data threats

Results 101 - 125 of 258Sort Results By: Published Date | Title | Company Name
By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Mobility, social media, analytics and the cloud are revolutionizing how data is accessed, used, and secured for small to midsize businesses. With data security threats are on the rise, keep your business running with Hewlett Packard Enterprise.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
     Hewlett Packard Enterprise
By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, ciso, cyber crime, breaches, information technology, c-level
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Tags : mobile apps, applications, security threats, mobile computing, security vulnerabilities
     HP - Enterprise
By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security, threats, vulnerabilities, silo data, business processes, business users, security, swg
     IBM
By: IBM     Published Date: Sep 11, 2009
Listen to IBM Internet Security Systems' take on network security convergence. This presentation will be available to audience members until February 22, 2010 at 09:00 AM Pacific Standard Time.
Tags : ibm, webcast, network security convergence, web 2.0, web application and database threats, security solutions
     IBM
By: IBM     Published Date: Oct 13, 2009
Explore a topic often overlooked during discussions about data security: the risk of insider threats. This report, "Stopping insider attacks: how organizations can protect their sensitive information," provides an overview of the issue of insider attacks and offers suggestions that may help organizations mitigate their risk. Plus, listen to a podcast about stopping insider threats.
Tags : sensitive information, ibm, personal data privacy, global business security, threats, malware, insider attacks
     IBM
By: IBM     Published Date: Oct 10, 2013
A though leadership white paper discusses how virtualization, cloud computing, and the proliferation of smart devices are helping companies meet their goals and be more effective with their IT investments but are placing increased demands on the datacenter network. Organizations can no longer afford to treat the datacenter network as an afterthought, and it is not sufficient to simply throw more ports or bandwidth at the problem. IBM offers a portfolio of datacenter network planning, integration, and management services designed to maximize customers' DCN success. By working with customers to plan and implement the appropriate network design at the beginning of an IT project, IBM can help customers meet their business requirements, minimize operating costs, and build in flexibility for the future.
Tags : leveraging networks, virtualization, cloud intiatives, networking, cloud computing, datacenter, it investments, minimize operating costs, build flexibility, threats, leadership, proliferation, effectiveness
     IBM
By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks, security
     IBM
By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : ibm, cloud, mobility, social business, data, big dta, theft, cyber theft, cyber criminals, security, security risks, global analytics, visibility, data sets, protection, external threats, risk, risk management, finanical stability, it management
     IBM
By: IBM     Published Date: Jan 02, 2014
Many organizations and agencies would like to improve their debt collection. They are aware that advanced analytics can help them optimize collections to drive down company debt and collection expenditures. However, they perceive that advanced analytics requires massive infrastructure changes, expensive software licenses, analytics expertise, long lead times and major upfront capital expenses.
Tags : ibm, analytic answers, prioritized collections, collection agencies, debt collection, constrained budgets, constrained resources, the cloud, analytics technology, predictive and prescriptive, effective collection, up-to-date insights, trends and patterns, capital expenses, operational changes, data-driven, visual trends, potential opportunities, potential threats, business goals
     IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security, it management, data management
     IBM
By: IBM     Published Date: Jul 31, 2015
Threats from within.
Tags : data, security, threats, protection
     IBM
By: IBM     Published Date: Jul 31, 2015
Optimize the process of investigating and gathering evidence.
Tags : data, security, threats, protection
     IBM
By: IBM     Published Date: Oct 06, 2015
Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.
Tags : ibm, data security, big data, endpoint devices, safeguarding, security, it management, data management, data center
     IBM
By: IBM     Published Date: Apr 06, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments
Tags : ibm, big data, data security, risk management, security
     IBM
By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data security, risk management, big data, security
     IBM
By: IBM     Published Date: Jul 15, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments.
Tags : ibm, data, security, big data, data management
     IBM
By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : ibm, data, big data, safeguard, sensitive data, security, dbms, data management, enterprise applications
     IBM
By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : ibm, security, ibm x-force, cyber security intelligence index., cyber security, intelligence, enterprise applications
     IBM
By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : (delete)mobile management, system solutions, data security, software management, personal data management, device management
     IBM
By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
     IBM
By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
     IBM
By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
     IBM
By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com