HIT Consultant Insightful coverage of healthcare innovation
 

security investment

Results 76 - 100 of 114Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
This 45-page e-Book gives you the tools you need to detect security vulnerabilities, build an information security strategy, and plan your investment in security technology.
Tags : 
verisign, phishing, extended validation, ev ss, ssl, encryption, online safety, online security, security solutions, security vulnerabilities, information security
    
VeriSign Incorp.
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? Perhaps you went with something you had used at a previous job. Maybe you even went so far as to read a few product reviews and third-party test results or evaluations. But, did you test the anti-malware solution yourself? In this book, we explain how artificial intelligence (AI) can help your enterprise combat malware threats in a more preventative, proactive, and radically better way than legacy anti-malware products. We explain why you shouldn't just believe a vendor's marketing. Instead, you should test different solutions for yourself, just as you would with any other major security investment. Read more in this eBook.
Tags : 
anti, malware, testing, generation, data, security
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
These emerging technologies and solutions certainly are not unique to financial services. But Stewart, a business director of security intelligence solutions within the SAS Security Intelligence Practice, sees particular interest and application in AML circles. "There remain a good number of manual processes within financial crimes departments in financial institutions, and AI can help automate some of those rote tasks such as document review or alert triage," he says. "Due to investments in technology, there is a lower barrier of entry for midsized institutions. "And finally, there's this anxiety over the unknown - those risks they are not able to detect, that may be hidden using traditional techniques - so they're hoping that more advanced, unsupervised learning techniques can be used to identify those edge cases or behaviors that are out of norm." In an interview about analytics and the AML paradigm shift, Stewart discusses: • The new industry intrigue with artificial intelligence a
Tags : 
    
SAS
Published By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending
    
Imperva
Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation, security investment, risk, risk management, it security, cis benchmark, e-commerce security, gramm-leach-bliley act (glba), sarbanes-oxley act (sox), health insurance portability, accountability act (hipaa), windows server, sysadmin
    
Tripwire
Published By: IBM     Published Date: Jan 07, 2016
IBM Executive Summary: 2015 CISO Insights Study: From Checkboxes to Frameworks. Identifying How Firms Manage Cybersecurity Investment.
Tags : 
ibm, ciso, insight, cybersecurity
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
economics, forresster, ibm, security, network protection, performance
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats, network, xgs, forrester, tei, total economic impact
    
IBM
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
It’s possible to lead the world in an industry—medicine in this case—and to simultaneously lag behind when it comes to network security. One large national hospital system faced serious IT challenges. Network investment had been put off to the point of opening critical security vulnerabilities. A massive attack surface and limited visibility meant a threat could penetrate the network and remain hidden for months. It put critical systems, employees, patients, and the hospital’s reputation at risk.
Tags : 
    
Cisco
Published By: Lenovo and Intel®     Published Date: Jan 15, 2019
A private cloud delivers control, security and customization–which are non-negotiable criteria for many businesses. But for those undeniable benefits, private cloud environments come at a cost, requiring significant initial and ongoing investment of both capital and human resources, as well as requiring expert technical support for architecting and upkeep. In this study by Principled Technologies, read how the highly automated Lenovo ThinkAgile CP composable cloud solution, powered by the Intel® Xeon® Platinum processor, deliver key private cloud benefits while remaining cost effective, rapid to deploy, and simple to manage.
Tags : 
    
Lenovo and Intel®
Published By: Cisco     Published Date: Dec 19, 2016
Cisco AMP for Endpoints is a cloud-managed endpoint security solution that provides the visibility, context and control to not only prevent cyberattacks, but also rapidly detect, contain, and remediate advanced threats if they evade front-line defenses and get inside—all cost-effectively, without affecting operational efficiency, and before damage can be done.
Tags : 
    
Cisco
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to a National Cyber Security Alliance estimate. Yet 68 percent of small business owners in a recent survey seemed oblivious to the threat. Why the disconnect? What should they be doing to protect their business-critical systems and data? How can small businesses wring maximum value from their cybersecurity investments? Where do AI-based endpoint protection, detection, and response platforms fit into the mix? Read this BlackBerry Cylance sponsored white paper, Small Organizations Still Need Big Security, to find out.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Jul 09, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : 
security operations, deployment, service delivery, problem management
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, it security, resilience investments, enhanced brand value
    
IBM
Published By: IBM     Published Date: Jan 14, 2015
Explore this interactive infographic to discover how IBM makes it possible to manage all of these priorities while significantly reducing storage and maintenance costs.
Tags : 
big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics, analytics, platform investment
    
IBM
Published By: Trend Micro     Published Date: Oct 12, 2012
The security software you choose for virtual environments will have a significant impact on your organization's return on investment.
Tags : 
information technology, security, software, trend micro
    
Trend Micro
Published By: Hosting.com     Published Date: Jan 21, 2011
This white paper demonstrates how companies that have moved their SQL databases to the cloud have overcome past performance and security concerns to increase operational efficiency, improve availability and scalability, reduce costs, gain a faster-time to-market, and achieve a better return on investment.
Tags : 
hosting.com, sql database, cloud computing, virtualization, data-intensive application, performance, security
    
Hosting.com
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics
    
Cisco
Published By: Riverbed     Published Date: Sep 05, 2014
Storing data in the cloud using a Whitewater™ cloud storage gateway from Riverbed Technology overcomes what is becoming a serious challenge for IT departments: how to manage the vast, and ever-growing, amount of data that must be protected. Whitewater eliminates concerns about data security, data transmission speeds over the Internet, and data availability, while providing great flexibility and a favorable return on investment. Moving data to the cloud replaces the high costs of tape and disk storage systems with a pay-as-you-go cloud storage tier. This paper makes the business case for cloud storage, outlining where capital and operational costs can be eliminated or avoided by using the cloud for backup and archive storage.
Tags : 
data storage, cloud, it departments, security, transmission speeds
    
Riverbed
Published By: VMware AirWatch     Published Date: Mar 02, 2017
The VMware 2016 State of the Digital Workspace Report was performed in July 2016 and is a study that examined digital workspace adoption among global organizations across industries. Data represents a survey of 1,263 business decision makers (BDMs) and IT influencers to examine the worldwide progress in transitioning from the client-server era to the mobile-cloud era. Respondents acknowledged that game-changing IT relies on organizations adopting a digital workspace that includes security and identify management as vital components. With realistic prospects of achieving astounding return on investment (ROI), even businesses that cited obstacles to adoption may want to consider taking another look at business mobility initiatives.
Tags : 
    
VMware AirWatch
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.