threats data

Results 251 - 275 of 290Sort Results By: Published Date | Title | Company Name
By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
     SPSS, Inc.
By: Symantec     Published Date: Jan 11, 2013
Threats to web application are becoming increasing complex - from malware and advanced persistent threats to data leaks. This guide is made to address your needs and provides a step by step to assess your security needs.
Tags : ssl, web application, shortcut guide, web application threats, shortcut guide, symantec, security, it management
     Symantec
By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : data loss prevention, data breaches, threats and mobility, security executives, corporate data, security
     Symantec
By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : cyber security threats, harmful business risks, malware, spam, intelligence team, security
     Symantec
By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : on-the-job training, it professionals, cyber security services, security programs, security
     Symantec
By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft
     Symantec
By: Symantec     Published Date: Dec 13, 2017
Enterprise’s are increasingly under threat from sophisticated attacks. In fact, research has found that threats dwell in a customer’s environment an average of 190 days1. These Advanced Persistent Threats use stealthy techniques to evade detection and bypass traditional security defenses. Once an advanced attack gains access to a customer environment the attacker has many tools to evade detection and begin to exploit valuable resources and data. Security teams face multiple challenges when attempting to detect and fully expose the extent of an advanced attack including manual searches through large and disparate data sources, lack of visibility into critical control points, alert fatigue from false positives, and difficulty identifying and fixing impacted endpoints.
Tags : investigation, exposure, attacks, endpoints, network, email, cloud, security
     Symantec
By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar to learn how to win the battle against Advanced Persistent Threats.
Tags : persistent threats, cyberattacks, security, data breach, it management, data management
     ThreatTrack Security
By: Trend Micro     Published Date: May 03, 2018
The evolution of cyber threats ad the cybercriminal community has evolved from the days of pranksters launching annoying viruses and spam that would be considered primitive today. While enterprises make concentrated efforts to protect their critical data, the lack of correlated and contextual network visibility can leave IT security organizations unable to prioritze the threats that matter the most.
Tags : 
     Trend Micro
By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth
     Trend Micro SaaS
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
By: Trifacta     Published Date: Oct 25, 2018
The rise of the self-service analytics era has called for a more flexible, iterative approach to data preparation. But as you and your team look to invest in modern data preparation solutions, understanding how to best evaluate these technologies can be difficult. In Ovum’s first Decision Matrix report on self-service data preparation, analyst Paige Bartley takes a comprehensive look at the eight major data preparation vendors by assessing each company’s technology and execution. Download this report to learn: Which vendors Ovum ranks as leaders in self-service data prep The strengths, weaknesses, opportunities and threats of all 8 data prep vendors A detailed overview of the criteria Ovum utilized in their evaluation
Tags : 
     Trifacta
By: Unitrends     Published Date: Aug 18, 2015
When it comes to data protection, what matters most? You want the freedom to choose the types of data, applications, and computing platforms you protect. You want to seal off that data from security threats. You need space to house that data—the right space now with room to grow. You want to support older solutions as you evolve your technology environment to modern strategies, at a pace that suits your business. And you need the ability to reach out for that data at a moment’s notice without overstressing your network. In short, you need it all.
Tags : unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server
     Unitrends
By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management
     Vectra Networks
By: Veeam '18     Published Date: May 01, 2019
The digital revolution is transforming every industry. Yet it also brings new challenges: threats to the security and Availability of mission-critical data and services. Approximately 80% of IT decision-makers say their organization has an Availability gap, that is, a failure to meet recovery requirements—a common issue across all industries. 75% say they also have a data protection gap, meaning they are unable to protect their data frequently enough to ensure that business units’ expectations against data loss are being met.
Tags : 
     Veeam '18
By: VeriSign     Published Date: Feb 10, 2011
This paper reveals the latest advances in SSL technology and how these advances ensure your customers have confidence in the security of your site, as well as protecting them from threats such as phishing, data manipulation and other site scams.
Tags : verisign, ssl, security, phishing, data manipulation, threats, protection, secure sockets layer
     VeriSign
By: Veritas     Published Date: Jan 03, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
     Veritas
By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
     Veritas
By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
     Viavi Solutions
By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
     Viavi Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com