Skip to main content
 

national security

Results 26 - 45 of 45Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. Each year, it attracts more than 8.2 million visitors on site and stages more than 2,000 performances attended by over 1.5 million people. Since opening its doors in 1973, the Opera House has become the symbol of modern Australia and the country’s premier tourist destination, with an iconic national-identity value that Deloitte Access Economics has estimated at $4.6 billion. On the Opera House’s 40th anniversary, it embarked on a Decade of Renewal, a series of projects to prepare the Opera House for future generations of artists, audiences, and visitors. Because renewal isn’t just about the building and the arts; it’s also about renewing technology and systems. This enabled the Opera House to engage VMtech and BlackBerry Cylance to modernize its IT server and network infrastructure, as well as information management, privacy, and cybersecurity.
Tags : 
    
BlackBerry Cylance
Published By: Appistry     Published Date: Oct 11, 2007
Organizations serving the intelligence & defense community rely on the performance of their applications for more than revenue - national security depends upon those applications for mission-critical operations. This industry profile details how Appistry provides the reliability and performance demanded by intelligence & defense organizations.
Tags : 
application fabric, performance computing, application performance, grid computing, infrastructure, appistry
    
Appistry
Published By: Qualys     Published Date: Nov 16, 2012
This whitepaper discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smalles to multinational enterpries, to put trust back into the security equation.
Tags : 
cloud based services, security, it security, data breach, ssl, ssl governance
    
Qualys
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
Defense and intelligence agencies want to leverage the data they collect so they can use artificial intelligence to enhance readiness – but most who run these programs don’t know how to get started and find it difficult to make the business case to their leadership. In this research report, created by GovLoop in partnership with IBM, which provides innovative technology solutions for national security and military intelligence, you’re going to learn where your peers stand—and some practical tips on how to get started—even if you think your data is “dirty” or not ready for advanced applications.
Tags : 
    
Group M_IBM Q2'19
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security
    
IBM MaaS360
Published By: Cisco     Published Date: Dec 21, 2016
To better understand the benefits, costs, and risks associated with Cisco TrustSec, Forrester interviewed two companies. Company A is an organization that provides senior housing for over 22,000 residents in the US. This organization used Cisco TrustSec to provide highly secure segmented mobile network services to its residents. Company B is an international packaging and paper group company experiencing rapid growth. It used Cisco TrustSec as an innovative solution to quickly integrate the infrastructure of new acquisitions into its own and standardize security architecture across its wide area network (WAN) globally. While the case study will talk about the experiences of these two companies, the financial analysis focuses on the impact that Cisco TrustSec had on one organization.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
It’s possible to lead the world in an industry—medicine in this case—and to simultaneously lag behind when it comes to network security. One large national hospital system faced serious IT challenges. Network investment had been put off to the point of opening critical security vulnerabilities. A massive attack surface and limited visibility meant a threat could penetrate the network and remain hidden for months. It put critical systems, employees, patients, and the hospital’s reputation at risk.
Tags : 
    
Cisco
Published By: Thawte     Published Date: Jan 19, 2016
Download this visual reference guide to see why a highly reputable certificate authority like Thawte, the original international specialist in online security, gives you the credibility that your customers are looking for when assessing your website, no matter what sort of SSL certificate you choose.
Tags : 
    
Thawte
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics
    
Technolytics
Published By: SAS     Published Date: Apr 16, 2015
We often hear about how the massive volumes of data the US government collects hold a treasure trove of answers to our most challenging questions – be it on population health, national security, education or how to recoup losses from tax fraud. If only the government could figure out how to make use of all that information. Texas is one example of a government that is using analytics to solve complex problems. As the case studies here demonstrate, agencies and academia in the Lone Star State are putting big data and analytics to work to eliminate waste, improve productivity and, in some cases, even enhance transparency.
Tags : 
    
SAS
Published By: IBM     Published Date: Jan 09, 2014
This management brief discusses the value proposition for the Case for IBM PureFlex System for Cloud-Enabled SAP Enterprise Environments.
Tags : 
sap, international technology, application serving, system manager, vmware, nodes chassis, netweaver landscape, integrated systems, pureflex system, platform infrastructure, system security, ibm pureflex
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
To better understand the benefits, costs, and risks associated with Cisco TrustSec, Forrester interviewed two companies. Company A is an organization that provides senior housing for over 22,000 residents in the US. This organization used Cisco TrustSec to provide highly secure segmented mobile network services to its residents. Company B is an international packaging and paper group company experiencing rapid growth. It used Cisco TrustSec as an innovative solution to quickly integrate the infrastructure of new acquisitions into its own and standardize security architecture across its wide area network (WAN) globally. While the case study will talk about the experiences of these two companies, the financial analysis focuses on the impact that Cisco TrustSec had on one organization.
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
insights, mobile, security, byod, lookout
    
Lookout
Published By: UPS Capital     Published Date: Feb 13, 2019
Transportation risk comes in many forms and can be very hard, if not impossible, to predict. These include extreme weather, theft, hijacked trailers, global crises, cargo lost at sea, catastrophic truck or rail accidents, truck fires and a whole lot more. In 2014, the University of Tennessee Global Supply Chain Institute published a white paper titled Managing Risk in the Global Supply Chain. The most surprising finding in the research was that even though 100% of supply chain executives acknowledged insurance as a highly effective risk mitigation tool, it was simply not on their radar screen, nor in their purview. Yet, the National Cargo Security Council estimates that there is an annual global financial impact from cargo loss of $50 billion.
Tags : 
    
UPS Capital
Published By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
    
Darktrace
Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.