RSS feed Get our RSS feed

News by Topic

risk data

Results 426 - 450 of 525Sort Results By: Published Date | Title | Company Name
By: Privacera     Published Date: Oct 23, 2017
Trends indicate that every company should embrace big data and analytics – there’s clearly incredible opportunity for enterprises to derive value from data. But not all companies are clamoring to jump on board with building teams and defining initiatives. The reality is enterprises are analyzing only 0.5% of their data, according to recent study by MIT Technology Review. What’s holding these companies back? This paper will cover the categories of risk and some of the constraints at play, as well as five recommendations to managing and mitigating that risk.
Tags : 
     Privacera
By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
     Procore
By: Pure Storage     Published Date: Jul 03, 2019
Financial services businesses face unprecedented market challenges. Disruption from Fintech firms, increased local and international regulation, geo- political upheavals and wavering customer loyalty. The need to fully understand the market, to innovate, to reduce costs and be more competitive has never been greater, and this is where AI can help. According to one fintech research company, by 2030 the financial services sector could reduce operational costs using AI, by as much as 22%. It suggests that will equate to around $1 trillion in efficiencies. So, from a purely operational point of view, doing nothing is not really an option for companies that want to remain competitive. Today, financial services firms across the board need to rejuvenate customer experience to protect against client attrition, and protect those customers against risk. While data analysis and visualization are key to making sense of data, the fundamental challenge for all businesses is building an infrastructur
Tags : 
     Pure Storage
By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring
     Q1 Labs
By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : it security, information ecosystems, data-centric security, identity management, security
     Qualys
By: Qualys     Published Date: Jun 02, 2015
In this guide, Qualys describes internal risks to IT security and three best practices to control incorrect configurations. Critical components to this include automation of assessments and prioritization of risks. By using the automation technology in Qualys Policy Compliance, organizations can ensure the safety of sensitive data and IT while meeting mandates for compliance.
Tags : security gap, automated configuration assessment, it security, compliance, security
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
     Qualys
By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
     Qualys
By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : security, data security, file share security, sharepoint, file servers, netapp
     Quest Software
By: Quick Base     Published Date: Dec 18, 2017
This eBook reveals how spreadsheets come with hidden risks and costs – and how cost-effective, cloud-based, and customizable no-code databases present a better alternative. Based on a study of 700+ business, operations, and IT professionals, this eBook will help you to improve productivity, enhance decision-making, and centralize data.
Tags : 
     Quick Base
By: Quocirca     Published Date: Dec 02, 2008
The need to share information has never been greater as cross-organizational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organizations, carries more and more risk as regulations are tightened around data protection and personal privacy.
Tags : quocirca, content security, aep networks, clearswift, symantec, trend micro, websense, smtp
     Quocirca
By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
     Quocirca
By: Rackspace     Published Date: Nov 24, 2015
Security is persistently top of mind for IT and business leaders because there is so much at stake. Can vendors help your organization take the topic of security from a challenge to a champion?
Tags : digital security, it security, data security, security risks, hosting, hosting providers, data services, big data
     Rackspace
By: Rackspace     Published Date: Apr 15, 2019
Scale events — like online sales and digital product launches — present great revenue opportunities, but they also present large risks to your business. Whether you are a retailer preparing for Black Friday and Cyber Monday, or a digital vendor launching a new service, your brand is both at its most visible and its most vulnerable during these scale events. Many more customers visit your site over a short period of time, raising the potential for resource constraints and discovery of software bugs. Information about issues spreads quickly via social media and news outlets. And, your customers typically spend more per transaction, so every lost order has a greater negative impact on your bottom line. Site reliability engineering (SRE) can help you better prepare for scale events through an iterative cycle of data-driven improvement.
Tags : 
     Rackspace
By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
     Rackspace
By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
     Rapid7
By: Riverbed     Published Date: May 18, 2012
Consolidating IT infrastructures is a continuing trend, particularly in an uncertain economy with organizations looking to reduce costs. Broader consolidation requires overcoming complexity, distance, latency, and silos; but a well-planned and executed consolidation approach can extend beyond cost savings to include improved risk mitigation and efficiently. Download and learn to maximize the data center of the future and consolidate without compromise.
Tags : cio, it infrastructure, application delivery controllers, adc, virtualization, application-aware network
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
Nobody can afford to lose data. But managing the backup and recovery of data and services in far-flung locations can present many logistical and technology challenges that add complexity, expense, and risk. A new branch converged infrastructure approach allows IT to project virtual servers and data to the edge, providing for local access and performance while data is actually stored in centralized data centers. IT can now protect data centrally and restore branch operations in a matter of minutes versus days.
Tags : branch office, data services, data recovery, centralized data centers
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.
Tags : consolidation, servers, remote, storage, isolated islands, efficiency, security
     Riverbed
By: Riverbed     Published Date: Sep 05, 2014
Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach is costly and places data at risk. However, a new branch converged infrastructure architecture allows IT to consolidate in the branch office to minimize the IT footprint needed to run branch applications-all the while centralizing remote servers and data in the data center.
Tags : branch, infrastructure, lower costs, consolidation, servers, data center, it footprint
     Riverbed
By: Riverbed     Published Date: Feb 26, 2015
Nobody can afford to lose data. But managing data, including backup and availability, in locations can present many logistical and technological challenges that bring complexity, expense, and risk. It doesn’t have to be that way, though. A new branch converged infrastructure approach allows organizations to project virtual servers and data to remote offices, providing for local access and performance while storing the data in centralized data centers. Enterprises can now do business across the globe in any location without putting data at risk.
Tags : data center, lose data, infrastructure, data backup, infrastructure
     Riverbed
By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As organizations consolidate backup and disaster recovery operations, WAN optimization plays a key role in mitigating risk without sacrificing performance. Discover a new architectural approach that extends the virtual edge of the data center to the branch for complete server and data consolidation without a performance compromise.
Tags : wan, cloud based computing, idc, optimization, performance, data center, data consolidation, servers
     Riverbed Technology, Inc.
By: Riverbed Technology, Inc.     Published Date: May 27, 2014
Data in branch and remote offices is subject to a variety of threats. Data centers are built to secure data, but remote offices lack the same level defenses. It’s now possible to eliminate the risks of branch office IT, consolidating servers and storage into the datacenter without sacrificing the benefits of having servers at the edge close to users.
Tags : datacenter, data security, consolidating servers, consolidating storage, data defense, enterprise expansion, edge close to users, riverbed
     Riverbed Technology, Inc.
By: RSA     Published Date: Aug 28, 2014
Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Tags : data breach, data access, governance, risk, prevention, security
     RSA
By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy
     SafeData, LLC
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics