prevention

Results 1 - 25 of 413Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
    
IBM
Published By: IBM     Published Date: May 09, 2017
This eBook takes you on a journey to outthink content chaos and discover how your industry can gain real value from your business content. Read how industry leaders are reflecting on the important challenges they face, and how they are finding innovative ways to collaborate and extract value from all forms of content to outpace those obstacles. Learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it, improving business performance and ROI.
Tags : 
enterprise management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: Mimecast     Published Date: Apr 18, 2017
"Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them."
Tags : 
email security, email fraud, whaling, mimecast, loss prevention
    
Mimecast
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: McAfee     Published Date: Mar 31, 2017
Gartner, Inc. has positioned McAfee as a Leader in the Gartner Magic Quadrant for Intrusion Prevention Systems (IPS) for the tenth consecutive time. With the shift to cloud-based architectures, the role of IPS is changing. Get access to this valuable Gartner research, $1,995.00 USD value, compliments of McAfee.
Tags : 
gartner mq, gartner magic quadrant, intrusion prevention systems, vips, ips, magic quadrant ips
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : 
data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : 
detecting unknown threats, websense, next-generation firewall
    
Websense
Published By: Websense     Published Date: Jul 08, 2014
A white paper on the shortest path to prevention and risk production.
Tags : 
protecting ip data, dlp implementation, websense data security suite
    
Websense
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors, it management
    
Websense
Published By: SAS     Published Date: Jul 14, 2015
An Enterprise Approach to Fraud Detection and Prevention in Government Programs.
Tags : 
fraud, detection, prevention, cost savings, efficiency
    
SAS
Published By: Polycom     Published Date: Sep 04, 2012
A collaborative video can support community health education and disease prevention, as well as connect a patient with his or her practitioner through applications like telemedicine, even if separated geographically.
Tags : 
video collaboration, video conferencing, healthcare, mobile device, re-hospitalization prevention
    
Polycom
Published By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: Verdasys     Published Date: Mar 28, 2012
In this whitepaper get the answers to the open gaps left in the WikiLeaks story and learn how you can prevent insider threats that are just as detrimental in your organization.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365
    
Mimecast
Published By: Mimecast     Published Date: Oct 29, 2013
Don’t just store information. Use it. Mimecast makes your email archiving work harder for business advantage.
Tags : 
mimecast, email, interactive archive, email archiving, interaction platforms, email platforms, ediscovery, data loss prevention
    
Mimecast
Published By: Arbor     Published Date: Mar 13, 2014
IANS reviews the use of on-premise DDoS detection and mitigation tools.
Tags : 
arbor, ians, arbor networks, ddos protection, custom report, infrastructure, ddos solutions, ddos attacks
    
Arbor
Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data
    
Venafi
Published By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates
    
Venafi
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.