data security

Results 1826 - 1850 of 1940Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
     Symantec
By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : data loss prevention, data breaches, threats and mobility, security executives, corporate data, security
     Symantec
By: Symantec     Published Date: Dec 04, 2014
With 93% of people doing at least some of their holiday-season shopping with online merchants, e-tailers of every kind need to get their websites in gear and ensure their customers feel confident shopping on their site. Whether it’s shopping online, in store pick-up, or even browsing and wish lists, customers are offering you an unprecedented amount of data and sales this season. But fail to keep your customers safe with good website security, and all you’ll get is a lump of coal in your stocking.
Tags : online merchants, e-tailers, holiday, holiday season, website security, shopping, security
     Symantec
By: Varonis     Published Date: Nov 12, 2013
Verizon’s longstanding Data Breach Investigations Report1, or DBIR, is an excellent starting point to understand the larger trends in security and data protection.
Tags : varonis, medical insurer, mortgage lender, retailer, data breach investigations report, dbir, larger trends, security, data protection, global scale, breach activity, validated breach incidents, collect personal details, hackers, breach statistics, security decisions, exposed data, it deficiencies
     Varonis
By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach, it professionals, security professionals, leaked critical data, endpoint protections, network protections, server protections, dlp solutions, metadata, it management
     Varonis
By: IBM     Published Date: Jan 09, 2014
Companies worldwide are embracing private clouds, not only because they support new, highly efficient and secure data solutions, but also to drive new competitive organizational strategies. This white paper provides an assessment of the business value of implementing IBM SmartCloud Entry for Power Systems versus comparable private cloud solutions from VMware on Intel. It discusses the benefits of private cloud solutions, including reduced labor and hardware/software costs, ease of implementation and adoption, scalability, organizational flexibility, security, improved efficiency, as well as allocation of and access to IT resources.
Tags : smartcloud, private cloud, vmware, workloads, smartcloud entry, ibm smartcloud, edison group, systems director, virtualization technology, virtual machine
     IBM
By: IBM     Published Date: Aug 06, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : ibm, banking, security, cyber security, financial, insights
     IBM
By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data, security, data management
     Cisco
By: Lumension     Published Date: Jun 03, 2015
The IT news over the last year has been filled with story after story on data breaches, making the release of Lumensions’ 4th annual data protection maturity report all the more relevant. Review this report for a timely analysis of the threats, responses, policies, and technologies comprising today’s shifting data security landscape. It also reveals how organizations have made progress, the steps they plan to take to address data protection challenges in 2015—and where they may still be at risk.
Tags : data protection, data, security, cloud, storage
     Lumension
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, security, it management, data management
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too!
Tags : file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, it management
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft, it management
     Globalscape
By: HP     Published Date: Jan 26, 2015
Knowing how customers use the products and services you provide helps you improve what you offer, which helps you retain more customers, and attract new ones. This vital knowledge requires the analysis of traditional business data, machine data, and human information.
Tags : big data, hp haven, scalable, secure data platform, ecosystem, security
     HP
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection
     AlienVault
By: Delphix     Published Date: Jun 27, 2014
Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.
Tags : data security, masking products, agile masking, solution, creation, delivery, security, it management, data management
     Delphix
By: Delphix     Published Date: Mar 24, 2015
With the recent spike in data theft and cybercrime, data masking is becoming an invaluable element of organization's security strategies. Delphix Agile Masking transforms secure data delivery, and enhances compliance and security while accelerating data management processes across the board.
Tags : 
     Delphix
By: Delphix     Published Date: Mar 24, 2015
Data masking has long been a key component of enterprise data security strategies. However, legacy masking tools could not deliver secure data, undermining their impact. Explore how data as a service can deliver on the promise of masking, while increasing organizational flexibility and agility.
Tags : 
     Delphix
By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : data security, byod, corporate security, mobile data security, user experience, security, it management, data management
     IBM MaaS360
By: Dell     Published Date: May 03, 2016
Data security presents a series of moving targets that most IT organizations can’t manage.
Tags : 
     Dell
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security
Tags : 
     VMware SD-WAN by VeloCloud
By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : aberddeen, data center, datacenter, cloud, server security, networking, data management
     Intel Security
Start   Previous    64 65 66 67 68 69 70 71 72 73 74 75 76 77 78    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com