• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

security risks

Results 1 - 25 of 324Sort Results By: Published Date | Title | Company Name
By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
By: SailPoint Technologies     Published Date: Sep 05, 2019
Find out how combining identity governance with privileged account management significantly decreases security risks and improves productivity. Download the brief.
Tags : 
    
SailPoint Technologies
By: SailPoint Technologies     Published Date: Sep 05, 2019
Short Description (1000 characters max) Want the strongest cybersecurity possible? Download this brief to find out how Identity governance, combined with privileged access management, will give you the information you need to quickly identify and respond to security risks.
Tags : 
    
SailPoint Technologies
By: Akamai Technologies     Published Date: Sep 04, 2019
It’s a bold claim; one that hasn’t always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, it’s that security-related incursions are inevitable. And it’s news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, there’s no longer a choice. As a CIO, CISO, or other security or IT leader, you know it’s your job to be the central agent stressing the connections between business and digital risk. It’s your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. That’s up from 40% in 2018. Whether you’r
Tags : 
    
Akamai Technologies
By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19
By: Lenovo - APAC     Published Date: Aug 13, 2019
How much money does the average data breach cost? How many days of downtime does ransomware cause? How many millions of people have their data exposed? Discover the vast impact on time, money & productivity of security breaches. Investing up front in strong security, will save you in the long run. Comprehensive end-to-end security not only reduces the risk of being compromised, it also brings benefit to the business., Taking steps to invest in the right solutions, that use rigorous, trackable and auditable security standards, across their entire supply chain is a must to mitigate risks. ThinkShield provides that and so much more. It is a security solution that offers end-to-end protection that drives productivity, innovation, and profitability.
Tags : 
    
Lenovo - APAC
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how it’s evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation
By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard
By: Canon Solutions America     Published Date: Jul 15, 2019
Colleges and universities are under cyber siege. In a recent attack, more than 2,500 student, alumni, and staff accounts were compromised at the University of Buffalo. This brief will teach you how to help prevent a data breach on your own campus.
Tags : 
    
Canon Solutions America
By: Citrix ShareFile     Published Date: Jul 02, 2019
Today's businesses need to drive innovation to seize new opportunity, but cloud complexities can slow the agility needed for that innovation. That doesn't have to be the case. In fact, over fifty percent of organizations now use a multi-cloud strategy to help determine their cloud needs, and if you don't have one, we can help. Citrix Workspaces helps reduce cloud complexity, minimize security risks, and deliver a better user experience. Download our e-book and find out how a secure digital workspace: • Centralizes workspace management • Secures your SaaS and web apps, data, and clouds • Makes it a lot easier to scale your cloud infrastructure as needed
Tags : 
    
Citrix ShareFile
By: McAfee APAC     Published Date: Jun 25, 2019
Business accelerates in the cloud. Cloud adoption expands security risks. In this report, McAfee examined the latest IaaS security and adoption trends, analysed the types of sensitive data in the cloud and how that data is shared. They’ve identified the common threats in the cloud and uncovered the largest areas of risk in cloud computing today.
Tags : 
    
McAfee APAC
By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: Increase IT efficiency Reduce security risks Free IT staff to focus on more strategic initiatives
Tags : 
    
Citrix Systems
By: Motorola Solutions     Published Date: Apr 26, 2019
The Transportation and Logistics industry is the backbone of the global supply chain. But as Transportation and Logistics companies work to ensure timely delivery, they also face a variety of security risks and challenges.
Tags : 
    
Motorola Solutions
By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
By: Epicor     Published Date: Apr 11, 2019
With the speed at which technology is advancing, manufacturers cannot afford to use outdated manufacturing software. “Legacy” manufacturing management systems drag down your company with inefficiencies that are both apparent and hidden. These can prevent you from keeping up with your competition and achieving your growth potential. This Epicor white paper details why manufacturing industry technology experts say delaying this important business decision often places your company at risk. By using legacy manufacturing software, not only are you unable to tap into the latest technology trends, but you leave your business vulnerable to: • Duplicate or inaccurate data • Clunky system performance • Security concerns A modern manufacturing ERP solution can eliminate these risks. Download the white paper to learn why implementing new manufacturing software built for business growth may be the most important step you take for the success of your company.
Tags : 
erp, manufacturing, industry 4.0
    
Epicor
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
By: Tenable     Published Date: Feb 27, 2019
"CISOs and other security leaders know they can't find and fix every vulnerability. Yet, that's what’s expected. So, what can you do? The short answer: Work smarter, not harder. To do that, you need to reduce the vast universe of potential vulnerabilities down to a subset of the vulnerabilities that matter most. Download the “How to Prioritize Cybersecurity Risks: A Primer for CISOs” ebook now to learn: -How to adopt a risk-based approach to prioritization – beyond what CVSS scores tell you -Why visibility into all your company’s IT assets is key to understanding the scope of vulnerabilities and taking appropriate remedial action -How to change the conversation from “How many vulnerabilities do we have?” to “Which vulnerabilities pose the greatest risk?”"
Tags : 
    
Tenable
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter