RSS feed Get our RSS feed

News by Topic

protection

Results 201 - 225 of 2221Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Aug 17, 2017
Every cloud security vendor will give you impressive-sounding metrics for cloud security. But what do they really mean?
Tags : cloud, protection, security, security vendor
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 11, 2017
How safe is your customer's sensitive data? Is your organization protected from credential stuffing? Take Akamai's interactive security quiz and discover more about credential stuffing and how to protect your business.
Tags : customer security, credential protection, akamai
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 11, 2017
There are many reasons why bots pose the most complicated threat to your online business - access to pools of IP addresses, ability to stay under the radar, highly persistent. Read what you need to know to stay in the know.
Tags : credential stuffing, ip security, threat protection
     Akamai Technologies
By: Entrust Datacard     Published Date: Sep 28, 2016
This white paper approaches details all of the areas that should be deployed properly and regularly monitored and maintained when deploying SSL/TLS.
Tags : ssl/tls, ssl/tls best practices, secure sockets layer, transport layer security, security, application security, protection
     Entrust Datacard
By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
     Entrust Datacard
By: Dell EMC     Published Date: Jul 05, 2016
Unityís all flash design comes with built-in data protection, cloud-based management, and all inclusive software to deliver the best flash economics Ė price, density, and TCO.
Tags : storage management, performance management, best practices, application integration, technology, business intelligence, flash, storage
     Dell EMC
By: Dell EMC     Published Date: Jul 05, 2016
Unityís hybrid flash design comes with built-in data protection, cloud-based management, and all inclusive software to deliver the best hybrid economics Ė price, density, and TCO.
Tags : storage management, performance management, best practices, application integration, technology, business intelligence, hybrid, storage
     Dell EMC
By: Dell EMC     Published Date: Jul 05, 2016
This report documents hands-on testing of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system
Tags : data management, business practices, data center. data application, enterprise applications, security, performance management
     Dell EMC
By: Dell EMC     Published Date: Jul 05, 2016
EMC Global Data Protection Index 2016 Key Findings and Results Report
Tags : data management, business practices, data center. data application, enterprise applications, business intelligence, security
     Dell EMC
By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. Youíll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : ddos, protection, practices, systems, attackers, applications, systems
     Akamai Technologies
By: Akamai Technologies     Published Date: Nov 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. Youíll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
     Akamai Technologies
By: Sage People     Published Date: Jan 04, 2019
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPRís focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handledóand it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and itís vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world wh
Tags : 
     Sage People
By: Sage EMEA     Published Date: Dec 19, 2018
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPRís focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handledóand it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and itís vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world where 2,
Tags : 
     Sage EMEA
By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls
     Venafi
By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals how Security Operations teams can eliminate these outages.
Tags : security, security operations, outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection
     Venafi
By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Unionís General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their usersí data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, thereís a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the userís expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
     Entrust Datacard
By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
     Verdasys
By: Verdasys     Published Date: Mar 28, 2012
In this whitepaper get the answers to the open gaps left in the WikiLeaks story and learn how you can prevent insider threats that are just as detrimental in your organization.
Tags : information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
     Verdasys
By: VMware     Published Date: Oct 05, 2015
Learn how this city government deployed VMware vCloud Air Disaster Recoveryģ to meet its recovery point objectives and VMware NSXģ to add security layers inside the organization for increased protection. Get your free download of this case study now.
Tags : vmware, vmware vcloud air disaster recovery, vmware nsx, avondale, arizona, data security, data protection, security
     VMware
By: Akamai Technologies     Published Date: Sep 04, 2019
Itís a bold claim; one that hasnít always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, itís that security-related incursions are inevitable. And itís news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, thereís no longer a choice. As a CIO, CISO, or other security or IT leader, you know itís your job to be the central agent stressing the connections between business and digital risk. Itís your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. Thatís up from 40% in 2018. Whether youír
Tags : 
     Akamai Technologies
By: Rubrik EMEA     Published Date: Jan 04, 2019
Rubrik Cloud Data Management is a single, unified software platform to manage your physical, virtual, and cloud data. With Rubrik, enterprises can drastically simplify their data protection processes, automate workflows, and migrate data to the cloud. The results are powerful: faster recoveries, easier management, no forklift upgrades, and hard dollars saved for other projects. Organizations pursuing cloudfirst policies can use Rubrik to archive to the cloud, create cloud DR capabilities, or perform cloud-native backup. And with Rubrikís Polaris SaaS platform, it has never been easier to unify data across data centers and clouds, simplifying operations and governance. DATA
Tags : data, cloud, application, management, software, databases, servers, user
     Rubrik EMEA
By: Rubrik EMEA     Published Date: Jan 04, 2019
Demand for flash storage is surging, but IT organizations are hard-pressed to align their data protection efforts with the realities of todayís infrastructure and application requirements in an increasingly flash-based environment.
Tags : : data, flash, storage, archiving, protection, recovery, workloads, applications
     Rubrik EMEA
By: Rubrik EMEA     Published Date: Apr 15, 2019
Ransomware is not going away. This makes it imperative for businesses across all industries to adopt a data management strategy of multi-layered security, easy automation, and quick recovery. To learn more about Rubrik and how it can ?t into your ransomware protection strategy while simplifying data protection across your entire datacenter, visit www.rubrik.com. As the leading next-generation data protection solution, Rubrik deploys as a plug-and-play appliance in less than an hour and has been adopted across all verticals and organization sizes including Fortune 50 companies.
Tags : data, backup, recovery, backups, solution, security, encryption, cyber
     Rubrik EMEA
By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When todayís incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : data, backup, recovery, virtualization, solutions, cloud, architectures
     Rubrik EMEA
By: VMware     Published Date: Sep 12, 2019
Youíve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a ďmega breach,Ē those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
     VMware
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics