RSS feed Get our RSS feed

News by Topic

protection

Results 126 - 150 of 2239Sort Results By: Published Date | Title | Company Name
By: Internet Security Systems     Published Date: Aug 21, 2009
Spyware is but the latest in a long list of Internet threats facing individuals and organizations alike. While it may sound relatively innocuous, spyware is the culmination of years of hacking development by cyber criminals. Spyware does more than just spy; it records and reports back specific information about the computer it infects.
Tags : spyware, information management, information theft, identity theft, data protection, anti spyware, anti-spyware, cybercrime
     Internet Security Systems
By: Splunk     Published Date: Oct 15, 2012
Supporting a Big-data Approach for Security Intelligence
Tags : splunk, security, malware protection, security, it infrastructure, security intelligence
     Splunk
By: SafeNet     Published Date: Jun 03, 2013
To learn more about the current state of the data braech epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : data breach, it security, data security, data protection
     SafeNet
By: RSA     Published Date: Sep 19, 2017
The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.
Tags : gdpr, data protection, rsa, rsa security, personal data, privacy
     RSA
By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
     CrowdStrike
By: Imation Scalable Storage     Published Date: Apr 06, 2012
Learn why an Imation RDX solution is the perfect scalable solution for SMBs with limited resources.
Tags : smb, data protection, imation, tiering, data, recovery, scalable, scalable storage
     Imation Scalable Storage
By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
     Splunk
By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : malware prevention, endpoint security, levels of risk, threats, cloud-driven protection, security
     Webroot Inc
By: Oracle Corporation     Published Date: Apr 01, 2013
Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.
Tags : database, oracle, storage, data, data warehousing
     Oracle Corporation
By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : endpoint security, endpoint protection, it security, malware solutions, malware, malware protection, security
     Webroot
By: Blue Coat Systems     Published Date: Mar 23, 2012
Organizations must be able to extend the boundaries of their corporate network to provide consistent Web security protection, policies and reporting for all users on any device or network.
Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
     Blue Coat Systems
By: Intel Security     Published Date: Oct 20, 2015
Success of an effective threat defense strategy.
Tags : malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
     Intel Security
By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : mimecast, data breach, personalized emails, network defenses, cyber threats, fraud protection, email security, security threats
     Mimecast
By: Infosys     Published Date: May 21, 2018
Our client offered electronic money transfer services. For years they had provided the digital links and the networks of agents that enabled people to send money quickly and easily around the world. But digital technology introduced a number of challenges to their business. Not only were pure digital payment companies threatening the agent-based model, but their business models had lower operating costs than a network of physical agents. Also, other technologies such as virtual money transfer via blockchain were being more widely adopted. In addition, industry mergers strengthened competitors, while increased protectionism began to reduce the number of migrant workers - the core customers of our client. The digital world was looking like a difficult place to operate in.
Tags : money, transfer, digital, technology, business
     Infosys
By: IBM     Published Date: May 09, 2017
Increasing shareholder value is a top priority for all businesses. However, financial results don't improve by themselves. Companies must first delight their most important stakeholder: customers. This document outlines how Best-in-Class firms use efficient content processes to achieve higher levels of customer centricity.
Tags : financial services, financial security, data security, cloud security, network security, business protection
     IBM
By: Acronis     Published Date: Dec 28, 2011
This Analyst Insight by the Aberdeen Group highlights the rise of virtualization and then discusses what leading organizations can do to adjust their data protection and recovery practices to take advantage of this major change.
Tags : virtualization, data backup, data recovery, virtual backup, virtualization software, data deduplication, server virtualization, server migration
     Acronis
By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach
     Varonis
By: Varonis     Published Date: Feb 05, 2014
Accelerate Data Protection with Context Awareness
Tags : varonis, data, data protection, context awareness, sensitive data, corporate network, data breach
     Varonis
By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to today’s security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365—relieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
     Microsoft Office 365
By: Symantec     Published Date: May 02, 2014
Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization.
Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, data protection, loss data, virtual environment
     Symantec
By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
     Entrust Datacard
By: Hewlett Packard Enterprise     Published Date: Feb 05, 2018
As businesses plunge into the digital future, no asset will have a greater impact on success than data. The ability to collect, harness, analyze, protect, and manage data will determine which businesses disrupt their industries, and which are disrupted; which businesses thrive, and which disappear. But traditional storage solutions are not designed to optimally handle such a critical business asset. Instead, businesses need to adopt an all-flash data center. In their new role as strategic business enablers, IT leaders have the responsibility to ensure that their businesses are protected, by investing in flexible, future-proof flash storage solutions. The right flash solution can deliver on critical business needs for agility, rapid growth, speed-to-market, data protection, application performance, and cost-effectiveness—while minimizing the maintenance and administration burden.
Tags : data, storage, decision makers, hpe
     Hewlett Packard Enterprise
By: HPE APAC     Published Date: Feb 24, 2017
In this white paper, we will examine the storage challenges faced by businesses. We consider the case for the allflash data center, discuss the importance of a flash-optimized data protection strategy, and provide tips for gaining support from business leaders for your vision.
Tags : flash storage, storage, sata protection, data protection strategy, data center, allflash, best practices
     HPE APAC
By: Juniper Networks     Published Date: Aug 03, 2017
Keeping the pace of a data-driven economy means having an infrastructure that can scale with it. Research from Nemertes explains how the transformation happens.
Tags : data security, network protection, infrastructure improvement, business transformation, data driven business
     Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics