RSS feed Get our RSS feed

News by Topic

leakage

Results 26 - 33 of 33Sort Results By: Published Date | Title | Company Name
By: Trend Micro SPN     Published Date: Sep 23, 2009
To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
     Trend Micro SPN
By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
     uberVU via HootSuite
By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
     Utimaco
By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
     Utimaco
By: Utimaco     Published Date: Aug 18, 2008
Better safe than sorry! When outsourcing, keeping an eye on data security right from the planning stage can save your company from nasty surprises. Readers should learn how to protect their confidential data when they exchange information with external partners.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
     Utimaco
By: Utimaco     Published Date: Aug 18, 2008
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Tags : leak, leakage, data protection, encryption, asset management, mobile, laptop security, mobile security
     Utimaco
By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
     Verdasys
By: Verdasys     Published Date: Mar 28, 2012
In this whitepaper get the answers to the open gaps left in the WikiLeaks story and learn how you can prevent insider threats that are just as detrimental in your organization.
Tags : information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
     Verdasys
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics