security data

Results 1601 - 1625 of 1762Sort Results By: Published Date | Title | Company Name
By: MessageLabs     Published Date: Jul 02, 2009
Get to grips with hosted security: Hosted security? Managed security? Cloud security? SaaS? The latest hype, or the secret to hassle free IT Security? Understand how Hosted Security can save you time & money whilst delivering highly accurate threat protection. Download today!
Tags : messagelabs, security, it management, email security, web security, email archive, continuity, ‘software as a service’
     MessageLabs
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
In this must read white paper, you will learn about cloud computing, new opportunities, new security challenges and how to ensure your data is safe.
Tags : cloud, hosting company, security, ssl certificate, verisign inc., verisign ssl certificate
     VeriSign Authentication Services, now a part of Symantec Corp.
By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : platforms, data management
     BMC Control M
By: NeoSpire Managed Hosting     Published Date: Oct 22, 2009
With the massive amount of information on an ever-evolving subject, understanding and becoming PCI compliant can be a daunting task. The process of becoming PCI compliant following the PCI SSC recommended process involves over 160 steps to a merchant's security system and can easily be misinterpreted. NeoSpire presents the Top 10 Misconceptions about PCI.
Tags : pci, neospire, security, compliance, paypal, data security standards
     NeoSpire Managed Hosting
By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security
     Symantec.cloud
By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce.
Tags : messagelabs symantec hosted services, wireless workforce, mobile data security, data and services, business practices, security, management policy
     Symantec.cloud
By: NetApp     Published Date: Apr 27, 2010
Close collaboration between NetApp, Cisco, and VMware has resulted in the industry's first secure multi-tenancy solution to partition shared IT infrastructure which delivers performance, availability, and responsiveness, while maintaining cost efficiencies. Download this exclusive report from analyst ESG to learn more.
Tags : netapp, esg report, it infrastructure, secure multi-tenancy, security, virtualized data center, vmware, cisco
     NetApp
By: GoToMeeting     Published Date: Jul 29, 2011
Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.
Tags : gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
     GoToMeeting
By: SAS     Published Date: Apr 16, 2015
We often hear about how the massive volumes of data the US government collects hold a treasure trove of answers to our most challenging questions be it on population health, national security, education or how to recoup losses from tax fraud. If only the government could figure out how to make use of all that information. Texas is one example of a government that is using analytics to solve complex problems. As the case studies here demonstrate, agencies and academia in the Lone Star State are putting big data and analytics to work to eliminate waste, improve productivity and, in some cases, even enhance transparency.
Tags : 
     SAS
By: SAS     Published Date: Aug 03, 2016
A paradigm shift is underway in the cybersecurity industry. Cybersecurity professionals are moving from a focus on attacker prevention to attacker detection. Preventing the bad guys from getting in is still important, but cyber adversaries are increasingly able to bypass even the most sophisticated network defenses. Once inside, it is more important than ever to find these attackers fast, before their activities get buried in the daily volume and pulse of network communications. This is where security analytics holds promise. Security analytics provides the necessary and timely visibility into normal and abnormal network behavior. This visibility enables devices and entities acting suspiciously to be quickly identified and investigated.
Tags : cyber security, security, best practices, attacker prevention, paradigm shift, security analytics, technology, business technology
     SAS
By: Cytiva, Inc.     Published Date: Aug 30, 2010
This document is designed to give you a high level overview of the kind of information security practices you should expect from any applicant tracking vendor you evaluate or use.
Tags : data protection, security, applicant tracking, cytiva
     Cytiva, Inc.
By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : pci compliance, compliance, scriptlogic, pci, security standard, data security, lifecycle, virtual
     ScriptLogic
By: ScriptLogic     Published Date: Jan 11, 2012
Discover how the software helps achieve compliance with HIPAA standards, by giving IT administrators the power and control they need.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: ScriptLogic     Published Date: Jan 11, 2012
In this whitepaper, we will discuss the challenges of managing delegation with native tools and how you can end the delegation nightmare with Active Administrator from ScriptLogic.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: ScriptLogic     Published Date: Jan 11, 2012
In this white paper learn how to have a fluid help desk to work flow and how to resolve quickly and correctly, users IT issues. Read on.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: ScriptLogic     Published Date: Jan 11, 2012
This white paper looks at what really needs to be done and how to enable your organization to be license efficient.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
     e-DMZ Security LLC
By: Okta     Published Date: Apr 29, 2015
2014 was a banner year for security breaches. According to the Identity and Theft Research Center, there were 783 reported U.S. data breaches, a 27.5% increase from 2013. Keeping your company and customer data safe is no longer just an IT problem; it's a top concern for C-level executives as well. Your company's reputation and bottom line depend on keeping corporate data secure yet employee mobility is making this a huge challenge. Read this eGuide to learn how to avoid these challenges with simpler, smarter authentication.
Tags : theft, research center, c-level, okta, theft research, security, it management
     Okta
By: CS Risk Management & Compliance Ltd     Published Date: Oct 15, 2010
This white paper gives some tips on how to manage data privacy and to prevent data breaches
Tags : data protection, dpa, security, it security, ico, data protection act
     CS Risk Management & Compliance Ltd
By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : cloud, security, data centre, sla, continuity, disaster recovery
     The Bunker
By: NetIQ     Published Date: Jan 12, 2011
This white paper discusses the growing demand for IT security auditing and why current approaches-manual procedures, scripts, and network vulnerability scanners- fail.
Tags : netiq, automating it security, audit, compliance, data protection, network vulnerability, secure configuration manager tool, automation
     NetIQ
By: VeriSign     Published Date: Feb 10, 2011
This paper reveals the latest advances in SSL technology and how these advances ensure your customers have confidence in the security of your site, as well as protecting them from threats such as phishing, data manipulation and other site scams.
Tags : verisign, ssl, security, phishing, data manipulation, threats, protection, secure sockets layer
     VeriSign
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com