Home
 > search for

Featured Documents related to »  security operations


Compliance, Not Conflict: From IT Security vs. IT Operations,
It’s an inescapable, undisputable fact that most organizations have conflict between IT security and IT operations. Having been given two distinctive—yet

security operations  Not Conflict: From IT Security vs. IT Operations, It’s an inescapable, undisputable fact that most organizations have conflict between IT security and IT operations. Having been given two distinctive—yet potentially contradictory—goals, in a sense they were destined to be at odds with one another. What does it take to bridge the gap between these two teams to achieve compliance? Can standardized processes and software tools help (or hinder) this effort? Find out here. Read More...
Information Security Selection
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » security operations


Network Security Management
In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’

security operations  with vulnerability assessment and security event correlation into one platform. Ultimately, this convergence reduces IT acquisition and operations costs, and enhances responses to network security incidents. Read More...
Arming Your Security Operations with the Right Technology and Services
This white paper discusses the importance of information technology (IT) security for enterprises dealing with changing business conditions. Any breach of

security operations  Your Security Operations with the Right Technology and Services This white paper discusses the importance of information technology (IT) security for enterprises dealing with changing business conditions. Any breach of security or intrusion into data can be damaging for companies, leading to financial losses and diminished reputation. Most companies today require the implementation of a holistic security program, and a partner who is aware of the most relevant technology and service for their kind Read More...
4 Key Steps to Automate IT Security Compliance
An unprecedented wave of security breaches has led to the establishment of technical standards, IT governance frameworks and laws designed to improve and

security operations  security, compliance, personnel security, security organization, computer operations and management, asset control, and security policy. NIST 800-53 ' This publication from the National Institute of Standards and Technology is a collection of Recommended Security Controls for Federal Information Systems. It describes security controls for use by organizations in protecting their information systems, and recommends that they be employed in conjunction with and as part of a well-defined information Read More...
Outsourcing Security Part 3: Selecting a Managed Security Services Provider
As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security

security operations  to or own any security operations center (SOC) facilities? Are the facilities equipped for redundancy? What other features are in place to ensure robust operations? What are staffing practices? How does the MSSP screen potential employees? How is the staff retained and compensated? Is the MSSP able to hire and retain staff with sufficient skills to support the enterprise? Does the MSSP require and support continued training? How does the MSSP ensure client confidentiality? Is the MSSP business Read More...
Top 5 Security Tips for 2009
In the white paper top 5 security tips for 2009, discover what smaller companies like yours can do to protect themselves from security threats that...

security operations  5 Security Tips for 2009 If you think your business is not at risk, then think again. Internet security is no longer just a concern for large targets such as banks, but is a serious reality many small and mid size companies have to deal with. Faced with the same security challenges, how can smaller organizations manage without the same IT budget or resources ? What can these businesses do to have the same level of protection? In the white paper Top 5 Security Tips for 2009 , discover what smaller Read More...
Facility Operations Maturity Model for Data Centers
An operations & maintenance (O&M) program determines to a large degree how well a data center lives up to its design intent. The comprehensive data center

security operations  Operations Maturity Model for Data Centers An operations & maintenance (O&M) program determines to a large degree how well a data center lives up to its design intent. The comprehensive data center facility operations maturity model (FOMM) presented in this paper is a useful method for determining how effective that program is, what might be lacking, and for benchmarking performance to drive continuous improvement throughout the life cycle of the facility. This understanding enables ongoing Read More...
Security in the Software Development Lifecycle
Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to

security operations  Software Development Lifecycle Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to IBM 's Rational Unified Process environment. It was developed by Secure Software, and gives organizations a structured way to address security concerns during the software development lifecycle. Read More...
Export Operations & Compliance Benchmark Report: Going Global with Regulatory Reform
This second annual benchmark study covers U.S. export operations and compliance. The survey covered export regulatory reform, operations management practices

security operations  Operations & Compliance Benchmark Report: Going Global with Regulatory Reform This second annual benchmark study covers U.S. export operations and compliance. The survey covered export regulatory reform, operations management practices, organizational structure, compliance policies, and export management technology. This year’s study looks at the impact of going global with export control reform. Read More...
Security Stocks Burn Rubber
Security technology stocks are burning rubber as they peel out in front of swaggering technology blue chips. Who are some of these security market leaders and

security operations  Stocks Burn Rubber Security Stocks Burn Rubber L. Taylor - April 27th, 2000 Event Summary On February 9th, there was a fury of Distributed Denial of Service attacks that rocked the cyberworld. In response to this attack, numerous security technology corporations are seeing rapid marketcap growth. Market Impact Internet Security Systems (NASDAQ: ISSX), an Atlanta based Internet security vendor, specializes in providing leading security management solutions for the cyberworld. In January of this Read More...
Vendor Analysis: Interliant's Security Vulnerability Assessment
A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to

security operations  Analysis: Interliant's Security Vulnerability Assessment Vendor Analysis: Interliant's Security Vulnerability Assessment Featured Author -  Laura Taylor - January 14, 2002 Introduction A security vulnerability assessment service is a risk management process. Interliant's security vulnerability assessment service enables its clients to understand what risks their online transaction systems and network infrastructure face. Relevant Technologies has taken an in-depth look at Interliant's security Read More...
Top 5 Mobile Security Threats
While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of

security operations  5 Mobile Security Threats While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks. Read More...
Spire Security
Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise

security operations  Security Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics. Read More...
Security for Small and Medium Businesses
We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the

security operations  We all know what security means when we think of our home. Did we lock the door when we left for the day? Is the stove turned off? Computer security for the small to medium business (SMB) must address similar concerns. Can a hacker gain access to its servers? How can a business protect its data? Entry Points A personal computer virus is a hidden software program that spreads from personal computer to computer. Infection comes from reading an e-mail that has a virus program as an attachment, or from Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others