leak

Results 26 - 50 of 100Sort Results By: Published Date | Title | Company Name
By: Delphix     Published Date: May 28, 2015
"Security-conscious organizations face a gap between current requirements and capabilities as they relate to data masking. Data volumes are growing exponentially and the risk of data leaks continues to make news, yet many organizations rely on inefficient, legacy approaches to protecting sensitive data. In contrast, top performing companies are turning to virtual databases and service-based masking solutions to ensure that data management functions can keep up with software development.
Tags : 
     Delphix
By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
     Delphix
By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod
     BAE Systems
By: Cox Business     Published Date: May 31, 2017
For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn’t take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. As a key player in the war against DDoS attacks, Neustar has been on the front line, detecting, alerting, and mitigating strikes to keep companies and their customers safe.
Tags : 
     Cox Business
By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : data protection, clearswift, data management
     Clearswift
By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
     uberVU via HootSuite
By: Emulex Corporation     Published Date: Nov 07, 2013
How long did it take to get a permanent fix for your last network problem? Too long? Even worse, did you fall short of actually getting one? If so, it’s not surprising. But because of network visibility problems, chances are good that your organization is leaking real money in network and business downtime. You can’t manage and protect what you can’t see. While many hundreds of network monitoring tools exist, organizations today know surprisingly little about the traffic on their missioncritical high-speed networks. It takes them so long to fix network problems that the business suffers while the seconds, minutes, and hours of downtime accumulate. This situation has never been ideal, but it is now becoming costlier than ever as we grow more dependent on networks to transact business. Download this Whitepaper for more information.
Tags : network monitoring, network visibility, technology, endace, best practices, networking
     Emulex Corporation
By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : email security, internal threats, mimecast, forrester
     Mimecast
By: GrowthIntel     Published Date: Feb 16, 2016
Business development and marketing programs have a tendency to underwhelm when it comes to actual results. As a result, we’re bombarded with SalesTech and MarTech apps endeavouring to plug the leaks. But these tools rarely tackle the core issues behind your lacklustre results. What’s needed is a fundamental change to your go-to-market approach. This ebook shows you what that change could look like, and describes how to make it happen.
Tags : marketing, business development, b2b, sales, business practices
     GrowthIntel
By: Zilliant     Published Date: Oct 11, 2019
The building products / construction industry is more visibly representative of the health of the economy than any other. The avatar of the Great Recession may well be images of doomed projects on abandoned construction sites. As such, it’s unavoidable for leaders of building products distributors to experience market-induced anxiety as a matter of course. 2020 looms as the start of a new decade but many analysts fear it will also mark the end of the building boom. Recent indicators point to a slowdown at least. The existential question: what areas of building products distribution are ripe for reimagination, safeguarding against ambiguous market conditions now and in the future? This whitepaper provides the answers with a playbook that reveals where margins and revenue leak in most B2B distribution companies and provides reimagined strategies for retaining and growing share through price optimization, deal management and costing guidance.
Tags : 
     Zilliant
By: Zilliant     Published Date: Oct 30, 2019
System price drift and an overabundance of price deviations are causing preventable margin leakage for MRO/industrial distributors
Tags : mro, industrial distribution, maintenance, repair, operations, overhaul, distributor, b2b
     Zilliant
By: Zilliant     Published Date: Oct 30, 2019
System price drift and an overabundance of price deviations are causing preventable margin leakage for electrical products distributors
Tags : electrical products, distribution, distributor, b2b, deviations, system prices, margin, price optimization
     Zilliant
By: Zilliant     Published Date: Oct 30, 2019
System price drift and an overabundance of price deviations are causing preventable margin leakage for building products and construction distributors
Tags : building products, distribution, distributor, construction, b2b, deviations, system prices, margin
     Zilliant
By: Mimecast     Published Date: Nov 10, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : mimecast, software as a service, saas, data loss prevention, risk and compliance, email, security
     Mimecast
By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
     CREDANT Technologies
By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
     ForeScout
By: McAfee     Published Date: Jan 23, 2013
John Oltsik from ESG discusses the next generation of data-centric DLP that addresses today's risks and keep your business data safe.
Tags : dlp, data-centric dlp, data leakage, dlp deployment
     McAfee
By: AlienVault     Published Date: Oct 21, 2014
Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.
Tags : alienvault, sql injection, web security, cyber attacks, siem solutions, xss, cross site scripting attacks, siem
     AlienVault
By: Infosys BPM Ltd     Published Date: Feb 12, 2019
A global infrastructure management company entered into a factoring agreement with a leading US financial institution in Australia. However, it realized that it was paying unreasonably high interest payments to the financial institution and wanted to trace the reason for the same. Infosys BPM took the initiative to analyze interest payments to the banker, and the customer payments pattern to provide insights on cost saving opportunities. Read on to know more on how did Infosys BPM help the client lead to a cash flow of $138M and also save $562,000 in factoring fees.
Tags : 
     Infosys BPM Ltd
By: Apstra     Published Date: Aug 19, 2019
You may have read in the news about horrific security gaps that have the potential of bringing down whole infrastructures, leaking critical business and personal data, and exposing organizations to massive liability. There is no question that improving organizations’ security posture is a critical requirement for infrastructure and security teams.
Tags : 
     Apstra
By: HP     Published Date: Jun 23, 2008
In this video, at a high-tech ballistics center managed by National Technical Systems in Camden, Arkansas, HP simulated a gas leak using real explosives to blow up a data center. Every system failed-over after the explosion in less than two minutes—including data on an HP StorageWorks XP12000 Disk Array which failed over flawlessly to an HP StorageWorks XP24000 Disk Array.
Tags : disaster, disaster proof, disaster-proof, hp disaster proof, xp24000, disk array, storage
     HP
By: Webroot UK     Published Date: Nov 11, 2009
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration
     Webroot UK
By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: Trend Micro SPN     Published Date: Sep 23, 2009
To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
     Trend Micro SPN
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com