data security

Results 601 - 625 of 1853Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Dec 27, 2018
Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your agency and the primary source of security breaches driving cyber risk to all-time highs.
Tags : 
    
Forcepoint
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
Trust can be viewed as a key factor amongst clients and service providers working together towards preparing for readiness with the EU General Data Protection Regulation (GDPR). These stringent regulations come into force in May 2018 to ensure that personal data is processed adhering to strict privacy and security requirements.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Nov 13, 2018
Since data encryption is a core piece of any security strategy, start by talking with your CIO. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Nov 13, 2018
The financial industry is experiencing a significant challenge when it comes to maintaining and establishing trust in its relationships with clients. Customers battered by the constant barrage of publicized data incursions and security breaches are highly sensitized to those signs in their own dealings. They find it difficult to accept any disruption in either their business or their personal financial activities and are easily frightened away from organizations that they perceive as risky.
Tags : 
    
Group M_IBM Q418
Published By: OracleSMB     Published Date: Jan 04, 2018
Compliance and risk management issues affect small and medium-sized businesses. They are not just a concern for larger, public companies, but smaller companies have fewer resources to deal with the regulatory demands that affect them. Instead of hiring expensive external resources to ensure compliance, invest in financial compliance cloud technology to continuously monitor and provide feedback on your compliance efforts. It will lower long-term costs, improve collaboration, and increase confidence in data security and financial reports.
Tags : 
    
OracleSMB
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Jan 18, 2019
Since data encryption is a core piece of any security strategy, start by talking with your CIO. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position.
Tags : 
    
Group M_IBM Q119
Published By: Blue Coat     Published Date: Nov 23, 2015
It’s time for Proactive Incident Response: *Full logs in the SIEM, plus complete collection of packet data *Packet data indexed, easily searchable and correlated with threat intelligence and other data. Working with multiple sources of security data, threats are detected early.
Tags : 
    
Blue Coat
Published By: Centrify     Published Date: May 26, 2016
This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.
Tags : 
data security, security, cyber attacks, threat and vulnerability management
    
Centrify
Published By: MarkLogic     Published Date: Nov 07, 2017
Business demands a single view of data, and IT strains to cobble together data from multiple data stores to present that view. Multi-model databases, however, can help you integrate data from multiple sources and formats in a simplified way. This eBook explains how organizations use multi-model databases to reduce complexity, save money, lessen risk, and shorten time to value, and includes practical examples. Read this eBook to discover how to: Get unified views across disparate data models and formats within a single database Learn how multi-model databases leverage the inherent structure of data being stored Load as is and harmonize unstructured and semi-structured data Provide agility in data access and delivery through APIs, interfaces, and indexes Learn how to scale a multi-model database, and provide ACID capabilities and security Examine how a multi-model database would fit into your existing architecture
Tags : 
    
MarkLogic
Published By: Diligent     Published Date: Jul 10, 2017
You may already know what a board portal is. You Probably know that paper is heavy and hackers are a risk, and by now, you know there are multiple vendors that offer board portals. You may not realize that by making the right choice, a board can improve governance and efficiency while collaborating in a secure setting. With lots of vendors to choose from, here are the most important questions to ask during your search, divided into the five essential categories. For private, public, non profit and government boards alike, finding an app that excels across all five categories will lead to better electronic security and a more productive board.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
Diligent
Published By: Qualys     Published Date: Jun 02, 2015
Health care is often considered a lucrative business for those involved in waste, fraud and abuse. Today’s ever-accelerating technology changes make data related to health care, medical and financial issues even more attractive (and profitable) to cybercriminals who sell medical identities and siphon money from stolen financial records. Risks are exponentially increased because of organizations’ reliance on electronic systems for mission-critical functions. According to 61% of respondents to the SANS 2014 State of Cybersecurity in Health Care Organizations survey, medical/health record systems are considered the most at-risk information asset among the 224 health care-related organizations represented in the survey.
Tags : 
health care, state of cyber security, increase risks, improved practices, sans, security
    
Qualys
Published By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : 
data protection, clearswift, data management
    
Clearswift
Published By: BMC ESM     Published Date: Aug 20, 2009
Automating your data center can improve operational efficiency and give you control over service quality, security, and business agility, while simultaneously reducing risk and costs.
Tags : 
data center, operational efficiency, service, security, business agility, automation, bmc, esm, virtualization, it infrastructure, it management, enterprise applications
    
BMC ESM
Published By: NetIQ     Published Date: Oct 25, 2012
An organization that excels at automating, standardizing and monitoring its systems and access controls can comply not only with PCI DSS, but with many other state and federal regulations that have similar mandates. Download this paper to learn more.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
This paper discusses the importance of file integrity monitoring, which facilitates the detection of attacks by cybercriminals, as well as insider threats that may result in costly data breaches.
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance, security, business technology
    
NetIQ
Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Splunk     Published Date: Jul 23, 2012
Current IT security tools and mindsets are no longer adequate to meet the scope and complexity of today's threats.
Tags : 
splunk, big data, future of security, business technology
    
Splunk
Published By: Splunk     Published Date: Sep 17, 2012
Read this analyst case study on how the Interac organization used Splunk to centralize and correlate monitoring data across its diverse IT landscape. Learn the details of how the Interac organization realized an annual ROI of over $500k.
Tags : 
roi, business performance, data metrics, storage, data storage, data security, security, data management, business technology
    
Splunk
Published By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : 
security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security, business technology
    
Splunk
Published By: WatchGuard     Published Date: Oct 16, 2012
Network security intrusions and data theft incidents grab headlines almost daily. Organizations rely on WatchGuard for network solutions. Read on to understand why WatchGuard is "best-in-class by design"
Tags : 
watchguard, security, database security, security, it security, it infrastructure, intrusion prevention, it management, data management
    
WatchGuard
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept