policies

Results 276 - 300 of 388Sort Results By: Published Date | Title | Company Name
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, networking, security
    
IBM MaaS360
Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies, security
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : 
ibm security, access management solutions, mobile channel security, advanced threats, byod, security
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM® Operational Decision Manager Advanced brings together data from different sources to recognize meaningful trends and patterns. It empowers business users to define, manage and automate repeatable operational decisions. As a result, organizations can create and shape customer-centric business moments.
Tags : 
ibm, customer-centric business, operational manager, decision manager, business policies
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
Read the IBM white paper, “Protecting corporate credentials against today’s threats”, to learn why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, credentials theft, identity management policies, anti-malware software, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
When you think about mobile security and policies, do you ever think about all the places your enterprise data is going? We operate in a mobile economy, with an estimated 16M mobile devices infected by malware at any given time. There are more mobile devices connected to the Internet than human beings in the world. The question is: Are we prepared for that?
Tags : 
ibm, ciso, mobility, mobilephobia, mobile security, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The right identity governance and administration solution can help you control access risks and segregation-of-duties violations. It can help you manage user roles, access policies and risk - so you can apply and enforce appropriate levels of access across your enterprise.
Tags : 
ibm, data security, risk management, data management, network security
    
IBM
Published By: IBM     Published Date: Jul 08, 2016
This ebook takes you on a journey to discover a cloud-based content management solution that provides greater visibility and collaborative control over business content. Meet Mike, an IT Solutions Executive, looking for an innovative way to collaborate that's secure, easy to use, immediate and accessible -- all while meeting strict governance policies.
Tags : 
ibm, analytics, ecm, ecm platforms, enterprise content management, box integration, cloud management
    
IBM
Published By: IBM     Published Date: Oct 18, 2016
This ebook takes you on a journey to discover a cloud-based content management solution that provides greater visibility and collaborative control over business content. Meet Mike, an IT Solutions Executive, looking for an innovative way to collaborate that's secure, easy to use, immediate and accessible -- all while meeting strict governance policies.
Tags : 
ibm, analytics, ecm, box, box for it, content, cloud, content management, data center
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM
Published By: thawte     Published Date: Nov 06, 2006
Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
Tags : 
security, security policies, network security, servers, windows server, microsoft web server, security certificate, networking best practices, digital certificate, web security, internet security, web server security, thawte, web server
    
thawte
Published By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : 
blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset, touchpoint
    
BlackBerry
Published By: SAS     Published Date: Aug 28, 2018
With the amount of information in the digital universe doubling every two years, big data governance issues will continue to inflate. This backdrop calls for organizations to ramp up efforts to establish a broad data governance program that formulates, monitors and enforces policies related to big data. Find out how a comprehensive platform from SAS supports multiple facets of big data governance, management and analytics in this white paper by Sunil Soares of Information Asset.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco, networking, security
    
Cisco
Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations
    
BlackBerry
Published By: HP and Intel ®     Published Date: Jul 26, 2013
Without the proper policies governing cloud usage, a shared infrastructure design, and without a comprehensive yet effective cloud service portfolio, your organization will end up spending more time and money fixing issues rather than delivering desired results to the business.
Tags : 
cloud, converged infrastructure, cloud design
    
HP and Intel ®
Published By: Cisco     Published Date: Apr 10, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases. There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
cisco, byod, wifi, wireless, wlan, productivity, productivity
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: McAfee     Published Date: Oct 14, 2013
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, network security, email security, hacker detection
    
McAfee
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.