「SECURITY」の検索結果 | 調査のチカラ

分類の限定

登録日の限定

日 以降のデータに限定
日 以前のデータに限定

タグの限定

のタグが付いているデータに限定

会社名の限定

の会社名のデータに限定

  • ソート条件:
  • 表示件数   :
  • 表示項目   :
  • 検索対象   :
  • 注目レベル:
2013年6月19日ガートナーフィードバック数:102セキュリティ/ネットワーク海外

Gartner Says Worldwide Security Market to Grow 8.7 Percent in 2013

...Gartner Says Worldwide Security Market to Grow 8.7 Percent in 2013Analysts Discuss Security Market Trends at Gartner Security & Risk Management Summit 2013, June 10-13 in National Harbor, MD.As companies continue to expand the technologies they use...

2017年5月30日DELLフィードバック数:0セキュリティ/ネットワーク

エンドユーザーセキュリティー調査(Dell End-User Security Survey)

...Dell End-User Security Survey The Dell End-User Security Survey paints a picture of a workforce caught between two imperatives: be as productive and efficient on the job, and maintain the security of company data. To ease the friction between...

2015年2月5日Arxan Technologies★フィードバック数:0セキュリティ/ネットワーク

アプリのセキュリティについてのレポートです。

モバイルアプリのセキュリティの現状(研究報告)

... & BankingAutomotive IoTHealthcare IoTGamingDigital MediaHigh-TechTechnologyArxan Security TechnologyMobile SDKs and WDKsRASPObfuscationWhite-Box CryptographyCryptographic Key ProtectionAPI protectionResourcesDocument Download CenterVideos and WebinarsNewsPress...

2011年5月11日コベリティフィードバック数:0企業情報システム要登録

ソフトウェア品質に関するリスクレポート

...Our approach is grounded in the fundamentals of software security and quality, which we adapt to the unique requirements of each platform, development workflow, or technology. We offer a comprehensive array of managed and professional services...

2014年10月13日BTフィードバック数:0セキュリティ/ネットワーク海外

Risk of security breaches as 69 percent of large US organizations opt for mass market ‘consumer’ cloud services

...Products & SolutionsBest in class security products and consulting services to help you identify and protect what matters the most to your business.IndustryWhy BTWe are proud that our work is recognized time and again by customers, analysts...

2015年1月28日Arbor Networksフィードバック数:0セキュリティ/ネットワーク海外

Worldwide Infrastructure Security Report

...Insight into the Global Threat Arbor Networks 12th Annual Worldwide Infrastructure Security ReportGet a rare view into the most critical security challenges facing today's network operators.DOWNLOAD THE REPORT The trend of significant growth...

2013年9月9日Tripwireフィードバック数:0セキュリティ/ネットワーク海外

STUDY: 64 PCT. OF IT PROFESSIONALS DON’T COMMUNICATE SECURITY RISKS

...Real Risk Reduction Protect against cyberattacks and data breaches with integrated security controls that discover assets, harden configurations, identify vulnerabilities and detect threats. Operational Efficiency Reduce unplanned work and downtime...

2015年9月25日ガートナーフィードバック数:0セキュリティ/ネットワーク海外

Gartner Says Worldwide Information Security Spending Will Grow Almost 4.7 Percent to Reach $75.4 Billion in 2015

...Gartner Says Worldwide Information Security Spending Will Grow Almost 4.7 Percent to Reach $75.4 Billion in 2015Commoditization of Mature Security Technologies Leads Analysts to Reduce Overall ForecastWorldwide spending on information security...

2014年8月19日Thycotic★フィードバック数:0セキュリティ/ネットワーク海外

ハッカーの意識調査です。

What makes today’s hackers tick?

.... security layer to protect against cyber-attacks that target privileged accounts to get at critical information assets in your organization. Learn how Secret Server automates the management and security of your enterprise privileged accounts from a single...

2015年9月15日ソリマチフィードバック数:0大型消費/投資海外

The Most Hackable Cars on the Road

...The Most Hackable Cars on the RoadModern automobiles are becoming more reliant on technology for infotainment, operational, security, and safety features that make up the core functionality of the vehicle. These advances use much of the same...

2015年5月13日NTT Innovation Instituteフィードバック数:0セキュリティ/ネットワーク海外

2015 Global Threat Intelligence Report

...NTT Innovation Institute (NTT I) is pleased to announce the release of the 2015 NTT Global Threat Intelligence Report (GTIR). Once again, NTT i worked together with the NTT Group security companies to analyze the attacks, threats and trends from...

2013年11月4日マイクロソフトフィードバック数:0セキュリティ/ネットワーク海外

New cybersecurity report details risk of running unsupported software

...New cybersecurity report details risk of running unsupported softwarePosted byOn Tuesday, Trustworthy Computing released volume 15 of the Microsoft Security Intelligence Report, which provides threat intelligence and analysis of cyber threats...

2015年9月11日Duo Securityフィードバック数:0セキュリティ/ネットワーク海外

Identifying Bad Apples: Getting to the Core of iOS Vulnerabilities

... or lower, meaning they’re missing out on security patches for over 160 vulnerabilities. Another 14 percent of all iPhones are running a full version behind - iOS 7 or below.All it takes is one vulnerable device accessing your network to put your entire...

Meru Survey of Higher Education IT Leaders Shows WLAN Upgrade Surprising Results

...On July 8th 2015, Meru Networks became part of Fortinet, the global leader in high-performance cyber security solutions. As integration efforts continue we have created a webpage to assist customers find contact information related to Meru Networks...

2014年5月8日マイクロソフトフィードバック数:0セキュリティ/ネットワーク海外

Security trends in financial services -Key findings and recommendations

... The Microsoft DirectX® End-User Runtime provides updates to 9.0c and previous versions of DirectX — the core Windows® technology that drives high-speed multimedia and games on the PC. Microsoft Security Essentials provides real-time protection...

2017年2月26日Accentureフィードバック数:0セキュリティ/ネットワーク

Accenture Security Index: A Majority of Global Organizations Struggle to Identify and Fully Protect Mission Critical Assets from Cyberattacks

...Accenture Security Index: A Majority of Global Organizations Struggle to Identify and Fully Protect Mission Critical Assets from CyberattacksIndex shows poor performance in critical cybersecurity capabilities across 15 countries and 12 industriesNEW...

2015年4月8日ESETフィードバック数:0セキュリティ/ネットワーク海外

インフォグラフィック - パスワードの代替案

...://www.welivesecurity.com/2015/04/01/infographic-alternatives-password/">Infographic: Alternatives to the passwordBY WELIVESECURITY.COM - security news, views and insight from ESET experts...

2014年7月24日トレンドマイクロフィードバック数:0セキュリティ/ネットワーク海外

Survey Says: “What Business Leaders Need to Know about Targeted Attacks”

... is vulnerable to advanced attacks, then security budgets to address the problem will remain limited. As context, a third of respondents to the Harvard Business Review research stated that they are currently being targeted. What’s more, top security concerns...

2016年6月19日IBMフィードバック数:0セキュリティ/ネットワーク海外

IBM & Ponemon Institute Study: Data Breach Costs Rising, Now $4 million per Incident

... Security (NYSE: IBM) today announced the results of a global study analyzing the financial impact of data breaches to a company’s bottom line. Sponsored by IBM and conducted by the Ponemon Institute, the study found that the average cost of a data breach...

2015年12月3日ESETフィードバック数:0マーケティング海外

Different nations’ online banking habits: better safe than sorry?

...Would you bank online without the protection of security software? If your answer is no, then you are in agreement with more than 77% of British internet users who make sure they have a security solution in place when using online financial services...

2013年3月15日Sofos★フィードバック数:117モバイル海外

携帯している端末についての調査です。

INFOGRAPHIC: Users weighed down by multiple gadgets - survey reveals the most carried devices

...Skip to contentINFOGRAPHIC: Users weighed down by multiple gadgets – survey reveals the most carried devicesPost navigationThen the Naked Security team counted up how many devices we each carried around every day… well, it was embarrassingly high.So...

2017年2月6日Strategy Analyticsフィードバック数:0デジタル家電

the Top 10 Smart Home Service Providers in the US

... analysis of US providers of fee-based smart home services such as self-monitoring, notification, automation and energy management services -- apart from or in addition to professionally-monitored interactive security. The Top 10 service providers have...

2016年3月9日MobileIron Inc.フィードバック数:0セキュリティ/ネットワーク

2015年第4四半期モバイルセキュリティ&リスク報告

...50%以上のエンタープライズは不適合なモバイルデバイスを抱えている 2016年2月23日MobileIron 50%以上のエンタープライズは不適合なモバイルデバイスを抱えている 50%以上のエンタープライズは不適合なモバイルデバイスを抱えているAsiaNet 63479 (0216)【マウンテンビュー(米カリフォルニア州)2016年2月23日PR Newswire=共同通信JBN】 *MobileIron Security Labsが初のMobile Security and Risk...

2014年11月26日AV-TEST Instituteフィードバック数:0セキュリティ/ネットワーク海外

Self-Protection for Antivirus Software

...Skip navigation An Internet security suite provides full system protection, employing all available protection technologies. But what about the self-protection of the system protectors? Do they use protection technologies such as DEP and ASLR...

2014年4月4日ESETフィードバック数:0セキュリティ/ネットワーク海外

With just days to go, just how many PCs are still running Windows XP?

...Next Tuesday, April 8 2014, Microsoft will release the last ever security patches for Windows XP.Net Market Share keeps a tally on worldwide operating system and browser usage by measuing the hits on websites and – according to them – Windows XP...

2016年7月4日verizonフィードバック数:0セキュリティ/ネットワーク海外

Verizon 2016 Data Breach Investigations Report

... of confirmed data breaches involve using weak, default or stolen passwords.95 percent of breaches and 86 percent of security incidents fall into nine patternsRansomware attacks increased by 16 percent over 2015 findings.Basic defenses continue to be sorely...

2017年7月22日Gemaltoフィードバック数:0セキュリティ/ネットワーク

Data Security Confidence Index

... lost or stolen in 2016 according to the Gemalto Breach Level Index, the vast majority of IT professionals still believe perimeter security is effective at keeping unauthorized users out of their networks. However, companies are under investing...

2014年4月23日Verizonフィードバック数:0セキュリティ/ネットワーク海外

2014 Data Breach Investigations Report

...RSA roundtable reportWho’s responsible for cybersecurity?At the 2017 RSA Conference in San Francisco, we brought together senior security professionals from every background — including academia, government, law and finance — to discuss the big...

2014年4月23日SafeNetフィードバック数:0セキュリティ/ネットワーク海外

Global Survey Reveals Security Concerns Holding Back Data Center Consolidation and Cloud Migration

... Management IntegrationsHardware Security ModulesGeneral Purpose HSMsPayments HSMsCustomizable HSMsCrypto ManagementAccess ManagementSafeNet Trusted AccessIdentity-as-a-ServiceCloud Identity ManagementCloud SSOAuthenticationAuthentication...

2014年10月16日Impervaフィードバック数:0セキュリティ/ネットワーク海外

Imperva Web Application Attack Report (WAAR) #5

..., verticals, technologies as well as to geographical information.Why WAAR Matters?One of the things that keep us intrigued about the data that we gather, is there’s still tons of data to gather. While many other security vendors and products claim to deal...

2015年7月23日HPフィードバック数:0セキュリティ/ネットワーク海外

HP Study Reveals Smartwatches Vulnerable to Attack

...PALO ALTO, Calif., July 22, 2015 — As part of an ongoing series looking at Internet of Things (IoT) security, HP today unveiled results of an assessment confirming that smartwatches with network and communication functionality represent a new...

2012年2月の調査でマルウェアによる被害者数が推定1,000万人以上に

... and prevention solution. Barracuda Uses AI to Defend Against Spear Phishing and Cyber FraudThere is something to be said for having the right knowledge to avoid a cyber threat. In spite of using relatively little security tools, security professionals...

2015年10月14日University of Cambridgeフィードバック数:0セキュリティ/ネットワーク海外

Security Metrics for the Android Ecosystem

...Security Metrics for the Android EcosystemDaniel R. ThomasAlastair R. BeresfordAndrew RiceComputer LaboratoryUniversity of CambridgeCambridge, United KingdomFirstname.Lastname@cl.cam.ac.ukABSTRACT1.The security of Android depends on the timely...

2014年12月5日Accellionフィードバック数:0モバイル海外

UK Enterprises Unprepared For New Age of ‘Wear Your Own Device

...powered by Study finds that 77 per cent of organisations do not currently consider wearables as part of their mobile security strategyDecember 2, 2014, United Kingdom – Enterprises in the UK are unprepared to deal with the security risks posed...

2017年2月8日blancco technology groupフィードバック数:0セキュリティ/ネットワーク

Delayed Threat Detection & Breach Notifications Intensify Regulatory Challenges of Data Protection

...SolutionsWe’ve been certified, approved and recommended by 18 national and international governing bodies. No other security firm can boast this level of compliance. Delayed Threat Detection & Breach Notifications Intensify Regulatory Challenges...

2016年5月28日check-pointフィードバック数:0セキュリティ/ネットワーク

Threat of Mobile Malware Persists as Attacks Targeting iOS Devices Increase

... of the challenges that security teams need to think about in preventing an attack on their business critical information. Most notably:Researchers found XcodeGhost, a compromised version of the iOS developer platform Xcode, is still an imminent threat to enterprise...

2016年7月19日Sonatypeフィードバック数:0ビジネス海外

2016 State of the Software Supply Chain Report

... percent of downloads (1-in-16 components) include a known security defect.Organizations struggle with vulnerable partsData from 25,000 applications demonstrates that 6.8 percent of components in use had at least one known security defect, revealing...

2016年10月27日ESETフィードバック数:0デジタル家電

At least 15% of home routers are unsecured

... that routers can be attacked fairly easily, by exploiting one of the frequently found vulnerabilities. This makes them an Achilles heel in the overall internet security of households, as well as small businesses.Unfortunately, this has also proven to be true...

2015年8月10日The Channel Companyフィードバック数:0ビジネス海外

The Top 100 Executives Of 2015

... Management continually shaking things up.It was a year that security breaches continued to wreak havoc on companies, putting more security CEOs on CRN's Most Influential list. And for cloud computing titans, it was another year of record sales, putting more...

2015年1月22日ESET★フィードバック数:0セキュリティ/ネットワーク海外

危険なパスワードランキングです。

Weakest, common passwords of 2014 revealed

... of the importance of security, with a number of high profile password leaks pushing the issue up people’s agendas in the last year.That doesn’t change the top two from remaining the same as 2013, though, with the worryingly weak ‘123456’ and ‘password’ occupying...

Infographic: The power game: Thai junta levels up its power

... provinces of the restive Deep South, Yala, Pattani, and Narathiwat, are still under martial law.2. Civilians are still subjected to trial by military courts in cases related to national security, such as possessing or carrying unauthorised or illegal weapons...

2013年12月6日IHSフィードバック数:0製造業/エレクトロニクス海外

Semiconductor Sales Recover in 2013; Micron Surges to Fourth Place in Global Chip Market

... issues, trendsetting topics and other provocative subjects. Read More IHS shows a deep understanding of the industry and the underlying market trends... Johan Jubbega, Senior VP Sales EMEA (Bosch Security Systems) ;Who We AreWe are the leading source...

2016年3月18日Raytheonフィードバック数:0ビジネス海外

Now Hiring: Cyber Defenders Needed

... Security Awareness Month, and to better understand how millennials can help, Raytheon and the National Cyber Security Alliance (NCSA) commissioned the study Securing Our Future: Closing the Cyber Talent Gap, which surveyed young adults ages 18–26 in 12...

2014年11月29日Netcraftフィードバック数:0企業情報システム海外

November 2014 Web Server Survey

... [pdf] last month, which outlines a stringent set of criteria which must be met by registrants of .trust domains. Many of these policies relate to security, dictating both what must and must not be done – the table of contents alone contains 71 instances...

2014年11月14日ガートナーフィードバック数:0製造業/エレクトロニクス海外

Gartner Says 4.9 Billion Connected "Things" Will Be in Use in 2015

... security, information technology security, operational technology security and physical security like never before. Executives now face a decision regarding the future of security in their enterprise and who governs, manages and operates it. Gartner said...

Commitment to Development Index 2015

... States takes 23rd place, with low scores on environment and finance.South Korea comes in last with poor showings in environment, trade, and security.Explore all the results below. Adjust weights to see the effect on scores. Unstack the graph to make...

2016年8月11日KASPERSKY labフィードバック数:0大型消費/投資

Kaspersky Lab International Travel Report: the urge to connect at any cost is putting international travelers’ data at risk

... to leave our digital security at home.Of those surveyed, more than half of respondents (58%) travelled abroad for leisure more than once in the last 12 months. Half (49%) travelled abroad in the past year on business, and a third (32%) have done so more...

2016年2月22日AV-Comparativesフィードバック数:0セキュリティ/ネットワーク

Security Survey 2016

...AV-ComparativesAV-Comparatives is an independent organization offering systematic testing that checks whether security software, such as PC/Mac-based antivirus products and mobile security solutions, lives up to its promises. Using one...

Worst Airports for Sleeping

... Airports for Sleeping: Bergamo Orio al Serio AirportAggressive security or airport police (speaking Italian only) woke us up around 3am and kicks out people to the other part of terminal because of cleaning. Around 4am they 'open' the terminal and sleeping...

2016年8月10日Malwarebytesフィードバック数:0セキュリティ/ネットワーク海外

International Study Finds Nearly 40 Percent of Enterprises Hit By Ransomware in the Last Year

... by Osterman Research to explore ransomware attack frequency, how it works in an enterprise environment, ransom cost, infiltration points, impact, preparedness and more.“Over the last four years, ransomware has evolved into one of the biggest cyber security...

キーワード検索

このページをシェア

  • mixiチェック

「調査のチカラ」は無料で閲覧できる、たくさんの調査データのリンク集です。検索機能も備えていますので、調査データが他のどこよりも簡単に探せます。
インターネットの発展によって、多くの企業が貴重なデータをオンラインに公開してくれるようになりました。それらの”調査のチカラ”を皆さんに活用していただくことで、データを公開してくれている企業にももっと光が当たるようになればうれしいです。
※ご紹介しているデータの利用許諾や購入については提供元ごとに対応が異なります。是非とも各リンク先にてご相談ください。
もう少し詳しい自己紹介ページはこちら
RSS Facebook Twitter メルマガ

日付で探す

新着・日付一覧へ
  2017年10月
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31        
 

お知らせ