Whitepaper Library
 

sme

Results 301 - 325 of 633Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Nov 13, 2012
Clarifying what exactly this process entails and what's to be gained from it.
Tags : 
cdw, security assessment, security assessment, security posture
    
CDW
Published By: CDW     Published Date: Nov 13, 2012
Guidance on the pertinent steps that will yield the most value from an assessment.
Tags : 
cdw, security assessment project, successful security assessment
    
CDW
Published By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : 
mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence, data center
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
Vulnerability assessment vendors compete on management features, configuration assessment, price and more, with other security products. Buyers must consider how VA will fit into their vulnerability management process when evaluating VA products,
Tags : 
vulnerability management, network scanning, strong positive, mcafee vulnerability manager, mvm, mcafee epolicy orchestrator, epo, nitro siem, mcafee security innovation alliance, data center
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Jul 24, 2013
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis
    
McAfee
Published By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
    
Cisco
Published By: Polycom     Published Date: Dec 18, 2017
Polycom Pano, a wireless and wired presentation solution, is designed to make it quick and easy for meeting participants to present and share various types of content. Polycom commissioned the Wainhouse Research test team to perform a third-party assessment of Pano. To facilitate this effort, Polycom provided a pre-release version of the Pano device, and a Sharp PN-L703B 1080p touch-capable 70” display. This report contains the results of our hands-on testing.
Tags : 
pano, wireless presentation solution, content sharing, blackboarding, annotation, polycom
    
Polycom
Published By: ServiceNow     Published Date: Oct 11, 2017
Customer service and contact centers are on the front lines representing organizations. Their successful handling of service issues helps deliver on the promise of a great customer experience. To continue meeting the demands of customers — while fulfilling the organizational goal of delivering a differentiated service experience — the modern customer service organization requires a seamlessly integrated front-office to back-office enterprise applications architecture and set of processes. As products and services become more technical in nature — think IoT devices — this interconnectedness is essential. Systems and customer support staff must be informed and enabled through technology to provide a contextualized experience that meets the customer's needs. Consistency across channels, proactive service, knowledge of a customer's past service requirements, technical skills, and rapid assessment and response will be essential requirements for modern customer service, which in turn creates
Tags : 
    
ServiceNow
Published By: DigiCert     Published Date: Mar 16, 2017
This webinar provides an overview from both a healthcare provider organization and medical device manufacturer perspective.
Tags : 
internet of things, healthcare, cybersecurity, medical devices, risk assessment
    
DigiCert
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"True e-commerce success hinges on how well you can connect to customers, grow sales and optimize operations across multiple channels. Unfortunately, not all e-commerce platforms are equally effective at streamlining these processes. If your current e-commerce platform is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of moving to a new software platform is much easier than you might think. Complete the self-assessments in this eBook to see if you’re ready to make the switch today."
Tags : 
ecommerce, retail, ecomerce software, ecommerce platform, marketplace
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"True e-commerce success hinges on how well you can connect to customers, grow sales and optimize operations across multiple channels. Unfortunately, not all e-commerce platforms are equally effective at streamlining these processes. If your current e-commerce platform is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of moving to a new software platform is much easier than you might think. Complete the self-assessments in this eBook to see if you’re ready to make the switch today. "
Tags : 
    
ChannelAdvisor
Published By: Singapore Economic Development Board     Published Date: Nov 14, 2018
Consumer giant P&G shares how it innovates in order to bring value to its customers, and why it chose Singapore to house its newest innovation hub based on LITE – Location, Infrastructure, Talent and Ecosystem.
Tags : 
    
Singapore Economic Development Board
Published By: Acronis     Published Date: Dec 28, 2011
Taneja Group recently carried out a competitive assessment to put Acronis vmProtect 6 against Veeam in a head to head shoot-out. vmProtect 6 delivered across the board - demonstrating better simplicity, higher performance, and lower resource consumption.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis, veeam, vmprotect, acronis vmprotect, vm protection, cloud computing
    
Acronis
Published By: McAfee EMEA     Published Date: Mar 14, 2018
This IDC study uses the IDC MarketScape model to provide an assessment of a number of providers participating in the endpoint specialized threat analysis and protection market.
Tags : 
    
McAfee EMEA
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper looks at the technology required to stop cyber-bullying and the steps school administrators can take to ensure students are protected. Learn the facts about cyber-bullying today!
Tags : 
watchguard xcs, cyber-bullying, digital epidemic, online harassment, network security appliance, content control, intelligent monitoring, digital playground monitor
    
WatchGuard Technologies
Published By: Oracle Corp.     Published Date: Oct 15, 2012
Download this assessment of Oracle Database Appliance from Nucleus Research, to discover the various compelling features of the appliance.
Tags : 
database appliance, sql, high availability, oracle
    
Oracle Corp.
Published By: NCM Fathom     Published Date: Dec 09, 2011
The lights, the atmosphere, the big screen - it all comes together at the cinema. A great brand deserves a terrific event that mesmerizes its audience and employees. Planning a cinema event is a lot like directing a movie from the cutting room to the red carpet. For your event, evaluate how to deliver without giving too much away. You must know what will connect with your audience.
Tags : 
ncm fathom, creative content, cinema, audience, customer
    
NCM Fathom
Published By: Symantec.cloud     Published Date: Feb 12, 2010
Understand the legal issues if you do not conduct a risk assessment before creating your AUP.
Tags : 
messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance
    
Symantec.cloud
Published By: EMC Corporation     Published Date: Mar 20, 2014
This ESG Lab review documents hands-on testing of RSA Enterprise Compromise Assessment Tool (ECAT), a signature-less malware detection tool with a focus on endpoint compromise assessment and monitoring.
Tags : 
emc, rsa, ecat, enterprise compromise assessment tool, malware threats, malware detection, compromise assessment, compromise monitoring
    
EMC Corporation
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the vulnerable components of SCADA systems based on analysis from Secunia while verifying the reported reported vulnerabilities.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.