data security

Results 1 - 25 of 1963Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
Organised crime is joining athletes across the globe in training for the Games. And it's your corporate secrets that are up for grabs. In the past 6 months MessageLabs has intercepted 13 separate Olympic-themed Targeted Trojan attacks across several data-rich industries. With Targeted Trojans on the rise and able to evade conventional security mechanisms, MessageLabs is currently intercepting attacks that exploit the Olympics to appear authentic and attractive, but contain dangerous malware designed to steal corporate secrets.
Tags : messagelabs, olympics, secrets, spyware, virus, trojan, trojans, security, internet security, web security, anti spyware, anti virus, email security
     MessageLabs Australia
By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
     Entrust Datacard
By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
     Blackberry
By: Google     Published Date: Aug 05, 2019
This Forrester Wave report provides an analysis of 12 most significant Database-as-a-service (DBaaS) providers. These vendors were evaluated against 27 criteria, grouped into three categories: Current Offering, Strategy, and Market Presence. Read the report and find out how each provider measures up in their market as Leaders, Strong Performers and Contenders.
Tags : agile, database solutions, forrester, database security, data management
     Google
By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Aug 13, 2019
How much money does the average data breach cost? How many days of downtime does ransomware cause? How many millions of people have their data exposed? Discover the vast impact on time, money & productivity of security breaches. Investing up front in strong security, will save you in the long run. Comprehensive end-to-end security not only reduces the risk of being compromised, it also brings benefit to the business., Taking steps to invest in the right solutions, that use rigorous, trackable and auditable security standards, across their entire supply chain is a must to mitigate risks. ThinkShield provides that and so much more. It is a security solution that offers end-to-end protection that drives productivity, innovation, and profitability.
Tags : 
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Aug 13, 2019
Find out why it’s harder than ever to keep data secure, as well as what could be causing security breaches. Plus see how to mitigate this risk using end-to-end solutions in this infographic. Learn how Lenovo’s ThinkShield solutions, combine cutting-edge security solutions to protect your devices from cyber-attack, throughout their lifecycle. Making all the difference with true, end-to-end protection at the device, identity, online and data levels.
Tags : 
     Lenovo - APAC
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
Data is the DNA of modern healthcare. As healthcare technology continues to evolve at a rapid pace, and patient data management and security evolve, emerging approaches for disease treatment and prevention—like precision medicine and healthcare content management—are becoming more necessary. Precision medicine is about moving from generic to more precise, population-focused diagnostics and treatment by factoring in data from patients’ genes, environment, lifestyle factors and family history, into clinical decision-making for earlier, more accurate diagnoses, and more effective treatment and prevention. Data is at the heart of enabling doctors and scientists to execute on this mission. Additionally, rapidly changing regulations throughout the world are affecting the management of all healthcare data. Infinidat removes data management barriers from this level of data interaction by removing isolated islands of storage and allowing much more data to reside on a single, high-performance, h
Tags : 
     Infinidat EMEA
By: Epicor     Published Date: Apr 11, 2019
With the speed at which technology is advancing, manufacturers cannot afford to use outdated manufacturing software. “Legacy” manufacturing management systems drag down your company with inefficiencies that are both apparent and hidden. These can prevent you from keeping up with your competition and achieving your growth potential. This Epicor white paper details why manufacturing industry technology experts say delaying this important business decision often places your company at risk. By using legacy manufacturing software, not only are you unable to tap into the latest technology trends, but you leave your business vulnerable to: • Duplicate or inaccurate data • Clunky system performance • Security concerns A modern manufacturing ERP solution can eliminate these risks. Download the white paper to learn why implementing new manufacturing software built for business growth may be the most important step you take for the success of your company.
Tags : erp, manufacturing, industry 4.0
     Epicor
By: Jamf     Published Date: Aug 12, 2019
A well-planned cyberattack or an accidental download of malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security.
Tags : 
     Jamf
By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
     Great Bay Software
By: Artemis Health     Published Date: Aug 08, 2019
Most benefits professionals agree: access to data is the key to a solid benefits strategy. But there are some hurdles in your way to finding and implementing a data solution. In this guide, we’ll show you how to overcome some of the challenges commonly faced by benefits teams: • Prioritizing data amongst other initiatives and finding the time for analysis • Ensuring data quality and security, and working with internal teams to get buy-in • Justifying the cost and learning how to educate others on the value of data
Tags : 
     Artemis Health
By: Juniper Networks     Published Date: Jul 31, 2019
When considering data center security, you will need to decide which security functions need to be deployed and where you want to deploy them. These functions are expected to be implemented wherever a firewall is used. Read our eGuide to find out which security functions to deploy, and where to deploy them, including: • Next-generation firewalls • Intrusion prevention systems • Centralized security management
Tags : cloud providers, cloud provisioning, cloud services, data centre, data centre provider
     Juniper Networks
By: Apstra     Published Date: Aug 19, 2019
You may have read in the news about horrific security gaps that have the potential of bringing down whole infrastructures, leaking critical business and personal data, and exposing organizations to massive liability. There is no question that improving organizations’ security posture is a critical requirement for infrastructure and security teams.
Tags : 
     Apstra
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
     Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
     Ounce Labs, an IBM Company
By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking
     StrongMail
By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
     Good Technology
By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco, remote access, remote network management, wireless security, total cost of ownership, configuration management
     Astaro
By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
     APC by Schneider Electric
By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.