• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

com

Results 21876 - 21900 of 23027Sort Results By: Published Date | Title | Company Name
By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
    
Perimeter
By: Qualys     Published Date: Nov 16, 2012
This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past.
Tags : 
vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats
    
Qualys
By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
    
Qualys
By: Qualys     Published Date: Jan 11, 2017
Businesses use the Internet as a vital global resource for huge benefits in linking workers, suppliers and customers. However, connecting with the global Internet exposes your company network to many threats.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment, configuration, monitoring and measurement, monitoring
    
Shavlik Technologies
By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated Vulnerability scores and how to interpret them Best practices for prioritizing vulnerability remediation How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
By: Dell EMC     Published Date: Aug 17, 2017
Databases are often the driving force behind a companys mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. We found that the Dell EMC VxRail P470F hyperconverged system with VMware vSAN could allow you to do more database work than the HPE Hyper Converged 380 (HC 380) with StoreVirtual VSA. The four-node Dell EMC solution processed more orders with faster response times, so more users can fulfill requests quickerwhether theyre placing orders in a store, accessing databases of client info, or adding to company records.
Tags : 
database, database solution, hyperconverged system, database performance, database optimization
    
Dell EMC
By: Dell EMC     Published Date: Feb 23, 2017
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue.
Tags : 
    
Dell EMC
By: YouSendIt     Published Date: Jul 18, 2011
This case study illustrates how replacing FTP servers, CD's and courier services with YouSendit has resulted in a more secure, easier and efficient creative workflow process both internally and with their external vendors and parnters.
Tags : 
wacom, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
    
YouSendIt
By: Iovation     Published Date: Oct 21, 2009
With device reputation, WagerWorks gained valuable insight into the account activity on its sites, and as a result achieved greater control over fraud and abuse. By easily identifying account-device relationships and providing data for in-depth forensic analysis, iovation ReputationManager proved to be the most important addition to the company's overall fraud prevention process
Tags : 
wagerworks, iovation, fraud prevention, security, identity management, compliance, online gaming abuse, security management
    
Iovation
By: Polycom     Published Date: Oct 17, 2016
To select the group video conferencing systems that best address their requirements, customers should do the following: 1) Understand the types of spaces to be video- (or collaboration-) enabled and the common use cases for each. 2) Review the requirements described in the tables above. 3) Meet with various solution vendors, ask for details about their group video offerings, and see how closely those systems address the needs of each type of space. Download to learn more.
Tags : 
    
Polycom
By: Polycom     Published Date: Feb 16, 2017
Despite video conferencing becoming a mainstream business tool, many end user organizations remain confused about how to choose the group video conferencing systems that best address their requirements. Download your guide now.
Tags : 
    
Polycom
By: Polycom     Published Date: Feb 16, 2017
" Understand the buying criteria and make informed decisions for group video conferencing systems and the features and functions needed to enable collaboration in the 5 most common workspaces in enterprises of all sizes; Small/Huddle Rooms Teaming Rooms Standard Meeting Rooms Executive Boardrooms Reconfigurable Spaces Despite video conferencing becoming a mainstream business tool, many end user organizations remain confused about how to choose the group video conferencing systems that best address their requirements. Download your guide now."
Tags : 
polycom, business technology, wainhouse, collaboration
    
Polycom
By: Polycom     Published Date: Jun 08, 2016
In the past, business meetings were treated like formal events. They were scheduled days or weeks in advance, often on a recurring basis (e.g. every second Tuesday), and had a defined start time and end time. Typically, these meetings had a named meeting host who managed the session and guided the team through a pre-published agenda.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Polycom
By: Polycom     Published Date: Oct 17, 2016
With its CX5100 and CX5500 products, Polycom (the sponsor of this study) has taken an innovative approach to resolving this situation. The CX5100 and CX5500 are 360 degree camera systems that sit in the middle of the conference room table, providing remote Skype for Business / Lync users with a better connection to the meeting room. And unlike traditional video conferencing systems, the camera in the middle of the table approach is flexible enough to support both standard / formal meetings and teaming sessions. Download this case study to learn more!
Tags : 
    
Polycom
By: Polycom     Published Date: Oct 17, 2016
With its CX5100 and CX5500 products, Polycom (the sponsor of this study) has taken an innovative approach to resolving this situation. The CX5100 and CX5500 are 360 degree camera systems that sit in the middle of the conference room table, providing remote Skype for Business/Lync users with a better connection to the meeting room. And unlike traditional video conferencing systems, the camera in the middle of the table approach is flexible enough to support both standard / formal meetings and teaming sessions.
Tags : 
    
Polycom
By: Savvis     Published Date: Jul 07, 2010
By choosing Savvis as a provider for all its infrastructure, Wall Street Systems is succeeding in the fiercely competitive SaaS marketplace by delivering reliable, scalable, mission-critical solutions to its highly demanding client base.
Tags : 
savvis symphony, saas, software-as-a-service, infrastructure, software outsourcing
    
Savvis
By: Tripp Lite     Published Date: Jun 28, 2018
Credit, debit and ATM card fraud costs consumers, merchants and financial institutions billions in losses every year. The payment card industry has responded by creating the PCI security standard. Merchants that fail to comply with PCI face increased risk of security breaches and substantial contractual penalties. Tripp Lite Wall-Mount Rack Enclosures help merchants achieve PCI compliance by securing network/telecommunications hardware and storage media in retail point-of-sale environments and other locations.
Tags : 
    
Tripp Lite
By: Riverbed     Published Date: May 29, 2015
EARTHQUAKE PROMPTS MANUFACTURING COMPANY TO PROTECT ITS BUSINESS WITH RIVERBED STEELFUSION
Tags : 
data, infrastructure, applications, data security, business continuity, analytical applications, business intelligence, data quality
    
Riverbed
By: Silver Peak     Published Date: Oct 28, 2013
In recent years, data deduplication has made its ways from the storage to the networking community. More specifically, it has become an important tool for optimizing application performance across the WAN. By eliminating the transfer of repetitive IP traffic, deduplication significantly improves WAN utilization and accelerates data transfers between geographically disperse locations. This saves bandwidth costs and helps to overcome many obstacles when communicating across a WAN. This paper discusses how WAN deduplication works, and how it can be effectively deployed as a complement to existing storage deduplication solutions.
Tags : 
wan, silver peak, deduplication, storage, data management
    
Silver Peak
By: Blue Coat Systems     Published Date: Jun 30, 2011
Social and technological changes are transforming the nature of network traffic, raising network costs and performance issues. Learn how to proactively manage the WAN as new Web protocols, consumer and corporate video and cloud-delivered applications become mainstream.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, infrastructure, network architecture, network performance, wide area networks
    
Blue Coat Systems
By: Riverbed     Published Date: Mar 31, 2011
Read this technology brief to learn how addressing network limitations can make the difference between success and failure of a cloud-based system.
Tags : 
riverbed, wan optimization, private cloud, cloud computing, networking, wide area networks
    
Riverbed
By: Riverbed     Published Date: Apr 26, 2012
This CIO article discusses how WAN optimization solutions, like those Riverbed Technology offers, can accelerate private cloud implementations and enable users to be productive, while helping to deliver the cost and management efficiencies businesses require. Read the informational story now and learn why companies like MasterBrand Cabinets chose Steelhead WAN optimization appliances for superior performance.
Tags : 
riverbed, wan, cloud, private cloud, business technology, wan optimization, wide area networks, application integration
    
Riverbed
By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Oktas mailing list at any time, by following this process. Additional details about Oktas privacy practices are available in our Privacy policy.
Tags : 
    
Okta APAC
By: Jive Software     Published Date: Mar 29, 2013
When it comes to producing collateral and other assets, marketing has been stuck in the past.
Tags : 
marketing, campaigns, campaign strategy, cmo, social business, social media
    
Jive Software
Start   Previous    869 870 871 872 873 874 875 876 877 878 879 880 881 882 883    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter