RSS feed Get our RSS feed

News by Topic

risk data

Results 401 - 425 of 553Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : criminal, justice, information, services, cjis, compliance
     MobileIron
By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
     MobileIron
By: MuleSoft     Published Date: May 17, 2016
MuleSoft surveyed 802 IT decision makers (ITDMs) globally to assess how organizations of all sizes are executing on digital transformation initiatives, IT challenges and the role of APIs to meet business goals. The survey results reveal challenges that are hindering IT’s ability to achieve digital transformation fast enough. Just 18% of ITDMs are very confident that they will succeed in meeting this year’s digital transformation goals. IT challenges are not only slowing down their ability to complete digital transformation goals this year, but they are also directly putting business revenue at risk. In fact, 66 percent of ITDMs said that their company’s revenue would be negatively impacted within six months. However, the survey found that IT teams are looking to APIs and reuse of existing applications, data and digital resources to speed up the pace of business.
Tags : mulesoft
     MuleSoft
By: MuleSoft     Published Date: Jun 27, 2019
MuleSoft’s Government Cloud is an industry-leading FedRAMP-compliant cloud environment for building and deploying APIs and integrations with Anypoint Platform. MuleSoft’s US Federal Risk and Authorization Management Program (FedRAMP) compliant-solution enables government agencies to build and secure connections between their applications and citizen data. Download this whitepaper to learn: How MuleSoft’s Government Cloud enables agencies to increase project delivery speed by 3x. Why FedRAMP compliance reduces on-premises infrastructure costs. How government agencies can develop, deploy, manage, and monitor integrations and APIs in the cloud to rapidly expand cloud services.
Tags : 
     MuleSoft
By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
     NAVEX Global
By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
     NAVEX Global
By: NAVEX Global     Published Date: Apr 20, 2018
Discover how organisations similar to your own are developing an effective ethics and compliance programme to improve workplace culture and reduce compliance risk. Our new research will help you identify the most appropriate activities to consider for your own programme, provide the data to help benchmark your results, and the guidance to improve buy-in and programme resources. What you'll learn: How are new regulations changing potential ethics and compliance risks? What challenges do compliance professionals face when trying to improve company culture? How are organisations investing in compliance activities? What results are compliance programmes achieving?
Tags : 
     NAVEX Global
By: NetApp     Published Date: Dec 12, 2013
Read how the NetApp Distributed Content Repository Solution is an efficient and risk-reducing active archive solution. Based on customer data, Forrester created a composite organization and concluded that the NetApp Distributed Content Repository delivered a three year ROI of 47% with a payback period of 1.3 months. The key benefits are reduced risk of losing unregulated archived data, denser storage, storage solution efficiency, and compliance for regulated data. The study also provides readers with a framework to do their own financial impact evaluation.
Tags : forrester, tei, economic impact, netapp, distributed content, repository solution, key benefits, reduce risk
     NetApp
By: NetApp     Published Date: Dec 12, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : netapp, big data, webinar, webcast, unprepared organizations, avalanche of info, business intelligence, alcatel lucent
     NetApp
By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection
     NetIQ
By: NetIQ     Published Date: Nov 01, 2012
This paper discusses the importance of file integrity monitoring, which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches.
Tags : data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance, security
     NetIQ
By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : security and compliance in the cloud
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
This paper contains three simple steps for maintaining visibility and control when moving to the cloud and explains how NetIQ can help with each.
Tags : netiq, cloud infrastructure, cloud computing, security risks, regulations, information security, compliance management, public cloud
     NETIQ
By: Neustar     Published Date: Feb 27, 2013
Consumer phone data is changing every day, from the device to the subscriber which leaves you at risk for violating the TCPA. Neustar Information Services provides you with authoritative phone data to help you mitigate risk and increase efficiency.
Tags : tcpa, compliance, risk, authoritative phone data, auto dialing restrictions, telephone consumer protection act, autodialer violations, b2c
     Neustar
By: Nimble Storage     Published Date: Oct 28, 2013
It’s easy to underestimate the performance and capacity requirements for VDI storage, and missteps now can lead to expensive problems later. In “Risk-Free Storage for VDI,” you’ll learn how Nimble Storage delivers responsive performance to handle peak VDI workloads, integrated data protection, and instant backups and restores—all for dramatically less than you’re paying now.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : byod, okta, mobility, safety, dad, mobility management
     Okta
By: OneLogin     Published Date: Oct 24, 2017
From the information provided in the interviews, Forrester has constructed a Total Economic Impact (TEI) framework for those organizations considering investing in OneLogin. The objective of the framework is to identify the benefits, costs, flexibility, and risk factors that affect the investment decision. Forrester employed four fundamental elements of TEI in modeling OneLogin: benefits, costs, flexibility options, and risks. Forrester took a multistep approach to evaluate the impact that OneLogin can have on the Organization (see Figure 2). Specifically, we: › Interviewed OneLogin marketing, sales, and product management personnel, along with Forrester analysts, to better understand the value proposition for OneLogin. › Conducted an in-depth interview with the Organization’s senior application engineer and its supervisor of IT security to obtain data with respect to costs, benefits, and risks. › Constructed a financial model representative of the interviews using the TEI metho
Tags : 
     OneLogin
By: Optymyze     Published Date: Feb 05, 2018
Do you want to increase visibility across your global business, reduce risk, and boost sales performance? Find out how a Sales Operations Center of Excellence can help you achieve all this and more: • Lower costs by standardizing processes. • Gain more control over operational performance. • Create standards for collecting, storing, and managing data. • Identify which factors determine harmonization, and how it can benefit your entity. • Ensure global compliance through enterprise standards. • Provide expertise and support to boost sales performance across all business units. Get your free copy now!
Tags : sales operations, sales performance, sales performance management, sales processes
     Optymyze
By: Oracle     Published Date: Oct 20, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future
Tags : 
     Oracle
By: Oracle     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: Designed for scale-out and cloud infrastructures SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: Continuously provides real-time results. Processes more complex workload stacks. Optimizes usage of per-core software licenses Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
     Oracle
By: Oracle     Published Date: Oct 20, 2017
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems. Many existing data protection solutions fail to meet the demands of critical databases because they treat them as generic files to copy as opposed to specialized resources. Taking a generic approach to database backup and recovery not only exposes you to the risk of data loss, it also negatively impacts performance and makes it difficult to recover within acceptable timeframes.
Tags : 
     Oracle
By: Oracle     Published Date: Oct 20, 2017
Traditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance
Tags : 
     Oracle
By: Oracle     Published Date: Oct 20, 2017
Backup is one thing, recovery is everything. You no doubt appreciate how mission-critical your Oracle database is to your organization's success. But what if you experience an outage or cyberattack? Can you be confident you can quickly recover all of your data? Traditional backup solutions leave data exposed to loss and your business at risk. Oracle’s Zero Data Loss Recovery Appliance eliminates exposure and saves you time, effort, and the stress of retrieving data. Discover how our customers are recovering their data without the drama.
Tags : 
     Oracle
By: Oracle     Published Date: Nov 28, 2017
Today’s leading-edge organizations differentiate themselves through analytics to further their competitive advantage by extracting value from all their data sources. Other companies are looking to become data-driven through the modernization of their data management deployments. These strategies do include challenges, such as the management of large growing volumes of data. Today’s digital world is already creating data at an explosive rate, and the next wave is on the horizon, driven by the emergence of IoT data sources. The physical data warehouses of the past were great for collecting data from across the enterprise for analysis, but the storage and compute resources needed to support them are not able to keep pace with the explosive growth. In addition, the manual cumbersome task of patch, update, upgrade poses risks to data due to human errors. To reduce risks, costs, complexity, and time to value, many organizations are taking their data warehouses to the cloud. Whether hosted lo
Tags : 
     Oracle
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics