HIT Consultant Insightful coverage of healthcare innovation
 

mc afee

Results 126 - 150 of 372Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
Protect systems from unknown, advanced persistent threats with centrally managed whitelisting
Tags : 
application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Take the stealth, creativity and patience of Stuxnet, the commercialism, wide distribution and easy-to-use toolkits of Zeus, and you understand the potency of today’s malware. Start planning now to protect your intellectual property and other assets.
Tags : 
zues, stuxnet, stealthy threats, rootkits, malware, rootkit binaries, zero-day vulnerabilities, botnet, ddos attacks, keylogging, phishing, trojans, embedded security, endpoint security
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
How do rogue programs work - and how do you protect yourself and your business? Three best practices to keep these unwanted programs out of your networks.
Tags : 
fake alerts, fake anti-virus, rogue programs, rogue applications, scareware, endpoint url filtering, web gateway, anti virus
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Users who take work with them everywhere unknowingly jeopardize networks and systems.
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000, windows xp
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Windows 8 includes many new security features, such as secure password storage, secure boot functions, anti-malware defenses, and even enhanced reputation capabilities. Will these features be enough to mitigate risks to users and corporate networks?
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000, windows xp, windows defender, boot time protection, 2012 windows server security, endpoint protection 2012, smartscreen technology, adobe flash security
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organization’s most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : 
best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.
Tags : 
securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba, sox, cobit, iso, hipaa, fisma, database activity monitoring, database vulnerability manage, database activity monitoring
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance, database activity monitoring, database vulnerability management, pci audit
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
With McAfee® Database Security, achieving protection and compliance is easier than you might think.
Tags : 
database security, database audit, database compliance, cert, database security policy, database vulnerability management, database virtual patching, database activity monitoring
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : 
database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley, hipaa, hitech, ssae
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.
Tags : 
database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases don’t take the day off. Neither do we. McAfee security experts remain focused on keeping your sensitive information safe and available while helping your company ensure compliance with internal policies and industry regulations.
Tags : 
database security, database compliance, database virtual patching, database breach, application control, legacy databases
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring, memory based sensors
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Virtual Patching for Databases makes perfect sense for closing the window of risk, while saving dollars and minimizing business disruption.
Tags : 
database security, database patching, database compliance, database security patches, virtual patching, hipaa, pci dss
    
McAfee
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Jul 24, 2013
Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Tags : 
siem, big security data, security information, advanced threats, security intelligence
    
McAfee
Published By: McAfee     Published Date: Jul 24, 2013
The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organizations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
stealthy attacks, malware, intrusion prevention system, siem, layered security controls
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.