RSS feed Get our RSS feed

News by Topic

risk data

Results 276 - 300 of 515Sort Results By: Published Date | Title | Company Name
By: Talend     Published Date: Nov 02, 2018
Siloed data sources, duplicate entries, data breach risk—how can you scale data quality for ingestion and transformation at big data volumes? Data and analytics capabilities are firmly at the top of CEOs’ investment priorities. Whether you need to make the case for data quality to your c-level or you are responsible for implementing it, the Definitive Guide to Data Quality can help. Download the Definitive Guide to learn how to: Stop bad data before it enters your system Create systems and workflow to manage clean data ingestion and transformation at scale Make the case for the right data quality tools for business insight
Tags : 
     Talend
By: Talend     Published Date: Nov 02, 2018
Ready to embrace the multi-cloud future? This new TDWI Checklist Report is the cloud primer you’ve been waiting for. The most successful companies are embracing cloud data integration to help them leverage more data. Businesses are increasingly having to learn what data integration is and does as well as increasing their data processing scale and performance at lower cost. This whitepaper demonstrates how to reduce risk and disruption while implementing multi-cloud data integration and self-service data access.
Tags : 
     Talend
By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
     Citrix Systems
By: Druva -AWS     Published Date: Apr 28, 2018
Data Loss Protection for Your SaaS & Cloud Apps SaaS applications like Office 365, G Suite, Box and Salesforce are not necessarily built to deliver a complete solution for data protection. This guide reveals the unforeseen risks of trusting your SaaS application to protect your data.
Tags : 
     Druva -AWS
By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : courion, access risk management, cloud based environment, mobile, data loss prevention, security
     Courion
By: McAfee EMEA     Published Date: Nov 15, 2017
Time has become a critical capability in being able to extract the business value enterprises want from their data and computing infrastructure, as well as to protect the business value that has already been created. In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing an advantage of time can help defenders to reduce their risk, in the fundamental categories of data protection, threat detection and incident response, data center / cloud security, and endpoint security.
Tags : cyber, security, defenders, business value, infrastructure, data, business, protection
     McAfee EMEA
By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy
     SafeData, LLC
By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection
     NetIQ
By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management
     Attachmate
By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp
     CDW Symantec
By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map
     Intralinks
By: RSA     Published Date: Aug 28, 2014
Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Tags : data breach, data access, governance, risk, prevention, security
     RSA
By: Citrix ShareFile     Published Date: Apr 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : data security, financial services, client data protection, security risk
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : data security, data protection, network security, firewall security, it security, technology security
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : data security, data protection, network security, firewall security, it security, technology security, anti virus
     Citrix ShareFile
By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
     Canon Solutions America
By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management
     Mimecast
By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models
     Trillium Software
By: Code42     Published Date: Mar 31, 2017
Today’s enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, you’re expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
     Code42
By: Mainline Information Systems     Published Date: Oct 20, 2009
This white paper will discuss the steps necessary to building a resilient business.
Tags : business continuity, mainline information systems, downtime, data loss, risk assessment, bcd, data protection, backup
     Mainline Information Systems
By: IBM     Published Date: Apr 22, 2008
With their increased processing power, today’s data centers can generate up to 10 times more heat than those built a decade ago. This IBM white paper helps you to understand what’s happening in an overheated system and to see if yours is at risk. It also explains how the IBM Rear Door Heat eXchanger helps to dramatically reduce data center power consumption.
Tags : ibm, ibm opt it, opt it, green, energy, environmental, cooling, datacenter
     IBM
By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities
     IBM
By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoli® storage manager fastback, remote office
     IBM
By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : remote, remote access, remote network, network management, network security, data center, datacenter, data center management
     Axeda Corporation
By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical
     Stratus Technologies
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics