HIT Consultant Insightful coverage of healthcare innovation
 

system security

Results 251 - 275 of 587Sort Results By: Published Date | Title | Company Name
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that when properly designed, built and operated, are an integral part of the business strategy driving the success of any enterprise, yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems, with little thought given to the structure and space in which it is to be housed, serviced and maintained. This invariably leads to facility infrastructure problems, such as thermal hot spots, lack of UPS, rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained.
Tags : 
hp data center, data center, optimization, business strategy, hot spots, mission critical loads”, the it infrastructure, the availability
    
HP Data Center
Published By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization
    
VMware
Published By: EMC Corporation     Published Date: Aug 05, 2014
Roland Cloutier, CISO of ADP, describes how the largest single payer in the US tax system leverages RSA Security Analytics as the foundation of their Trusted Platform Security Initiative.
Tags : 
case study, adp, best practices, security analytics, rsa, trusted platform security initiative
    
EMC Corporation
Published By: EMC Corporation     Published Date: Aug 05, 2014
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Shavlik Technologies     Published Date: Apr 19, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
Shavlik Technologies
Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Today’s anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today’s malware developers. Hardware-assisted security products take advantage of a “deeper” security footprint.
Tags : 
advanced persistent threats, apts, apt attacks, rootkits, zero-day stealth attacks, stealthy malware, hardware assisted security, hardware enhanced security
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Traditional antivirus or intrusion prevention systems are no match for the new breed of attacks; enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
security connected, stealthy attacks, rootkits, os level protection, hardware assisted security, endpoint security
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security, medical equipment security, industrial control systems, mobile device security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.
Tags : 
database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting
    
McAfee
Published By: McAfee     Published Date: Jul 24, 2013
The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organizations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
stealthy attacks, malware, intrusion prevention system, siem, layered security controls
    
McAfee
Published By: McAfee     Published Date: Oct 01, 2013
Building and Maintaining a Business Continuity Program Successful - strategies for financial institutions for effective preparation and recovery.
Tags : 
disaster recovery, system availability, technology, mcafee, security management
    
McAfee
Published By: McAfee     Published Date: Nov 20, 2014
How do we get more visibility into attacks across our environments, improve our response, and reduce response time? SANS Analyst, James Tarala, provides insight on the solution by automating functions that should be automated and connecting the dots between detection systems and response. Connecting these dots and applying intelligence provides responders rich context into the observed behaviors for taking action. Integrating these processes improves accuracy, while reducing time, manpower, and costs involved in detecting and managing events. This white paper explores how to achieve this.
Tags : 
sans, incident response, detection systems, data correlation and aggregration, siem, security analytics tools
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Web-based systems are essential tools for running business processes and delivering services to customers. However, phishing and online fraud undermine customer confidence. In addition, Web security remains a top concern because of constantly evolving threats. Learn more about mitigating these web security risks with SSL Certificates in this IDC Technology Spotlight white paper
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
    
Cisco
Published By: Plex Systems     Published Date: Feb 26, 2014
Cloud is the perfect solution for food and beverage processors looking for an extremely safe and secure ERP system. Plex ERP is quickly becoming the preferred choice for food and beverage processors with security and availability concerns.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity
    
Plex Systems
Published By: HP     Published Date: Jan 20, 2015
Understanding the data you have and put it to effective use is now more crucial than ever. The key differentiator between the leaders and laggards in financial services today is how skillfully they turn data into useful information and fuel success.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: HP     Published Date: Jan 20, 2015
Armed with their opinions and social media accounts, your customers have the kind of clout to influence your brand that last century’s ad men only dreamed about. Learn how your organization can securely capture, analyze, and act upon 100 percent of the data available to you.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: HP     Published Date: Jan 20, 2015
Today's data landscape brings enormous opportunity to organizations to derive insights from all their data. Learn how government departments, agencies, public healthcare providers, and educational institutions can harness the value of Big Data today.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: HP     Published Date: Jan 20, 2015
Big Data is an opportunity for CSPs to create the intelligence for operating networks more efficiently, to analyze the success of the services that telcos are offering, and to create a better personal experience for their customers. Learn how to leverage the Big Data opportunity.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.