Архив проектных документов

Новейшие темы:

TIS Sanction Screening - One Tool, Greater Security

Government-imposed embargoes and sanctions on who you can trade with and how, are changing almost daily which poses a great risk to your business. How do you keep up-to-date with which payments and cash transfers are allowed? ...

Смотреть проектный документ

Understanding the Causes and Consequences of Occupational Hearing Loss

Noise Induced Hearing Loss (NIHL) is the most commonly reported occupational disease. In the EU approximately 52 million people report having hearing loss. Despite being avoidable in most cases, NIHL is expected to become even ...

Смотреть проектный документ

RSA Securid - Accelerate Business While Managing Identity Risk

With your organization serving a growing and diverse user population inside and outside of the company, you need to control access to systems, applications and data that exist both on-premises and in the cloud. Cloud, mobile an...

Смотреть краткое описание решения

RSA NetWitness Platform

The RSA NetWitness Platform, including the evolved SIEM and threat defense offerings, is the only platform uniquely capable of delivering pervasive visibility across logs, network and endpoints.

Смотреть инфографику

RSA NetWitness Orchestrator

In an era of ever-expanding attack surfaces, protecting against threat actors—from commodity malware, insider threats and crimeware to state-sponsored exploits, hacktivists and terrorists—has become an increasingly complex acti...

Смотреть проектный документ

The Ransomware Threat: A guide to detecting an attack before it’s too late

Is your organisation prepared for a ransomware attack? Successfully defending your organisation against such an attack takes preparation and an understanding of what to look for if an attack begins. This guide shares the expe...

Смотреть проектный документ

Gartner Guide: Market Guide for User and Entity Behavior Analytics

Security and risk management leaders considering UEBA (User and Entity Behavior Analytics) will find that the market has fragmented, with a few pure-play vendors and a wide set of traditional security products that embed core U...

Смотреть проектный документ

CISOs Investigate: User Behaviour Analytics

UBA will likely be one of the more valuable additions to the technology stack. Security leaders can learn a lot and potentially apply technologies and processes from other functional areas. UBA is a derivative of other useful b...

Смотреть проектный документ

Employing Machine Learning in a Security Environment: A data science-driven approach

No matter where you look in the security world today, you’ll see the terms machine learning and artificial intelligence (AI). There’s been a great deal of interest in machine learning and AI as security vendors and their custom...

Смотреть проектный документ

Transparency, centralisation and management of international transactions

Today we see many CFOs are making progress towards creating a technology-enabled finance function, but much work lies ahead. Too many companies still rely on outdated data for key decision-making and experience challenges of co...

Смотреть проектный документ
Регистрируйтесь для получения нашей рассылки
Самые важные новости бесплатно по электронной почте