risk reduction

Results 26 - 44 of 44Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : 
sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection, encryption keys, vulnerability management
    
Venafi
Published By: IBM     Published Date: Feb 21, 2013
CFOs should consider “The Last Mile of Finance” as a target for cost control, process optimization, and risk reduction that can enable finance to better support the strategic goals of the organization.
Tags : 
automation, last mile, finance, sec, xbrl, extensible business reporting language, reporting, cfo
    
IBM
Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals how Security Operations teams can eliminate these outages.
Tags : 
security, security operations, outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
Venafi
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
The key tenets of protecting data privacy are: knowing where your data resides, understanding who has access to the data and what are they doing with it, and knowing how the data is being used internally that may result in non-compliance. Additionally, most compliance projects are major, company-wide initiatives and must be managed properly to meet deadlines and keep costs in check.
Tags : 
classify data, gdpr, risk reduction, breach protection, anonymize data, privacy projects, data management
    
CA Technologies EMEA
Published By: Websense     Published Date: Oct 06, 2014
This paper aims to provide the shortest path to prevention and risk reduction.
Tags : 
data loss protection, protecting ip data loss and theft
    
Websense
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: Protect your data and reputation while meeting clients’ cybersecurity expectations Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing Comply with regulations and ethics codes
Tags : 
accounting, risk reduction, encryption, compliance, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Ping Identity     Published Date: Jan 29, 2013
Investing in SSO is not about the security and risk reduction but about empowering business. This white paper from Quocirca discusses how organizations can improve workforce collaboration and gain a competitive edge through SSO.
Tags : 
secure cloud, free business, sso security, empowering business, quocirca, ping
    
Ping Identity
Published By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : 
social intelligence, marketing, social media, gleanster
    
Gleanster
Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls, digital certificates, mobile application security, security management
    
Venafi
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Published By: Lookout     Published Date: Aug 30, 2017
The Practical Guide to Enterprise Mobile Security was created to help IT managers fulfll their dual role of both enabling productivity and reducing risk through the adoption of modern-enterprise mobile security practices. This guide will help answer questions you might have about implementing mobile security, identify the components that make up a holistic enterprise mobile security strategy, point out key considerations that lead to successful deployments, and provide tips on how to successfully drive adoption of that solution in your global workforce.
Tags : 
enterprise mobile security, mobile security risk, risk reduction, device security
    
Lookout
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management
    
Flexera
Published By: Flexera     Published Date: Sep 16, 2016
Download this white paper to learn more about these three steps to securing software patches: Play to strengths and know your weaknesses Prioritize for Bottom Line Value Design a Process to Support Desired Outcomes
Tags : 
software patch, patch management, third-party patching, software vulnerability management, vulnerability intelligence, enterprise risk, flexera, risk reduction
    
Flexera
Published By: IBM     Published Date: Sep 22, 2011
Help reduce operational costs and risk while improving accessibility of critical business data.
Tags : 
ibm, data delivery, risk reduction, cdc, soa, mdm, data management
    
IBM
Published By: Gomez IT     Published Date: May 23, 2011
Everyone wants more traffic to their web site, right? What happens if the investments you make to drive traffic to your site result in reduced revenue? Continue reading to learn more about how important web load testing is.
Tags : 
gomez, web performance testing, web load testing program, compuware, web application delivery, risk reduction, traffic management
    
Gomez IT
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
One of the few places that pervasive Wi-Fi is not found these days is in US Federal Government office buildings and military bases. Government IT departments explain this lack of modern technology by pointing to Information Assurance (IA) departments who block their planned deployments because of security concerns. IA departments, on the other hand, point to unclear rules, regulations, and policies around Wi-Fi use which prevent them from making informed risk decisions.
Tags : 
government it, modern technology, data security, risk reduction
    
Hewlett Packard Enterprise
Previous    1 2     Next   
Search Offers      
Get your company's offers in the hands of targeted business professionals.