data threats

Results 201 - 225 of 258Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking
     Qualys
By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : it security, information ecosystems, data-centric security, identity management, security
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past.
Tags : vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats
     Qualys
By: Quocirca     Published Date: Jul 27, 2009
Across the mid-market, inefficiencies are compounded by the lack of visibility into pertinent data, of processes being adequately and flexibly automated, and for the performance of the business to be monitored on a constant basis. Without such capabilities, businesses will find it difficult to survive the current financial conditions – yet creating an environment where information can be easily aggregated and viewed has never been easier. Also, business performance can be easily monitored with small proactive, and even reactive, actions ensuring effective responses to market forces and enabling organisations to compete with local and more global business threats.
Tags : quocirca, business intelligence, performance management, enterprise applications
     Quocirca
By: Riverbed Technology, Inc.     Published Date: May 27, 2014
Data in branch and remote offices is subject to a variety of threats. Data centers are built to secure data, but remote offices lack the same level defenses. It’s now possible to eliminate the risks of branch office IT, consolidating servers and storage into the datacenter without sacrificing the benefits of having servers at the edge close to users.
Tags : datacenter, data security, consolidating servers, consolidating storage, data defense, enterprise expansion, edge close to users, riverbed
     Riverbed Technology, Inc.
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: SafeNet     Published Date: Jun 11, 2013
Understanding the Threats Energy and PetrochemicalFace—and How to Protect Against Them.
Tags : safenet, storage, secure, seismic images, data protection, threats energy, petrochemical
     SafeNet
By: SailPoint Technologies     Published Date: Apr 10, 2019
Did you know 58% of healthcare data breaches are caused by malicious intent or negligence of organizational insiders?* Read this HIMSS Media study to learn where security gaps may exist in your organization and what you can do to reduce risk.
Tags : 
     SailPoint Technologies
By: SAS     Published Date: Sep 05, 2019
Envision this situation at a growing bank. Its competitive landscape demands an agile response to evolving customer needs. Fortunately, analytically minded professionals in different divisions are seeing results that positively affect the bottom line. • A data scientist in the business development team analyzes data to create customized • experiences for premium customers. • A digital marketer tracks and influences the customer journey for prospective • mortgage customers. • A risk analyst builds risk models for the bank’s loan portfolios. • A data analyst examines data about local customers. • A technical architect defines a new system to protect bank data from internal and • external cyberthreats. • An application developer builds a new mobile app for online customer portfolio • management. Between them, these employees might be using more than a dozen packages for analytics and data management.
Tags : 
     SAS
By: Schneider Electric     Published Date: Mar 28, 2019
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making. And they need to address emerging trends such as the Internet of Things and cloud computing, which can have both a positive and negative impact on their businesses.
Tags : decision-making, emerging threats, schneider electric, - colocation data center threats, colocation provider
     Schneider Electric
By: Schneider Electric     Published Date: Jun 07, 2019
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making. And they need to address emerging trends such as the Internet of Things and cloud computing, which ,can have both a positive and negative impact on their businesses.
Tags : decision-making, emerging threats, schneider electric, - colocation data center threats, colocation provider
     Schneider Electric
By: SilverSky     Published Date: May 09, 2014
This white paper explores the problems with traditional network setups and ways to address these issues in a budget friendly manner.
Tags : silversky, fortune 500, business security, network security, it management, security products, security systems, log data
     SilverSky
By: SpectorSoft     Published Date: Jan 14, 2013
There are mediums you allow everyday access to that can be used to raise productivity and meet business objectives, but can just as easily be used to take data out of the business.
Tags : spectorsoft data security, threats, stealing data, fraud
     SpectorSoft
By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data
     Splunk
By: Splunk     Published Date: Aug 21, 2018
While the modern enterprise embraces digital technology, it is also at risk of cyberattacks. In this guide, “The Essential Guide to Security”, we map out how organizations can use machine data for specific use cases and get started addressing threats and security challenges. Download your complimentary copy to learn: *How to assess your organization’s security maturity *What specific threats you should be looking for and how to fight them *What data sources are needed for specific use cases *What software solution you need to get ahead of different threats
Tags : 
     Splunk
By: Splunk     Published Date: Aug 21, 2018
Alice Bluebird, a quirky security analyst for hire, is hunting down a nation state of hackers thirsty for the recipes of Frothly, a cutting-edge craft brewery. Follow Alice as she works to solve the mystery of the breach. Did she catch the incident before the hackers managed to steal Frothly’s super secret formulas? Did the hackers act alone or — scarier yet In this light hearted graphic novel “Through the Looking Glass Table”, discover how machine data, as well as an analytics-driven platform, log management, SIEM, UEBA and SOAR solutions, can help anyone — IT managers and sophisticated SOC analysts — better understand and respond to incidents, breaches, phishing attempts, insider threats and more.— did they have help from the inside?
Tags : 
     Splunk
By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
     SPSS
By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
     SPSS Inc.
By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
     SPSS, Inc.
By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : data loss prevention, data breaches, threats and mobility, security executives, corporate data, security
     Symantec
By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
     Symantec
By: Symantec     Published Date: Dec 13, 2017
Read this data sheet to find out how Symantec’s solution can help to stop threats regardless of how they attack your endpoints.
Tags : symantec, endpoint, protection, prevention, detection, response, deception, hardening
     Symantec
By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : cloud, cloud service providers, cloud security, cloud applications
     Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com