sensitive information

Results 1 - 25 of 124Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop
     Absolute Software
By: Absolute Software     Published Date: Nov 21, 2011
Learn about best practices in the management and security of IT assets and the sensitive information they contain.
Tags : security, strategy, healthcare, absolute, it assets, sensitive information, phi, ehr, asset security strategy, patients, employees, best practices, reportable incidents
     Absolute Software
By: Akamai     Published Date: Jul 01, 2011
The whitepaper shows how merchants can rid their systems of sensitive payment information.
Tags : akamai, enterprise payment security 2.0, payment security management, edge tokenization, pci compliance, credit card data, cybersource, payment data capture, 2.0
     Akamai
By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere
     Avalere
By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
     BlackBerry
By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : data, non-malicious, malicious, ponemon, solera network
     Blue Coat Systems
By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : cloud, it pros, security, dlp, cloud securiity, it management
     Box
By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe, storage
     CA Mainframe
By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : technology, virtual, identity management, access control, security, protection
     CA Technologies
By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information, steal information, secure data, secure passwords, security breaches, broken privacy, reputational damage, cyber-security, business closures, business security, insider rights, threat environment, security
     CA Technologies
By: CA Technologies EMEA     Published Date: Sep 07, 2018
With the application economy in full swing, more organizations are turning to Continuous Testing and DevOps development practices in order to quickly roll out applications that reflect the ever-changing needs of tech-savvy, experience-driven consumers. Rigorous data they need, in the right formats. This forces teams to postpone their testing until the next sprint. As a result, organizations like yours are increasingly looking for ways to overcome the challenges of poor quality data and slow, manual data provisioning. They are also concerned about compliance and data privacy when using sensitive information for testing. CA Test Data Manager can help you mitigate all these concerns, so you’re positioned to achieve real cost savings.
Tags : continuous delivery, application delivery, testing, test data management
     CA Technologies EMEA
By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions’ ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
     Carbon Black
By: CDW     Published Date: Jun 10, 2013
It’s critical to understand how a defense-in-depth strategy can protect the most precious information asset: data.
Tags : cdw, enterprise encryption, defense-in-depth, sensitive data, security posture, encryption of information, compliance, security posture, security
     CDW
By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
     CDW
By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption
     Centrify Corporation
By: Citrix ShareFile     Published Date: Apr 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : pdf protection, data security, password protection, hacker prevention
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, your accountancy firm’s data and your clients’ information could easily be exposed to hackers. Download this white paper to learn more about PDF password protection failures that: • Expose data when people share passwords with others, especially through email. • Prevent your firm from knowing when files are read by unauthorized individuals. • Allow hackers to easily to gain access to confidential financial documents within minutes.
Tags : business documents, file sharing, file security, file backup, file sync, file delivery, data protection, data security, data encryption
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration, software security, storage backup
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : data security, passwords, password protection, data vulnerability
     Citrix ShareFile
By: Comcast Business     Published Date: Jul 10, 2017
The financial services industry is increasingly at a crossroads. Faced with mounting pressure from external forces, such a competition from FinTech companies and a more demanding client base, banks and financial services firms are working to become more customer-centric in their approach to business. However, the need to keep sensitive customer and business information secure and ensure compliance with government regulations can stymie those efforts. The proprietary hardware so prevalent in traditional networks can’t provide what financial institutions need; a growing number, therefore, are turning to software-defined networking (SDN).
Tags : financial services, sdn, increase efficiency, reducing complexity, next-generation technologies, financial benefits, security control, lower costs, customer experience
     Comcast Business
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com