data assets

Results 76 - 100 of 122Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity, zero-day attacks, it systems, security, data security, resiliency layers, hardened assets, identification
     Qualys
By: Tripwire     Published Date: Oct 14, 2010
Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how.
Tags : tripwire, data protection, data breach risk, threats, compliance
     Tripwire
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
     Trend Micro, Inc.
By: McAfee     Published Date: Nov 14, 2012
Real-Time Database Monitoring, Auditing, and Intrusion Prevention Databases store an enterprise's most valuable information assets, but in most organizations they are poorly protected. It's common sense to secure databases, but it's not that simple.
Tags : database monitoring, auditing, intrusion prevention, database, mcafee
     McAfee
By: WinMagic Inc.     Published Date: Aug 12, 2013
Many law firms have begun to look to data encryption to safeguard their communications and corporate assets from unauthorized access. Learn the benefits of Encryption technology through this eBook.
Tags : data encryption, legal service
     WinMagic Inc.
By: Dell Software     Published Date: May 28, 2013
Tools and techniques used to protect physical data are no longer sufficient for virtual data assets. How do you know which technology is right for your organization? Let an expert do the work for you: The Buyers’ Guide to Virtual + Physical Data Protection.
Tags : dell quest, appassure, data protection, virtual data, physical data protection
     Dell Software
By: QTS Data Centers     Published Date: May 01, 2017
In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. Now, more than ever, CIOs and CTOs are challenged to build sustainable IT strategies against a constantly changing backdrop. Enterprises are quickly realizing that the resources required are exceeding their in-house capabilities. So, who are they trusting with these most valued assets? Data center providers. Learn how IT strategies are evolving and the role data centers play in those strategies.
Tags : 
     QTS Data Centers
By: Imperva     Published Date: Sep 19, 2013
This guide will help you protect your organization from external threats targeting your high-value applications and data assets.
Tags : imperva, ddos, hackers, cybercriminals, cyberattacks, malware, phishing, web attack, spam, virus
     Imperva
By: IBM     Published Date: Apr 13, 2015
IDC Retail Insights defines omni-channel merchandise optimization as the set of technologies, data assets, skills, processes, and management intent required to develop and maintain sets of targeted and localized offers that best satisfy important business objectives. These goals include customer satisfaction, customer lifetime value, and category, channel, and corporate performance. By "offers," IDC Retail Insights means the broad set of attributes that characterize assortments, products, services, prices, utility, and convenience that match customers' buying criteria and shopping behaviors. Targeted and localized offers present a compelling "choice set" that satisfies and delights consumers. Download this white paper to read the questions posed by IBM to Greg Girard, program director of Omni-Channel Analytics Strategies at IDC Retail Insights, on behalf of IBM's customers.
Tags : omni-channel merchandise, ibm, targeted offers, localized offers, customer satisfaction, corporate performance
     IBM
By: IBM     Published Date: Apr 23, 2015
With IBM analytics for big data with a smart mobile strategy, banks can increase wallet share and assets under management while lowering the organization’s operating ratio by using more efficient channels.
Tags : ibm, analytics, efficiencies, digital banking, management, strategy, data management, business technology, data center
     IBM
By: IBM     Published Date: Oct 03, 2017
The demand for new data about customers, customer behaviour, product usage, asset performance, and operational processes is growing rapidly. Almost every industry wants new data. Some examples of this are: • Financial services organisations want more data to improve risk decisions, for ‘Know Your Customer (KYC) compliance and for a 360 degree view of financial crime. • Utilities companies want smart meter data to give them deeper understanding of customer and grid usage and to allow them to exploit pricing elasticity. They also want sensor data to monitor grid health, to optimise field service and manage assets. Download now to learn more!
Tags : scaling data, big data, customer behavior, product usage, data integration
     IBM
By: Eaton Corp.     Published Date: Jun 01, 2009
If IT and Facilities could work collaboratively, organizations can operate more efficiently and effectively while still meeting their business objectives.  That's why Eaton® is partnering with organizations that develop IT management systems to create an integrated approach to energy management.  This white paper describes how a joint monitoring and management solution links IT assets, the data center infrastructure and Facilities assets into a holistic perspective aligned with business processes.
Tags : white paper, facilities, collaborate, single pane, joint monitoring, management solution, it assets, data center. solutions
     Eaton Corp.
By: SAS     Published Date: Jun 05, 2017
Data professionals now have the freedom to create, experiment, test and deploy different methods easily – using whatever skill set they have – all within one cohesive analytics platform. IT leaders gain the ability to centrally manage the entire analytics life cycle for both SAS and other assets with one environment. Organizations get faster results and better ROI from analytics efforts.
Tags : 
     SAS
By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
     SAS
By: SAS     Published Date: Dec 20, 2018
Data professionals now have the freedom to create, experiment, test and deploy different methods easily using whatever skill set they have and all within one cohesive analytics platform. IT leaders gain the ability to centrally manage the entire analytics life cycle for both SAS and other assets with one environment. Organisations get faster results and better ROI from analytics efforts.
Tags : 
     SAS
By: Cisco     Published Date: Apr 08, 2015
NSS research indicates that NGFW devices are typically deployed to protect users rather than data center assets, and that the majority of enterprises will not tune the IPS module separately within their NGFW. Therefore, NSS evaluation of NGFW products is configured with the vendor pre-defined or recommended,“out-of-the-box” settings, in order to provide readers with relevant security effectiveness and performance dimensions based upon their expected usage.
Tags : next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
     Cisco
By: Telx     Published Date: Dec 09, 2014
CIOs are on a constant quest to understand what infrastructure will provide the best fit, at the lowest risk and cost. In today’s evolving data center, defining the proper use of data center assets, and how cloud-based platforms may or may not fit into the mix is critical to business success. With the abundance of cloud offerings in the market place, physical infrastructure is no longer an enterprise IT requirement. Cloud has established itself as an excellent option for infrastructure outsourcing.
Tags : telx, data center, network architecture, infrastructure, storage, data center costs, power and cooling, energy
     Telx
By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security, it management, knowledge management
     AlienVault
By: IBM     Published Date: Sep 10, 2013
This white paper will discuss how big data analytics, coupled with the right facilities and asset management software, can provide next-generation opportunities to improve facilities and asset management processes and reutnrs. It will examine how different organizations successfully use big data generated by their facilities and assets to help increase revenue, power operational efficiency, ensure service availability and mitigate risk. Most importantly, this white paper will reveal how your organization can leverage big data analytics to achieve similar benefits and transform the management of your organization's facilities and assets-and ultimately, your business.
Tags : big data, smarter infrastructures, big data, ibm, power operational, leverage big data, analytics, harnessing the power of data, security, enterprise applications, data management
     IBM
By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
     AlienVault
By: HP     Published Date: Jul 08, 2009
This guide provides a comprehensive look at a complete data protection and recovery solution, with valuable information to help you choose the solution that best fits your business requirements and budget, and get the assurance you need - knowing your assets are protected. Learn more today!
Tags : storageworks, disk to disk, d2d, data protection, recovery, server, rack, storage, roi, hp services, rdx removable disk backup, disaster recovery, dat tape, tape, tape library, capacity, lto, linear tape open, one-button disaster recovery, obdr
     HP
By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management, content management system, information integration, quocirca
     Quocirca
By: Quocirca     Published Date: Sep 07, 2007
Mid-sized organizations have similar issues to large organizations when it comes to the storage and management of information and data, yet they often have limited capability to attract, retain and maintain the skills that large organizations will use in managing their data assets.  There is a strong need for more effective tools that will enable mid-sized organizations to manage their data assets and gain the greatest value from them.
Tags : smb, smbs, storage, data management, information management, storage management, san, sans, storage area network, quocirca
     Quocirca
By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security, network security, small business it, it networks, securing data, networking, security, data management
     Quocirca
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com