insider

Results 101 - 125 of 163Sort Results By: Published Date | Title | Company Name

IBM System x3400 M3 Server - Insider Guide

Published By: IBM Corp     Published Date: Jun 20, 2011
Find out more about how the x3400 M3 makes a strong foundation can solve a number of interesting business challenges for small and medium businesses.
Tags : 
flexibility, scalability, ibm, x3400 m3 server, small business, medium business, smb, expansion, growing, express seller, interoperability, server hardware, servers, infrastructure, design and facilities
    
IBM Corp

The Recruiter's Insider Series: Optimizing Your Employee Referral Program

Published By: Jobvite     Published Date: Oct 02, 2013
Optimizing Your Referral Program is an essential guide for anyone who is interested in implementing a new referral program—or for those with existing programs that are looking to improve their success rates.
Tags : 
employee referral, referral program, social recruiting
    
Jobvite

Closing the Loopholes in Identity Governance to Minimize Risk

Published By: NETIQ     Published Date: Jan 12, 2017
Today’s attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
    
NETIQ

From Endpoint to Network to Cloud: Optimized Data Lifecycle Security in an Era of Pervasive Threats

Published By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee

Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.

When Encryption Is Not Enough

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.

The Recruiter's Insider Series: Optimizing Your Employee Referral Program

Published By: Jobvite     Published Date: Sep 24, 2013
Optimizing Your Referral Program is an essential guide for anyone who is interested in implementing a new referral program—or for those with existing programs that are looking to improve their success rates.
Tags : 
    
Jobvite

Global HCM Implementation From Those Who Know

Published By: Aasonn     Published Date: Sep 26, 2014
Download to hear individual reflections and advice from SuccessFactors customers on their implementation journey. Personally listen to the unique takeaways and recommendations from the world’s most experienced Implementation Consultants, Project Managers, SAP Solution Architects, Sales Executives and Strategic Change Management Consultants. Here is your chance to get the insiders view.
Tags : 
aasonn, successfactors, hr project, customer experiences
    
Aasonn

2017 Digital Marketing Trends

Published By: Sparxoo     Published Date: Dec 21, 2016
With a new year upon us, it's time to put out Nostradamus hat on and give our best predictions for 2017. It's time for a fresh perspective as you look at your marketing plans and /make sure your initiatives are aligned for success. Our digital marketing gurus have pulled insights and trends together to give you insider secrets on digital marketing and how can you get a leg up on your competition. Why? Because we dig digital, and want to spread the love.
Tags : 
sparxoo, digital marketing, trend, marketing, forecast, insights, analytics
    
Sparxoo

Inside Edge Article featuring John Chen from SAP Insider

Published By: SAP     Published Date: Dec 20, 2010
Mobility is sweeping across the enterprise. Consider a company like Kindred Healthcare, which has boosted the productivity of its rehabilitation therapists and the accuracy of its patient records through the use of mobile devices.
Tags : 
sap, sybase, mobility, mobile workers, idc, mcommerce, healthcare, mobile computing, mobile data systems, enterprise resource planning
    
SAP

Build Your Own SAP CRM Solution - and Know Exactly How Much It Will Cost

Published By: SAP     Published Date: Mar 25, 2011
Read the article about SAP Rapid Deployment Solutions for SAP CRM. The article answers three important questions about these solutions, discussing what functionality is available, why you can be sure the implementation will bring rapid benefits, and where you can find more information. (SAPinsider, Jan - March 2011 )
Tags : 
sap rapid deployment solutions, sap crm, rds for sales, rds for marketing, enterprise software, simulation software, sap
    
SAP

What's your Customer Experience Advantage?

Published By: SAP     Published Date: Mar 25, 2011
SAP Insider Article covering new SAP CRM innovations which help companies empower their employees, substantially improve the customer experience, and thereby achieve a competitive advantage.
Tags : 
competitive advantage, sap crm, customer experience, customer experience advantage, customer interaction service, customer relationship management, customer satisfaction, customer service, sap
    
SAP

The Business Information Revolution: Best-Run Businesses Innovate Better with SAP

Published By: SAP     Published Date: Apr 14, 2011
The recent wave of new business analytics tools, solutions, and capabilities marks a true revolution in BI. In this SAPinsider Special Report on Business Intelligence, SAP Executive Vice President Sanjay Poonen lends his insights on the market drivers for this BI revolution, and explains what it all means for SAP customers. The article also features SAP ecosystem partners highlighting how SAP customers can unleash the power of information to truly innovate their business.
Tags : 
business intelligence, business analytic tools, sanjay poonen, information management, enterprise performance management, governance, manufacturing intelligence, sap, performance, data quality
    
SAP

Close the Window on Three Window Server Threat Scenarios

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation

Using Analytics to Proactively Detect Insider Threat 

Published By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS’ unique, hybrid approach to insider threat deterrence – which combines traditional detection methods and investigative methodologies with behavioral analysis – enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
    
SAS

Industry Insider: Best Social Media Among Fast Food Chains

Published By: Sysomos     Published Date: Oct 24, 2012
The fast food business is worth more than $200 billion. This report digs into social media conversations to discover who's winning the burger wars. Includes social media ratings for Burger King, McDonald's, KFC, and Taco Bell.
Tags : 
sysomos, heartbeat, map, social media monitoring tools, business intelligence, analysis, analytics, dashboard, tracking, buzz, trends, assessment, agency, business, enterprise, network, twitter, facebook, fans, fast food industry report
    
Sysomos

A Field Guide to Insider Threat

Published By: Intel Security     Published Date: Apr 06, 2016
Enterprises can use the Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
Tags : 
risk, threat, attack vector, security strategy, security architect, information, continuous response, incident, monitoring, remediation
    
Intel Security

Avoiding Insider Threats to Enterprise Security

Published By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : 
ibm, user access, enhanced security, security risk, networking, security, it management, knowledge management, data management
    
IBM

Mitigating risks with security intelligence and identity assurance

Published By: IBM     Published Date: Oct 13, 2015
White paper describes how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
Tags : 
ibm, security intelligence, identity assurance, intelligent iam, boost compliance, qradar, security, data management, business technology
    
IBM

Safeguard Sensitive Data Against Insider Threats and External Attacks: Top 5 scenarios

Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management, knowledge management, enterprise applications, business technology
    
IBM

Get smart to shut down insider threats: Reduce the risk of insider-related data loss

Published By: IBM     Published Date: Sep 30, 2016
Read this white paper to learn about how to get smart about insider threat prevention, including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third party collaboration.
Tags : 
ibm, data, big data, security, data loss, data protection, threat provention, knowledge management, enterprise applications, data management
    
IBM

Reduce The Risk Of Insider-Related Data Loss With Intelligent, Integrated Security From IBM

Published By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM

No More Chewy Centers: The Zero Trust Model Of Information Security

Published By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM

5 questions executives should be asking their security teams

Published By: Microsoft Office 365     Published Date: Sep 20, 2016
Data security isn’t just about data security. It’s about job security. And marketing. And finance. And company valuation. Download the new eBook to see what questions you need to ask about your organization’s security measures, why they matter, and what else you need to know. Here’s what you need to ask your team: 1. Do you feel limited by budget or staff size? 2. How often do you see unsanctioned cloud services in use? 3. Are you protecting yourself against insider threats? 4. Do you have a cybersecurity task force in place? 5. Is your "bring your own device" policy secure?
Tags : 
    
Microsoft Office 365

Current State of Email Security Report

Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
    
Microsoft Office 365
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.