HIT Consultant Insightful coverage of healthcare innovation
 

security control

Results 101 - 125 of 505Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
    
CA Technologies
Published By: GE Power     Published Date: Jan 27, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : 
cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment
    
GE Power
Published By: Exabeam     Published Date: Sep 25, 2017
This solution brief will describe how Exabeam can help organizations implement effective security controls and best practices to achieve alignment with GDPR.
Tags : 
    
Exabeam
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia
Published By: Schneider Electric     Published Date: Jun 05, 2018
Balancing the increased pressure to improve productivity and quality, while reducing cost against mandated safety regulations is one of the most complex challenges in industry today.
Tags : 
process automation, ecostruxure plant, operational profitability, cybersecurity, safety, smart control, empowered operators, optimized assets, future of automation, reliability
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Turbonomic     Published Date: Jul 05, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how to iden
Tags : 
    
Turbonomic
Published By: Gigamon     Published Date: Dec 13, 2018
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Read "Understanding the State of Network Security Today" to learn why ESG recommends consolidating security tools through a structured, platform-based approach. Data, analytics and reports from multiple tools can be aggregated and consumed in one control panel, reducing network vulnerabilities. Learn more about challenges, changes and best practices for today’s network security operations and tools. Read now.
Tags : 
    
Gigamon
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users don’t get the protection of your traditional security stack. Not only are more offices connecting directly to the internet — it’s estimated that 70% of branch offices already have some direct internet access — but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: BMC Software     Published Date: Jul 24, 2014
With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. Discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Read the whitepaper today to put the trust back into your data center.
Tags : 
intelligent, compliance, breach, security, data center, control
    
BMC Software
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis, financial institutions are faced with increasing scrutiny from government regulators. The Dodd-Frank act was passed in response to the disaster, creating the Consumer Financial Protection Bureau and mandating 398 new rulemakings, many of which remain to be finalized. In light of these events financial services organizations are increasingly relying on Intralinks® as the most secure way to control sensitive information when collaborating within and outside their organizations. Intralinks meets the strictest security, auditability, and compliance requirements of regulated entities around the world – regardless of business complexities. Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection
    
Intralinks
Published By: OpenText     Published Date: Nov 30, 2015
Download this whitepaper to learn how OpenText’s enterprise-grade, workflow-oriented digital asset management ecosystem gives organizations the necessary combination of performance, security and management control for using digital assets both within their enterprises and in their relationships with customers, partners and prospects.
Tags : 
    
OpenText
Published By: Secureworks     Published Date: Oct 04, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organization’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
    
Illusive Networks
Published By: Aerohive     Published Date: Sep 25, 2015
Experience first-hand the full feature set of an Aerohive Access Point. Attend this webinar on Thursday 8 October 2015 at 11:00 CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.