insider

Results 126 - 150 of 163Sort Results By: Published Date | Title | Company Name

How To Successfully Protect Your Data Against the Insider Threat

Published By: Forcepoint     Published Date: May 06, 2016
Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.
Tags : 
    
Forcepoint

Infographic: How to Get Your Insider Threat Program Funded

Published By: Forcepoint     Published Date: May 06, 2016
Download this infographic to learn 5 steps to get your insider threat program funded and protect your organization's sensitive data.
Tags : 
    
Forcepoint

An Email Marketing Delivery Report for 2010: Yahoo, Hotmail, AOL & Gmail

Published By: EmailDirect     Published Date: Nov 12, 2009
Insider information pertaining to deliverability changes affecting email sent to Yahoo, Hotmail, AOL and Gmail. Find out how authentication, domain reputation and user engagement metrics will affect your email delivery in 2010. It's not all about your IP's anymore!
Tags : 
emaildirect, email marketing, emarketing, gmail, yahoo, aol, deliverability, email, inbox, spam, dkm, engagement
    
EmailDirect

Using Analytics to Proactively Deter Insider Threats (Insider Threat & VI)

Published By: SAS     Published Date: Mar 31, 2016
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target, and likely already is. According to the Privacy Rights Clearinghouse, at the time of this writing, 884,903,517 records were breached in 4,621 incidents documented since 2005.
Tags : 
analytics, prevention practices, best practices, data security, data management, best practices, prediction practices, security, monitoring, business activity monitoring, information management
    
SAS

Implementing an Employee Monitoring Program

Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the SpectorSoft Implementing Monitoring white paper and you will learn how to assist company executives with determining whether or not to implement employee activity monitoring.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft

Insider Threat Survey Report

Published By: SpectorSoft     Published Date: Apr 18, 2014
Download The SpectorSoft Insider Threat Survey Report and read about 10 alarming Insier Threat trends.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft

Simplifying Employee Investigations

Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the Simplifying Employee Investigations white paper and learn about some of the real-world issues businesses face that result in employee investigations, the methodologies used to perform investigations, and then we’ll look at why investigating proactively can help.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft

Monitoring Employee Productivity in a Roaming Workplace

Published By: SpectorSoft     Published Date: Apr 22, 2014
Remote employees have more opportunity for distraction, lack of training, and inability to be refocused on task than their in-office counterparts, so companies need to get serious about ways to gain visibility into the activities of their remote employees to gauge productivity
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft

Risk Mitigation: Keeping Employee Risk from Becoming Insider Threat

Published By: SpectorSoft     Published Date: Jan 23, 2015
This White Paper will present some common sense suggestions for improving the “beginning of the lifecycle” risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, we’ll look at how to tie the efforts made at the beginning of the lifecycle to the rest of the employee lifecycle, using a combination of process and tools to significantly improve security, and reduce the chances of an insider incident.
Tags : 
spectorsoft, risk mitigation, insider threat, background checks, screening process, hiring process, networking, security, it management
    
SpectorSoft

An Insider’s Guide to Agile Testing and Service Virtualization

Published By: IBM     Published Date: Oct 10, 2014
Get the essentials about agile testing and service virtualization from several different perspectives – get an analyst’s take from Diego Lo Giudice of Forrester Research on how to remove agile testing bottlenecks and ways to calculate your potential return on investment for Service Virtualization
Tags : 
ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services, bootstrapping virtual, virtual components, virtualize, reduce costs, reduce risks, increase quality, virtualization ekit, agile testing, best practices, productivity, service management
    
IBM

Insider Threats: How to Spot Trouble Quickly with AlienVault USM

Published By: AlienVault     Published Date: Jul 22, 2016
Join us for this technical demo showing how USM can help you detect: Malware infections on end-user machines Insiders misusing network resources Users engaging in suspicious behaviors
Tags : 
    
AlienVault

WebPulse Collaborative Defense: Proactively Defending Your Network Against Malware

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection, blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring, anti spam, anti spyware, anti virus, application security, auditing, authentication
    
Blue Coat Systems

5 Secrets to Increase Website Traffic

Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales, advertising, marketing campaign, ad tracking, generate leads, sales leads, online sales, sales tool, small business, ecommerce, search engine ranking, seo, keywords
    
VisiStat

Intrusion Prevention System Solutions Enable Sarbanes Oxley Compliance

Published By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : 
sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime, hacker, intrustion detection, toplayer, compliance, top layer, sarbanes oxley compliance
    
TopLayer

Change Control: Learn How to Address the Insider Threat

Published By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : 
insider threat, network security, it administrator, comply with regulations, it infrastructure, compliance, change management, it management, access control, it security, netiq, net iq, security, governance, infrastructure, network architecture, network management
    
NetIQ Corporation

Evaluating a Storage Security Solution

Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru, network attached storage
    
Decru

Pod Slurping: An Easy Technique for Stealing Data

Published By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi, storage management, identity management, security policies
    
GFI

The Threats Posed By Portable Storage Devices

Published By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi, storage management, identity management, security policies
    
GFI

Ensure the Integrity of your Content: ProofMark System Technical Overview

Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace

e-Life Sciences 2010: Enabling a Trusted Electronic Value Chain

Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace

The Digital Signature Paradox

Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace

The Principles of Electronic Agreement Legal Admissibility

Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace

Does Online Learning Increase Your Sales?

Published By: BlueVolt     Published Date: Aug 24, 2010
This white paper shows opinions from manufacturing and electrical industry insiders on the value of using a learning management system.
Tags : 
online learning, elearning, learning management system, sales, training, manufacturing, electrical distributors, bluevolt, best practices, enterprise software
    
BlueVolt

An Insiders' Guide to 3D Imaging for Mobile Systems

Published By: Movidius     Published Date: Jan 10, 2011
This whitepaper outlines methods for creating high quality HD 3D images and shows the potential of 3D as a new standard for mobile devices
Tags : 
mobile, autostereoscopic, parallax, convergence
    
Movidius
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.