RSS feed Get our RSS feed

News by Topic

risk data

Results 301 - 325 of 515Sort Results By: Published Date | Title | Company Name
By: Sophos     Published Date: Jul 01, 2013
Whether you’re an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming the rule rather than the exception in today’s workplace. Although BYOD may be a convenience to your employees, you need to think about its impact on corporate security models. This whitepaper explains the risks and rewards of BYOD, and shows you how you can adopt BYOD in your workplace while protecting your data.
Tags : risk, rewards, byod, security
     Sophos
By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
     Lumension
By: CDW     Published Date: Jul 08, 2015
Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.
Tags : security, data protection, dlp, data breach, vulnerability management
     CDW
By: SafeNet     Published Date: Jan 14, 2014
Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure. What are the risks of this virtual security model and how can it go wrong? This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.
Tags : virtual private networks, virtual security, vpn, infrastructure, data, encryption, network, private network
     SafeNet
By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
     NAVEX Global
By: NetApp     Published Date: Dec 12, 2013
Read how the NetApp Distributed Content Repository Solution is an efficient and risk-reducing active archive solution. Based on customer data, Forrester created a composite organization and concluded that the NetApp Distributed Content Repository delivered a three year ROI of 47% with a payback period of 1.3 months. The key benefits are reduced risk of losing unregulated archived data, denser storage, storage solution efficiency, and compliance for regulated data. The study also provides readers with a framework to do their own financial impact evaluation.
Tags : forrester, tei, economic impact, netapp, distributed content, repository solution, key benefits, reduce risk
     NetApp
By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
     Flexera
By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
     Flexera
By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
     HPE Intel
By: Carbonite     Published Date: Feb 22, 2017
Find out how a lack of preparation puts businesses at risk from ransomware—and get expert advice on how to protect your data.
Tags : backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery
     Carbonite
By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
     McAfee
By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
     Rapid7
By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
     Qualys
By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
     Qualys
By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth
     Trend Micro SaaS
By: CradlePoint     Published Date: May 17, 2016
The “consumerization” of healthcare and sweeping policy changes will require that healthcare providers become more competitive or risk being left behind. Gaining the competitive edge means finding scalable efficiencies, leveraging the wealth of available patient data for improved care, and figuring out how to meet (or sometimes treat) patients where they already are—whether that happens to be at work, at the mall, or on the street. While Machine to Machine (M2M) and Internet of Healthcare Things (IoHT) technologies promise to create massive efficiencies and a transformed patient experience, traditional wired connectivity solutions are often costly, difficult to deploy, and don’t offer the flexibility required for effective M2M and IoHT deployments.
Tags : 
     CradlePoint
By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t
     AT&T
By: Mimecast     Published Date: Feb 05, 2010
Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage
     Mimecast
By: GFI Software     Published Date: Feb 24, 2011
This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data.
Tags : gfi software, sunbelt, social networking, security risk, personal information, company data, data protection
     GFI Software
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : trend micro, trend, e-discovery
     Trend Micro, Inc.
By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : ibm, financial, quality, risk, management, cost, reduce costs, effiency
     IBM ILOG.
By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: Schneider Electric     Published Date: Dec 29, 2011
The rapid growth of consumer smartphones and tablets is having a dramatic impact on the enterprise. For employees, it's all about choice and convenience, but for organizations, it introduces new challenges and risks. Companies of all sizes are struggling with an ever-growing array of IT management and security concerns, as more and more business data moves to mobile devices. In this program, we address these concerns and reveal the secrets to unlock the power of mobility with two of the leading experts in the industry.
Tags : 
     Schneider Electric
By: TIBCO     Published Date: May 15, 2013
According to Forrester, most organizations today are only using 12% of their available data and only 37% of organizations are planning some type of big data technology project. At a time when companies are seeing volume of information increase quickly, it’s time to take a step back and look at the impact of big data. Join Mike Gualtieri, Principal Analyst at Forrester, for this webcast exploring the importance of integration in your big data initiatives. Discover how your ability to operate, make decisions, reduce risks and serve customers is inextricably linked to how well you’re able to handle your big data. Continue on to gain insight into: •3 key big data management activities you need to consider •Technologies you need to create for your big data ecosystem •A multi-dimensional view of the customer is the holy grail of individualization •Overcoming key integration challenges And more!
Tags : big data, integration, architecture, database, data warehousing, operations management
     TIBCO
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics