Policy Based Management White Papers

Results 1 - 25 of 125Sort Results By: Published Date | Title | Company Name
By: OpenText     Published Date: Feb 06, 2018

Read the white paper to learn how you can address key GDPR requirements by consolidating all your data in a central repository to gain tighter security and control, easier access and retrieval.

Tags : opentext, gdpr compliance, eu privacy, data protection, data access, compliance, network security, remote access, access control, policy based management, security policies, best practices, international computing, business technology, data loss prevention
    
By: OpenText     Published Date: Jan 26, 2018

Read this AIIM white paper to learn how to tackle future information privacy and security concerns of new and future technologies such as IoT and machine learning, and prepare for the GDPR.

Tags : opentext, compliance, gdpr, gdpr compliance, information privacy, data protection, privacy, identity management, policy based management, security policies, pci compliance, business technology
    
By: Vision Solutions     Published Date: Feb 26, 2010

Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised

Tags : vision, high availability, ibm, cdp, aix, xsm, disaster recovery, policy based management, as/400
    
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010

A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?

Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009

Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.

Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
By: Mimecast     Published Date: May 11, 2009

Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.

Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive, medium-size business, esg, storage, anti spam, anti spyware, anti virus, application security, policy based management, security management, security policies, web service security, email archiving
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors.

Tags : citrix, security, data, policy based management, security management, security policies, best practices, database security, collaboration
    
By: CDW     Published Date: Jul 08, 2015

Keep data safe, even as it moves outside the perimeter of the traditional network.

Tags : security, vulnerability management, analytics, threat prevention, mobile security, encryption, policy based management, security management, security policies, data loss prevention
    
By: CDW     Published Date: Jul 08, 2015

An effective data loss prevention program requires the right technologies and policies in place and working together.

Tags : dlp, leakage, security, strategy, policy based management, security management, security policies, vulnerability management, data loss prevention
    
By: CDW     Published Date: Jul 08, 2015

It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.

Tags : security, vulnerability management, analytics, mobile security, byod, mdm, application security, policy based management, mobile device management, data loss prevention
    
By: NAVEX Global     Published Date: Jul 02, 2015

This report reveals practical recommendations from NAVEX Global experts that you need to make better decisions and take your policy management program to the next level.

Tags : navex global, policy management, policy management program, ethics and compliance, compliance, ethics, automated policy management software, policy based management, business issues and trends, management fundamentals
    
By: Cisco     Published Date: Jun 29, 2015

Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.

Tags : csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement, automates clean up, automation, network architecture, network performance management, policy based management, security management, security policies, virtualization, infrastructure, infrastructure management
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.

Tags : web application delivery, session hijacking, security, ca single sign-on, application security, policy based management, security policies, single sign on, application integration, risk management, system management software
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.

Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security, access control, application security, business continuity, identity management, password management, policy based management, security policies
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics, business continuity, compliance, ddos, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management, internet security, intrusion detection
    
By: NAVEX Global     Published Date: Mar 04, 2014

Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.

Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment, qualified third parties, qualifications, risk mitigation, monitoring and auditing, policy based management, security management, security policies, best practices, human resources
    
By: Qualys     Published Date: Nov 05, 2013

The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.

Tags : automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard, internet security, intrusion detection, intrusion prevention, policy based management, security management, vulnerability management
    
By: Qualys     Published Date: Nov 05, 2013

Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.

Tags : vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security, internet security, intrusion detection, intrusion prevention, policy based management, security management, vulnerability management
    
Start   Previous   1 2 3 4 5    Next    End