security leaders

Results 1 - 25 of 120Sort Results By: Published Date | Title | Company Name
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
    
Fidelis Cybersecurity
Published By: CheckMarx     Published Date: Apr 03, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Cisco     Published Date: Jul 08, 2016
This primer offers some strategies to help IT communicate the full value of mobility to key security stakeholders in the organization. It explains why partnering with IT is their smartest path to success.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
So what do end-users—companies in the process of building or upgrading their data centers today—think of the security problems they face? We conducted this survey to answer key questions about buyers’ plans for security in their data centers.
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Is your organization prepared for a cyberattack? Most aren’t. 86% of organizations surveyed lack adequate cybersecurity capabilities. Read MIT Technology Review’s latest infographic, based on their survey of 225 business and IT leaders, and learn if you have cybersecurity holes and how to patch them.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Published By: Dell     Published Date: Dec 12, 2017
Workers expect a high-quality workplace and the ability to be productive anywhere. As people increasingly prefer tablets and laptops, organizations are reassessing their continued investment in traditional PCs. Download "Security and Productivity Benefits Drive Increased Micro PC Adoption" for the latest research how business and IT leaders are rethinking the role of PCs.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Aug 17, 2017
This report highlights a unique approach to enabling IT to succeed in the digital age—a fully engineered converged infrastructure with richly supported capabilities for management, updates and configuration, security, and overall resilience. In particular, this report targets Dell EMC’s distinctive leadership in converged/hyper-converged infrastructure, while highlighting the many compelling benefits achieved in two real-world deployments: an enterprise and a global service provider.
Tags : 
it transformation, digital transformation, converged infrastructure, hyper-converged infrastructure, deployments
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC
Published By: Cisco     Published Date: Sep 21, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive. Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex Download this eBook to find the elements of complexity we have to deal with today.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Secureworks     Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Tags : 
managed security services, data breach, security, hackers, security, threat and vulnerability management, cost
    
Secureworks
Published By: Secureworks     Published Date: Nov 11, 2016
In this white paper we will discover what the evolving path ahead for security leaders looks like, the importance of communication from top to bottom, focusing on how proactive measures can stop threat actors from derailing businesses, and how building a security architecture that protects the most critical assets will support the overall goals of an organisation.
Tags : 
managed security services, security, threat and vulnerability management, security, security architecture, cyber security
    
Secureworks
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"CISOs and other security leaders know they can't find and fix every vulnerability. Yet, that's what’s expected. So, what can you do? The short answer: Work smarter, not harder. To do that, you need to reduce the vast universe of potential vulnerabilities down to a subset of the vulnerabilities that matter most. Download the “How to Prioritize Cybersecurity Risks: A Primer for CISOs” ebook now to learn: -How to adopt a risk-based approach to prioritization – beyond what CVSS scores tell you -Why visibility into all your company’s IT assets is key to understanding the scope of vulnerabilities and taking appropriate remedial action -How to change the conversation from “How many vulnerabilities do we have?” to “Which vulnerabilities pose the greatest risk?”"
Tags : 
    
Tenable
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat is a trusted partner to enterprise customers; cloud, software, and hardware suppliers; and the global open source community. A Red Hat® Enterprise Linux® subscription provides customers with direct access to innovation and advocacy—within the open source community and within a certified and trusted network of partners. Red Hat Enterprise Linux provides you with an innovative platform that serves as the foundation for your business. It is hardened, certified, and supported by the Red Hat Product Security team, support teams, and certified engineers. Red Hat supports your timelines and advocates for your requirements so you can focus on the work of your business rather than being your own operating system vendor. We use our leadership in the open source community to do the work that brings you the best of open source. Get direct access to: Technology-driven solutions Emerging technology Experience and support Continuous security Timeline support Download the whitepaper to lea
Tags : 
    
Red Hat
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: