• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

securing

Results 1 - 25 of 477Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security, application integration, application performance management, best practices, business process management, enterprise resource planning, it spending, project management
    
Absolute Software
By: Absolute Software     Published Date: Dec 20, 2012
This IDC document presents highlights from the Adopting Mobility in the Enterprise Executive Roundtable held in New York City.
Tags : 
security, mobile, cloud, tablet, consumerization
    
Absolute Software
By: Actiance     Published Date: Jul 09, 2012
Deploying Microsoft Lync Server 2010 is one of the first steps to take advantage of the benefits of Unified Communications (UC).
Tags : 
microsoft, lync server, unified communications
    
Actiance
By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks, wlan, vulnerability management
    
AirTight Networks
By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
    
Akamai Technologies
By: Alert Logic     Published Date: May 23, 2019
Securing web applications in the AWS cloud environment relies on the cloud service provider and the customer working together in a shared responsibility model. Effective security for web applications on AWS requires full visibility into the environment in which the apps live, while also proactively monitoring for attacks without causing delays in application development and delivery. For some customers this may be a challenge due to limited personnel resources or expertise. This is where Alert Logic can help. We will automatically show you why, where, and how to respond to vulnerability findings and provide you with short- and long-term recommendations to stop active attacks. To help guide the way, following are key considerations for providing sound web application security running on the AWS cloud.
Tags : 
    
Alert Logic
By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
By: ALL ICT Ltd     Published Date: Mar 26, 2008
The aim of this document is to assist organizations protecting their assets – tangible and intangible – through a Security Management Program. This program provides a holistic, hands-on, and consistent approach for securing the organization against serious security breaches, such as data leakage, while providing the organization with the required flexibility to adapt itself to the business needs and to remain competitive in the market.
Tags : 
allict, all ict, security management, security, network security, intrusion prevention, data protection
    
ALL ICT Ltd
By: Amazon Web Services APAC     Published Date: Sep 19, 2019
This document provides information to assist customers who want to use AWS to store or process content containing personal data, in the context of common privacy and data protection considerations. It will help customers understand: the way AWS services operate, including how customers can address security and encrypt their content, the geographic locations where customers can choose to store content, and the respective roles the customer and AWS each play in managing and securing content stored on AWS services.
Tags : 
    
Amazon Web Services APAC
By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? This is not the right question to ask first. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services – or add additional ones – that are appropriate for your business. After examining each use case, we’ll show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix
By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix
By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
By: AWS     Published Date: Oct 07, 2019
Software development has evolved from rigid waterfall methodologies to more streamlined approaches, like Agile and more recently DevOps. This evolution has taken place in large part to shorten development life cycles and meet increased business demands. Today, businesses of all sizes have built an advantage by implementing a DevOps culture and processes, which break down silos between development and operations, allowing organizations to create better software faster. As organizations implement DevOps on Amazon Web Services (AWS), they need to understand the security implications. The AWS Shared Responsibility Model makes clear that AWS secures what’s “on the cloud,” while the customer is responsible for securing their assets “in the cloud.” When AWS customers go about securing their DevOps environments, they need to do so in a way that provides robust protection without limiting developer agility.
Tags : 
    
AWS
By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach, hackers, business security, security, network security, access control, hacker detection, identity management, customer relationship management, microsoft exchange, customer experience management, secure content management
    
bitglass
By: Black Duck Software     Published Date: Feb 17, 2016
Container technologies like Docker promise to transform the way enterprises develop, deploy, and manage critical applications. However, containers are no panacea. The same challenges around deploying and managing applications in native environments and virtual machines also affect container deployments.
Tags : 
blackduck, docker, container deployments, docker containers, application management, container security, it management, knowledge management, enterprise applications
    
Black Duck Software
By: BlackBerry     Published Date: Mar 03, 2009
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy. Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Tags : 
blackberry, mobile applications, mobile security, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software
    
BlackBerry
By: BlackBerry     Published Date: Feb 01, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry
By: BlackBerry APAC     Published Date: Jan 29, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry APAC
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
By: Blue Coat     Published Date: Mar 11, 2016
The cloud creates new risks and compliance issues for organizations already struggling with traditional threats. Get Blue Coat’s new E-Book, “Securing Cloud Applications & Services.”
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, infrastructure, productivity, project management
    
Blue Coat
By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application, technology, solution, networking, wireless
    
Blue Coat Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter