security risks

Results 201 - 225 of 337Sort Results By: Published Date | Title | Company Name
By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
     Canon Solutions America
By: Canon Solutions America     Published Date: Jul 15, 2019
Colleges and universities are under cyber siege. In a recent attack, more than 2,500 student, alumni, and staff accounts were compromised at the University of Buffalo. This brief will teach you how to help prevent a data breach on your own campus.
Tags : 
     Canon Solutions America
By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional data processing infrastructures—especially those that support applications—weren’t designed for our mobile, streaming, and online world. However, some organizations today are building real-time data pipelines and using machine learning to improve active operations. Learn how to make sense of every format of log data, from security to infrastructure and application monitoring, with IT Operational Analytics--enabling you to reduce operational risks and quickly adapt to changing business conditions.
Tags : 
     AWS - ROI DNA
By: Lenovo and Intel     Published Date: Oct 16, 2019
Every decision made for an institution requires security to match. Otherwise vulnerabilities can be created and exploited. We believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, and improve the end-user experience.
Tags : 
     Lenovo and Intel
By: Lenovo and Intel     Published Date: Oct 29, 2019
Every decision made for an institution requires security to match. Otherwise vulnerabilities can be created and exploited. We believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, and improve the end-user experience.
Tags : 
     Lenovo and Intel
By: Trend Micro SPN     Published Date: Jun 15, 2009
Power to the people? Managing technology democracy in the Workplace. A Trend Micro sponsored report by the Economist Intelligence Unit.
Tags : trend, trend micro, economist intelligence unit, security, risks, technology democracy, cio, cto
     Trend Micro SPN
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, security
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks
     Kaspersky Lab
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager
     IBM
By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : remote, remote access, remote network, network management, network security, data center, datacenter, data center management
     Axeda Corporation
By: Sophos     Published Date: Jul 01, 2013
Whether you’re an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming the rule rather than the exception in today’s workplace. Although BYOD may be a convenience to your employees, you need to think about its impact on corporate security models. This whitepaper explains the risks and rewards of BYOD, and shows you how you can adopt BYOD in your workplace while protecting your data.
Tags : risk, rewards, byod, security
     Sophos
By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email
     Proofpoint
By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center
     Tripwire, Inc
By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: CDW     Published Date: Dec 29, 2014
Learn the best practices for migrating to a new server operating system and see how the switch may be challenging, but will allow your organization to vastly improve IT operations to support new technologies such as cloud computing.
Tags : server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing
     CDW
By: CDW     Published Date: Dec 29, 2014
Learn how to reap the benefits of an operating system migration and see how you can transition to a modern data center to accommodate the latest technologies in order to increase the efficiency and productivity of your IT team.
Tags : server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing
     CDW
By: CDW     Published Date: Dec 29, 2014
Learn why the time is now for data center transformation due to the end of Microsoft support to Windows Server 2003 and see what your organization must do to upgrade performance, scalability, availability, manageability, and security.
Tags : server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing
     CDW
By: SafeNet     Published Date: Jan 14, 2014
Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure. What are the risks of this virtual security model and how can it go wrong? This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.
Tags : virtual private networks, virtual security, vpn, infrastructure, data, encryption, network, private network
     SafeNet
By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, enterprise applications
     OpenText
By: Flexera     Published Date: Feb 19, 2019
SaaS adoption is growing quickly. It's easy to buy and deploy because of its relatively low overhead and up-front costs. But SaaS is designed to proliferate. About a third of the SaaS apps in most organizations don’t even get used. And the result? SaaS costs spin out of control. Are you able to manage the cost and security risks associated with your SaaS applications? Download the Essential SaaS Management Toolkit to learn about SaaS usage trends, understand the importance of SaaS management tools and discover how to take control of your SaaS applications. The Essential SaaS Management Toolkit was designed to provide everything you need to learn how to manage the cost and security risks of your SaaS applications. Get the Toolkit here.
Tags : 
     Flexera
By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : rei, intelligent, threat, detection, edge, protection, aws, splunk
     AWS
By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : technology, security, best practices, solutions, network management, detection, protection
     Cyphort
By: McAfee     Published Date: Apr 06, 2017
Kevin O'Sullivan, Security Service Director, Kinetic IT, explains how this Australian managed security services provider relies on McAfee Enterprise Security Manager to deliver visibility of risks and threats for its customers.
Tags : siem, secops, security operations, threat visibility, compliance, integration
     McAfee
By: Zebra Technologies     Published Date: Mar 23, 2018
The Industrial Revolution 4.0 is upon us and manufacturers who want to stay competitive need to adapt or they will inevitably fall behind. However, that’s easier said than done. Updating proprietary legacy systems can be expensive, complicated, and lead to unwanted downtime that can slow production on the plant floor. How do companies accomplish such a critical change without draining budgets and upending workflow? Surprisingly, the answer doesn't always involve completely rebuilding systems from scratch. Instead, removing antiquated equipment and streamlining connectivity without creating new security risks could successfully start organizations on their path to reaping the benefits of Manufacturing 4.0
Tags : industrial, revolution, manufacturers, organizations, systems, budgets, workflow, zebra
     Zebra Technologies
By: Zebra Technologies     Published Date: Oct 01, 2018
The Industrial Revolution 4.0 is upon us and manufacturers who want to stay competitive need to adapt or they will inevitably fall behind. However, that’s easier said than done. Updating proprietary legacy systems can be expensive, complicated, and lead to unwanted downtime that can slow production on the plant floor. How do companies accomplish such a critical change without draining budgets and upending workflow? Surprisingly, the answer doesn't always involve completely rebuilding systems from scratch. Instead, removing antiquated equipment and streamlining connectivity without creating new security risks could successfully start organizations on their path to reaping the benefits of Manufacturing 4.0.
Tags : 
     Zebra Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com