risk

Results 1 - 25 of 2830Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
The rise of online social networking poses new risks for businesses and new challenges for IT Management. As sites such as Facebook, Myspace and Bebo become evermore popular with end-users, businesses must consider risks such as employee cyber-slacking, reputation damage, broken privacy, identity theft and the threat of virus and spyware infections. This guide will help you reduce the risks of uncontrolled social networking use within the workplace and prescribes seven simple steps for both you and your end-users.
Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, it management, anti spyware, anti virus, employee performance, productivity
     MessageLabs Australia
By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night and we know because we asked you.
Tags : 
     Cisco EMEA
By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats youve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing ituntil its too late.
Tags : 
     Cisco
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
     Hewlett Packard Enterprise
By: HERE Technologies     Published Date: Mar 13, 2019
In todays interconnected world you need to future-proof the integrity and reputation of your business. Your companys network remains the Achilles heel of the whole enterprise because once compromised, your companys reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : location data, location technology solutions, security
     HERE Technologies
By: Here Technologies     Published Date: Apr 02, 2019
In todays interconnected world you need to future-proof the integrity and reputation of your business. Your companys network remains the Achilles heel of the whole enterprise because once compromised, your companys reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
     Here Technologies
By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
     Cisco EMEA
By: Schneider Electric     Published Date: Mar 28, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : financial risk, power management system, quality migration, schneider electric, pms
     Schneider Electric
By: Schneider Electric     Published Date: Apr 02, 2019
Organizations need resilience in the face of an increasingly broad and unpredictable risk landscape. This is especially true when it comes to energy and sustainability. Investors and customers alike recognize the effects of climate change and other factors that increase volatility. And the pressure these and other groups are applying to drive change can no longer be ignored.
Tags : economic growth, schneider electric
     Schneider Electric
By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data thats gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
     Intel
By: Gigamon     Published Date: Mar 26, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download The Importance of a Common Distributed Data Services Layer to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
     Gigamon
By: Gigamon EMEA     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
     Gigamon EMEA
By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusives technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or untouchable applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
In todays healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusives technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once theyre inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate stealth attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
     Illusive Networks
By: Forcepoint     Published Date: Mar 14, 2019
"Things are not as they used to be in the enterprise. Todays employees are mobile, theyre storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive"
Tags : data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
     Forcepoint
By: Forcepoint     Published Date: Mar 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
     Forcepoint
By: Forcepoint     Published Date: Mar 14, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
     Forcepoint
By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : black duck software, open source, platform, sap, multi-source, code, source, agile development, business intelligence, project management, database development, web development
     Black Duck Software
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 16, 2019
For electronics companies, Blockchain technology can reduce frictions to improve the cost, time and risk associated with complex processes.
Tags : 
     Group M_IBM Q2'19
By: Domino Data Lab     Published Date: Feb 08, 2019
As organizations increasingly strive to become model-driven, they recognize the necessity of a data science platform. According to a recent survey report Key Factors on the Journey to Become Model-Driven, 86% of model-driven companies differentiate themselves by using a data science platform. And yet the question of whether to build or buy still remains. This paper presents a framework to facilitate the decision process, and considers the four-year projection of total costs for both approaches in a sample scenario. Read this whitepaper to understand three major factors in your decision process: Total cost of ownership - Internal build costs often run into the tens of millions Opportunity costs - Distraction from your core competency Risk factors - Missed deadlines and delayed time to market
Tags : 
     Domino Data Lab
By: Epicor     Published Date: Apr 11, 2019
With the speed at which technology is advancing, manufacturers cannot afford to use outdated manufacturing software. Legacy manufacturing management systems drag down your company with inefficiencies that are both apparent and hidden. These can prevent you from keeping up with your competition and achieving your growth potential. This Epicor white paper details why manufacturing industry technology experts say delaying this important business decision often places your company at risk. By using legacy manufacturing software, not only are you unable to tap into the latest technology trends, but you leave your business vulnerable to: Duplicate or inaccurate data Clunky system performance Security concerns A modern manufacturing ERP solution can eliminate these risks. Download the white paper to learn why implementing new manufacturing software built for business growth may be the most important step you take for the success of your company.
Tags : erp, manufacturing, industry 4.0
     Epicor
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.