In September 2012, the New York City Board of Health approved
a measure to ban the sale of large sodas and other sugary drinks in
restaurants, movie theaters, sports arenas and street carts in a first
of its kind restriction in the US. At the forefront of this measure
was Mayor Michael Bloomberg. The mayor noted that 6,000
New Yorkers die every year from obesity-related illness. Some
ethnic groups in the city have rates of overweight and obesity
approaching 70 percent of adults. African-American New Yorkers
are three times as likely, and Hispanic New Yorkers twice as likely,
as white New Yorkers to die from diabetes.1
Is this social policy
run amuck? Is it, as some have suggested, an infringement on
individual rights? Or is it simply recognition that health issues
cannot be treated in isolation from the many other factors that
affect an individual’s or a community’s health?
Published By: Mimecast
Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well.
S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each.
In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Published By: Riverbed
Published Date: Jul 21, 2015
This is a riverbed white paper explains how the flexibility and cost benefits of Internet connectivity lead to a hybrid network and provides best practices to overcoming the challenges introduced. This piece focuses on the ability to control such deployments at scale, and covers our application centric approach, covering our network services in depth (app groups, global policy management, QoS, Path selection, etc.)
Compliance is a fast-moving target, and it’s getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards.
Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments.
Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems — along with 450 other versions of Linux and Unix — by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
This Enterprise Strategy Group whitepaper reviews HP 3PAR Storage Adaptive Optimization software -- granular, automated, and policy-based service-level optimization -- and support of solid-state drives (SSDs). Learn how this combination is a thoughtful approach that can deliver significant value.
Since its introduction in 2000, Group Policy has been a hit. Tens of thousands of organizations worldwide use it to create more consistent desktops for their users, to deploy software packages, to secure their computers, and more.
Learn how to successfully extend your deployment of Group Policy to your servers by implementing end-to-end management of this pervasive technology, including advanced offline management and real-time monitoring of authorized and unauthorized changes.
One of the biggest complexities in desktop management is the fact that no organization has a single desktop configuration and need. There should and there is a better way. Download this whitepaper to find out more.
"How to be a Sustainable IT Hero: Building a Business Case for PC Power Management" explains the benefits of implementing a PC Power Management solution, and shows how to avoid the common pitfalls along the way.