HIT Consultant Insightful coverage of healthcare innovation
 

physical security

Results 1 - 25 of 106Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Pindrop Security     Published Date: Sep 24, 2018
With physical and online information security always growing stronger and harder to crack, fraudsters gravitate toward the weakest link in your security—your contact center and voice channels. For many years, our annual fraud reports have shown that fraudsters increasingly exploit the phone channel. Fraud rates continue to increase every year, and this year is no different. Between 2016 (1 in 937 calls) and 2017 (1 in 638 calls), the overall voice channel fraud rate increased by 47%, continuing on the upward trend from last year 113% increase.1 From 2013 through 2017 we have seen the fraud rate climb over 350%, with no signs of slowing down. It is important to note, that some verticals (i.e. Retail) experience even higher fraud rates than shown here.
Tags : 
    
Pindrop Security
Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys
Published By: Digital Realty     Published Date: Feb 25, 2015
Atlantic Health Systems, a nonprofit health care organization had a growing patient base and an evolving IT infrastructure that needed a scalable, flexible data center with world-class operations support that could be set up today to accommodate your needs tomorrow. Find out why they turned to Digital Realty.
Tags : 
data center, infrastructure management, access control, physical security
    
Digital Realty
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: Symantec     Published Date: Oct 02, 2012
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business.
Tags : 
ssl certificates, online security options
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Entrust Datacard     Published Date: Oct 31, 2013
Smart credentials are the best bet for strong physical and logical access security.
Tags : 
entrust, security, smart credentials, multifunction access, password authentication
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 24, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, cloud access, digital security, security software
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
Smart credentials are the best bet for strong physical and logical access security
Tags : 
entrust, security, passwords, memory cards, smart credentials, authentication
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
smart credentials, hardware, software, passwords, features, outdated physical access
    
Entrust Datacard
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology
    
Blue Coat Systems
Published By: IBM     Published Date: Nov 14, 2014
Security is a growing concern in our increasingly connected Internet of Things. Everything that is connected is potentially subject to malicious and criminal attack. Learn how to incorporate security analysis and development techniques to build secure smarter systems.
Tags : 
security, cyber physical systems, agility, product development, security analysis, secure smarter systems
    
IBM
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : 
cloud security, virtualization security, virtualization, data center
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Now you can have easy SaaS-based Discovery and Reporting on all Physical and Virtual Systems, Security Update Status and Assets in Minutes.
Tags : 
shavlik, cloud-based it management, saas, discovery and reporting, virtual systems, security update, netchk protect, virtual infrastructure
    
Shavlik Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
    
Trend Micro, Inc.
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity
Published By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : 
symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop
    
Symantec.cloud
Published By: McAfee     Published Date: Feb 06, 2013
The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively, and require a new generation of flexible security architectures.
Tags : 
    
McAfee
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.