data security

Results 126 - 150 of 1868Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Dec 11, 2018
Itís likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in todayís hyperconnected world.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. Theyíre on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The modelís security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customersí data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
     Akamai Technologies
By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
     Delphix
By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
     Delphix
By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in todayís marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. Youíll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in todayís marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. Youíll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in todayís marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. Youíll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in todayís marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. Youíll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in todayís marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. Youíll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
     Akamai Technologies
By: Dell EMC     Published Date: Nov 05, 2015
IT organizations are aggressively virtualizing their data centers, creating private cloud environments that help them reduce capital infrastructure and data center costs, improve security, and simplify management. However, potential hurdles, if left unaddressed, can get in the way of fully benefiting from a private cloud. Download this summary to learn more.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 09, 2015
Download this whitepaper and learn more about the multitude of ways that big data can be used to proactively monitor behavior and identify security threats to an organization
Tags : 
     Dell EMC
By: QTS     Published Date: Feb 04, 2016
Download Vormetricís Annual Data Threat Report, featuring key insights from 451 Research, to learn more about the latest trends in data encryption and data security and how your business can best protect its most vital asset: itís data.
Tags : vormetric, 451 research, data encryption, data security, threat report, security, data management
     QTS
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : security application, data centers, data, cyber-attacks, security, prevent cyber-attacks
     Kaspersky Lab Australia and New Zealand
By: Websense     Published Date: Jul 08, 2014
A white paper on the shortest path to prevention and risk production.
Tags : protecting ip data, dlp implementation, websense data security suite
     Websense
By: Akamai Technologies     Published Date: Jun 14, 2018
Itís likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in todayís hyperconnected world.
Tags : cybercrime, security, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched ó at best static and reactive. Current layers likely arenít protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network ó and most importantly, your data ó from malware. "
Tags : dns, rdns, security, zero trust security, malware, data, network security
     Akamai Technologies
By: CA Technologies     Published Date: Jan 09, 2015
This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.
Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security
     CA Technologies
By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organizationís data in an increasingly mobile world.
Tags : security risks, byod, cyber attacks, byod policies
     Dell
By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organizationís spending patterns against those of their peers ó while keeping an eye on current trends affecting endpoint security ó in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
     Dell
By: Dell     Published Date: May 04, 2015
This infographic includes results from a 2015 survey conducted exclusively for CBS Interactive and illustrates: ē The top-ranked security threats of 2014 ē The percentage of companies adopting mobile security technology ē The most popular data protection methods ē What to look for in a comprehensive data protection solution
Tags : security breach, data security, privacy, phishing
     Dell
By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, thereís a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : cloud security, scale, data center, ddos
     Akamai Technologies
By: Dell     Published Date: Feb 04, 2015
In the last few years there have been radical changes in the ways organizations operate and people work. Explosion of data, increased mobile demands, and the globalization of business in general are making 24/7 access to people and information the norm. Sophisticated cyber attacks are requiring robust systems security designed to counter new threats. And velocity is now essential when delivering new IT services.
Tags : dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
     Dell
By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesnít include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether itís intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware, anti-virus, software, protection, solutions
     Dell
By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in todayís global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limitódemanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
     HPE
By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in todayís global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limitódemanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
     HPE
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com