RSS feed Get our RSS feed

News by Topic

risk data

Results 101 - 125 of 528Sort Results By: Published Date | Title | Company Name
By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : courion, access risk management, cloud based environment, mobile, data loss prevention, security
     Courion
By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to healthcare and other networks, and how to protect against them. As we are expected to host more and more key information on our network, we increase our risk at risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to hospitality networks, and how to protect against them. As we are expected to host more information on our network, we increase our risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data. Customers expect to be able do everything online, and won’t tolerate any interruption in service. This expectation inhibit a situation where an attacker is holds your web services hostage, and you have to choose between paying them off or apologizing to a lot of angry customers.
Tags : 
     Cox Business
By: CradlePoint     Published Date: Sep 04, 2014
Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
Tags : security risks, crisis communications, security breaches, compromising customer data, security
     CradlePoint
By: CradlePoint     Published Date: Sep 30, 2014
While short outages are common, longer service disruptions – due to weather, human error or even squirrels – can be catastrophic, paralyzing business operations. Your organization can feel the consequences long after the connection has been repaired. This white paper explores the benefits of using 4G LTE as a back up solution to maximize revenue and minimize business risk downtime can have on your brand. You’ll learn how a 4G wireless solution has benefits over wired backup solutions for business continuity. Please download the whitepaper to learn more!
Tags : failover, security risks, crisis communications, security breaches, compromising customer data, security
     CradlePoint
By: CradlePoint     Published Date: May 17, 2016
The “consumerization” of healthcare and sweeping policy changes will require that healthcare providers become more competitive or risk being left behind. Gaining the competitive edge means finding scalable efficiencies, leveraging the wealth of available patient data for improved care, and figuring out how to meet (or sometimes treat) patients where they already are—whether that happens to be at work, at the mall, or on the street. While Machine to Machine (M2M) and Internet of Healthcare Things (IoHT) technologies promise to create massive efficiencies and a transformed patient experience, traditional wired connectivity solutions are often costly, difficult to deploy, and don’t offer the flexibility required for effective M2M and IoHT deployments.
Tags : 
     CradlePoint
By: Damballa     Published Date: Oct 03, 2014
The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence
Tags : damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
     Damballa
By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
     Darktrace
By: DataCore     Published Date: Jun 06, 2019
More than 54% of companies have experienced a downtime event that lasted more than 8 hours – one full work day – in the past 5 years. And the risk of major disruptions to business continuity practices looms ever larger – primarily due to the troubling dependencies on the location, topology and suppliers of data storage. Download this infographic and see how you can preserve proven Business Continuity practices despite inevitable changes to your data storage infrastructure.
Tags : business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability
     DataCore
By: DataCore     Published Date: Jun 06, 2019
Nothing in Business Continuity circles ranks higher in importance than risk reduction. Yet the risk of major disruptions to business continuity practices looms ever larger today, mostly due to the troubling dependencies on the location, topology and suppliers of data storage. Get insights on how to avoid spending time and money reinventing BC/DR plans every time your storage infrastructure changes.
Tags : business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability
     DataCore
By: Datamatics     Published Date: Mar 02, 2011
Are you looking for a time and attendance system which maximizes workforce productivity while minimizing compliance risk? Sign up today and receive a no-obligation personalized demo from Datamatics, leaders in labor management automation since 1966.
Tags : datamatics, time, attendance, payroll costs, risk, compliance
     Datamatics
By: Datto Inc.     Published Date: Feb 05, 2013
In this white paper Datto explores the different types of risk in IT infrastructure and the ways intelligent business continuity can best mitigate that risk.
Tags : backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
     Datto Inc.
By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : security risks, byod, cyber attacks, byod policies
     Dell
By: Dell     Published Date: Aug 08, 2018
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
     Dell
By: Dell     Published Date: Oct 24, 2014
Today's business environments are very different to those of 10 years ago. Windows Server 2003 has been a trusted friend for over a decade, but there are better ways to deliver against today's business expectations and technical possibilities. Download this paper to better understand the risks of ignoring the end of support and to discover the advantages of migrating to a modern data center platform.
Tags : virtualization, it security, platform support, platform migration
     Dell
By: Dell     Published Date: Jul 08, 2016
Organizations looking to implement desktop and app virtualization traditionally play a guessing game where storage is concerned. When considering local and physical storage, determining what would be necessary for the virtualized world is difficult and can be overwhelming. This is especially true when determining how virtualizing desktops will impact the storage architecture. Organizations risk over sizing their environment thereby wasting CapEx, or under-sizing and potentially ruining the user experience. Software-defined storage solutions, such as VMware Virtual SAN, provide simplified solutions with high performance data stores that offer fine-grained scalability with linearly-predictable performance as demand grows. Dell’s validated and certified desktop virtualization solutions incorporate vSphere and Virtual SAN, and provide a complete end-to-end solution that allows companies to grow and expand without large capital investments in SAN hardware.
Tags : technology, best practices, data, virtualization, storage, data
     Dell
By: Dell & Microsoft     Published Date: Jul 10, 2013
This guide will examine major business risks associated with traditional data protection approaches, particularly with regard to their applicability for a hybrid, virtual + physical data center. It will redefine the business goals and drivers for data protection, and consider alternative approaches that better meet those goals.
Tags : data protection, virtual data center, physical data center, hybrid
     Dell & Microsoft
By: Dell EMC     Published Date: Aug 22, 2017
Identifying the benefits, costs, and risks associated with an Isilon implementation, Forrester interviewed several customers with experience using Isilon. Dell EMC Isilon is a scale-out NAS platform that enables organizations to store, manage, and analyze unstructured data. Isilon clusters are composed of different node types that can scale up to 68 petabytes (PB) in a single cluster while maintaining management simplicity. Isilon clusters can also scale to edge locations and the cloud
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Feb 14, 2019
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article from Dell and Intel® to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
     Dell EMC
By: Dell EMC & Intel     Published Date: Sep 06, 2018
For organisations that aim to modernise their IT environments and limit operational risks that can incur costs, IDC recommends making data protection initiatives a top priority. Modernise data protection to cut IT costs and advance IT Transformation. Modern data protection enables organisations to shrink data backup and recovery windows , which means fewer security breaches and faster resolutions when they do happen. To truly transform IT, modernise your data center to increase IT efficiency and shed technical debt while protecting your bottom line. Drive IT Transformation and results with leading enterprise solutions from Dell EMC powered by Intel®.
Tags : 
     Dell EMC & Intel
By: Dell EMC EMEA     Published Date: May 08, 2019
Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: - Best device experience - Unified endpoint management - Enterprise collaboration The purpose of this study is to provide readers with a framework to evaluate the potential impact of these Workforce Enablement Solutions on their organizations.To better understand the benefits, costs,and risks associated with investment in these solutions, Forrester interviewed eight large enterprise customers with years of experience using Workforce Enablement Solutions—this data was supplemented by a survey of over 700 organizations. Download this whitepaper to find out more.
Tags : 
     Dell EMC EMEA
By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : hipaa, compliant, data, center, centers, healthcare, providers, assure
     Dell Storage
By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : pci, compliant, data, centers, engagement, connect, ecommerce, compliance
     Dell Storage
By: Dell-EUC (Dell/Intel Logo) Webinar     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC Lifecycle as a Service (PCaaS) will transform your company’s approach to IT infrastructure. We have identified three distinct employee personas representative of a modern workforce. Each persona has specific hardware needs. With remote work becoming an everyday aspect of modern business, the risks of critical data becoming compromised has increased dramatically. Loss of data can be crippling, resulting in loss of business, damaged reputation and even punitive fines. Intel Inside®. Intel i?lemciler ile daha yüksek verimlilik. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell-EUC (Dell/Intel Logo) Webinar
By: Delphix     Published Date: Apr 14, 2015
Cloud deployments are rapidly becoming essential for both small-to-medium-size businesses and large, established organizations. Delphix can help organizations accelerate their cloud migrations and operate more efficiently in cloud environments with increased data security and lower costs.
Tags : 
     Delphix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics