data security

Results 1776 - 1800 of 1978Sort Results By: Published Date | Title | Company Name
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
     Neoscale Systems, Inc.
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
     Neoscale Systems, Inc.
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : security, security management, access control, identity management, iam, authentication, tracking, workforce
     Borer Data Systems Ltd.
By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : security, security management, access control, identity management, data protection, email security, iam, authentication
     Deep Software
By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : passwords, password, password management, security management, good password, bad password, data protection, elcomsoft
     ElcomSoft
By: Easynet     Published Date: Mar 26, 2008
Compliance with the payment card industry (PCI) data security standard is now a reality for every retailer: compliance should be high on every retailer's list of priorities for enterprise security. With this reality comes the need for retailers to fully understand their PCI compliance status through a thorough gap analysis and associated risk assessment.
Tags : compliance, vpn, retail, managed networks, easynet
     Easynet
By: KEMP Technologies     Published Date: Aug 04, 2008
Chances are, if you’re utilizing SSL, you’re not utilizing it to its full potential. SSL is a powerful technology that can help organizations protect their data as well as their users. While the technology behind SSL is solid, the most common best practices for its implementation do not take full advantage of the benefits that SSL brings. And this may be inadequate to provide proper security to the modern web application environment.
Tags : ssl, load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services
     KEMP Technologies
By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology
     LogRhythm
By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : likewise, pci data security, linux, unix, mac os x, windows
     Likewise Software
By: HP - Enterprise     Published Date: Jun 05, 2013
In todays mobile world, the user is at the center of the application experience. This is true whether the user is a customer, a partner, or an employee. Yet meeting the needs for the enterprise user poses particular challenges. Apps must work seamlessly across devices and screen sizes, enabling real-time collaboration, without sacrificing data security. This balance requires a mobile app development platform built for the unique demands of the enterprise.
Tags : applications, apps, mobile applications, mobile, user-driven, data security
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Tags : mobile apps, applications, security threats, mobile computing, security vulnerabilities
     HP - Enterprise
By: Network Automation     Published Date: Dec 10, 2008
The Auxiliary IT Operation center at the Indiana University has a lot of responsibility on its plate. It is in charge of the majority of for-profit activities the university is engaged in, namely the halls of residence, parking, dining facilities, campus transportation and much more. Additionally, this unit supports many critical IT processes including the secure distribution of student photos for identification cards.
Tags : network automation, data security, data transfer, disaster recovery, networking, security, it management
     Network Automation
By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, networking
     Prodiance Corp.
By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention
     MessageLabs
By: Data Guard Systems, Inc     Published Date: May 06, 2009
Whether and organization or an individual, identity theft spells a long, expensive, and complex recovery process. However, online identity theft can be prevented with encryption software and advanced password protection.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : platforms, data management
     BMC Control M
By: NeoSpire Managed Hosting     Published Date: Oct 22, 2009
With the massive amount of information on an ever-evolving subject, understanding and becoming PCI compliant can be a daunting task. The process of becoming PCI compliant following the PCI SSC recommended process involves over 160 steps to a merchant's security system and can easily be misinterpreted. NeoSpire presents the Top 10 Misconceptions about PCI.
Tags : pci, neospire, security, compliance, paypal, data security standards
     NeoSpire Managed Hosting
By: GGR Communications     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : ggr communication, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
     GGR Communications
By: People for Business     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : people for business, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
     People for Business
By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security
     Symantec.cloud
By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce.
Tags : messagelabs symantec hosted services, wireless workforce, mobile data security, data and services, business practices, security, management policy
     Symantec.cloud
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73 74 75    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com