Business Continuity White Papers

Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. BCP may be a part of a larger organizational effort to reduce operational risk associated with poor information security controls, and thus has a number of overlaps with the practice of risk management.
Results 1 - 25 of 302Sort Results By: Published Date | Title | Company Name
By: Vectra Networks     Published Date: Aug 03, 2015

Protect against advanced attacks.

Tags : threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
    
By: Vectra Networks     Published Date: Aug 03, 2015

Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.

Tags : cyber attack, protection, security, network, business continuity, compliance, firewalls, productivity
    
By: Vectra Networks     Published Date: Aug 03, 2015

Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.

Tags : data, security, threats, protection, advanced threat, ips, ids, firewall
    
By: IBM     Published Date: Jul 31, 2015

Guide to security intelligence.

Tags : security, data, application security, business continuity, compliance, infrastructure
    
By: IBM     Published Date: Jul 31, 2015

Optimize the process of investigating and gathering evidence.

Tags : data, security, threats, protection, business continuity, compliance, hacker detection, intrusion detection
    
By: Venafi     Published Date: Jul 27, 2015

Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.

Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Cisco     Published Date: Aug 27, 2015

Magic Quadrant report looking specifically at on-premises unified communications requirements for midsize organizations with 100 to 999 employees.

Tags : unified communications, midsize enterprise, uc solutions, productivity, business process, enterprise communications methods, integrated application, collaboration application
    
By: Tenable Network Security     Published Date: Jul 23, 2015

Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.

Tags : risk management, cybersecurity, asset visibility, active scanning, risk blind spot, log analysis, network security, security management
    
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
    
By: Bit9     Published Date: Jul 09, 2015

Bit9’s approach to compliance is simple. Organizations should include relevant stakeholders in building Compliance Control Policies to meet regulatory standards while supporting business goals. Control Policies dictate which assets are covered by each Standard and what actions users can execute for each asset. By grouping similar classes of assets and users, policies can be logical to users, enforcement is automatic and audits are simplified.

Tags : risk, compliance, security, controls, auditing, business continuity, productivity
    
By: Bit9     Published Date: Jul 09, 2015

As point-of-sale devices at major retailers, restaurants and hospitality providers come under increased attack, organizations are more aware of the problem but may be blind to what’s really happening. Businesses are spending more money on security but many still rely on outdated technology and risky security practices.

Tags : security, risk, assessment, pos, point-of-sale security, business continuity, compliance, intrusion prevention
    
By: Mimecast     Published Date: Jun 22, 2015

Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, data management
    
By: Mimecast     Published Date: Jun 22, 2015

Download this whitepaper today and take a good hard look at one of the biggest threats companies are facing – without preparation your company could be next.

Tags : spear-phising, cyber attacks, cyber threats, network security, company security, application security, business continuity, disaster recovery
    
By: IBM     Published Date: Jun 16, 2015

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: IBM     Published Date: Jun 16, 2015

This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.

Tags : data center, mobility, software defined environment, service optimization, business solutions, data center security, compliance, automating protective measures
    
By: Riverbed     Published Date: May 29, 2015

Embrace zero branch IT for greater data protection, better agility, maximum business continuity, optional performance, and lower TCO.

Tags : data protection, business continuity, performance, growth, infrastructure, data center, data quality, productivity
    
By: Riverbed     Published Date: May 29, 2015

EARTHQUAKE PROMPTS MANUFACTURING COMPANY TO PROTECT ITS BUSINESS WITH RIVERBED STEELFUSION

Tags : data, infrastructure, applications, data security, business continuity, analytical applications, business intelligence, data quality
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.

Tags : backup, data protection, database backup application solution, data security, unified data, recovery, backup data, application security
    
By: AllClearID     Published Date: Apr 23, 2015

A Study of Actual Payouts for Covered Data Breaches. **This white paper was published by NetDiligence**

Tags : network security, security policies, disaster recovery, compliance, business continuity, internet security
    
By: AllClearID     Published Date: Apr 23, 2015

In this complimentary whitepaper, learn how successful organizations are retaining customers, protecting their reputation, and getting back to business after a data breach. Get the report.

Tags : hacking, network security, anti virus, business continuity, disaster recovery, hacker detection, internet security, vulnerability management
    
By: IBM     Published Date: Apr 09, 2015

Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.

Tags : ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security, business continuity
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End