards a more business-aligned position, it must seek out new ways of working that support more effective operations, service creation, and service delivery. These include technologies, processes, and a culture that supports higher levels of accountability, as well as more dynamic responsiveness to business needs.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration
    
ASG Software Solutions
By: ASG Software Solutions     Published Date: May 12, 2010
For many organizations, managing and delivering the knowledge contained within documents is difficult or impossible due to technological disparity. Conventional approaches to knowledge management work within the constraints of disparate platforms, applications, and output devices, and fail to address technological disparity.
Tags : 
asg, cypress, managing delivery, knowledge management, document management, collaboration, collaborative commerce, contact management, content delivery, content integration, content management system, corporate portals, customer experience management, information management, intranets, messaging, records management, search and retrieval, search engines, secure content management
    
ASG Software Solutions
By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, identity management, internet security, intrusion prevention, security management, security policies, web service security, ebusiness
    
Nuance Communications
By: AWS     Published Date: Jun 11, 2019
Common daily media broadcaster tasks such as ad verification are slow and costly. Done manually, they may also introduce inefficiencies that can interfere with transparency and payment accountability—and impact your bottom line. Meanwhile, recent and archived media lies idle when you could repurpose it to increase brand exposure and generate revenue. Learn how Veritone, Inc. used its aiWARE Operating System, building on Amazon Web Services (AWS), to help Westwood One, Inc., a large audio broadcasting network in the United States, develop Artificial Intelligence (AI) and Machine Learning (ML) solutions designed for ad verification and monetizing archived media. Download our webinar to learn how you can Automate ad verification and reporting tasks. Enhance archive content to make media searchable and reusable. Use AI and ML in the cloud for near real-time media intelligence. Start applying machine learning tools.
Tags : 
    
AWS
By: Alcatel-Lucent     Published Date: Dec 02, 2009
Faster, more powerful and dense computing hardware generates significant heat and imposes considerable data center cooling requirements.
Tags : 
data center design and management, distributed computing, internetworking hardware, power and cooling, database development, data integration
    
Alcatel-Lucent
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter