Archives livres blancs

Dernières thématiques:

Le Meilleur des Deux Mondes – Augmentez Votre Agilité Informatique avec une Approche Hybride

Le point commun aux décisions de ce type est que nous nous sentons généralement confrontés à un choix assez étroit entre deux propositions : X ou Y ? Et nous ne sommes pas seuls : les entreprises et leurs services IT ont tenda...

Voir le livre blanc

Next-Generation Anti-Malware Testing

How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? Perhaps you went with something you had ...

Voir le livre électronique

Better Security, Fewer Resources - Cylance Bolsters Endpoint Protection Without PC Performance Impact or Incremental Costs

When you consider the number of headlines that appear on a regular basis about major data breaches — despite ongoing increases in security technology spending by organizations — you have to come to the conclusion that something...

Voir le livre blanc

An Economic Model for Evaluating AI-Driven Endpoint Security ROI

BlackBerry Cylance commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study to examine what return on investment enterprises may realize by deploying CylancePROTECT® and CylanceOPTICSTM. The resulting...

Consulter l'infographie

TIS Sanction Screening - One Tool, Greater Security

Government-imposed embargoes and sanctions on who you can trade with and how, are changing almost daily which poses a great risk to your business. How do you keep up-to-date with which payments and cash transfers are allowed? ...

Voir le livre blanc

RSA Securid - Accelerate Business While Managing Identity Risk

With your organization serving a growing and diverse user population inside and outside of the company, you need to control access to systems, applications and data that exist both on-premises and in the cloud. Cloud, mobile an...

Voir la présentation de solution

RSA NetWitness Orchestrator

In an era of ever-expanding attack surfaces, protecting against threat actors—from commodity malware, insider threats and crimeware to state-sponsored exploits, hacktivists and terrorists—has become an increasingly complex acti...

Voir le livre blanc

3 Fondamentaux Pour Quantifier le Cyber Risque

Gérer le cyber risque est plus impérieux que jamais. Selon “The Global Risks Report 2018” du World Economic Forum, pour la majorité des entreprises les cyber-attaques arrivent en 3ème place du top 10 des risques en termes de pr...

Voir le livre blanc

7 Étapes Pour Établir un Programme GRC de Gestion de Risques

Le programme ou modèle en 7 étapes décrit dans cet eBook utilise une approche de gestion du risque qui suit les directives ISO 31000 et NIST 800-30. Vous pourrez apprécier le risque inhérent à l’information au sein de votre ent...

Voir le livre blanc

The Ransomware Threat: A guide to detecting an attack before it’s too late

Is your organisation prepared for a ransomware attack? Successfully defending your organisation against such an attack takes preparation and an understanding of what to look for if an attack begins. This guide shares the expe...

Voir le livre blanc
S'abonner à notre newsletter
Les actualités les plus incontournables dans votre boîte mail gratuitement