internal threats

Results 26 - 39 of 39Sort Results By: Published Date | Title | Company Name

Leveraging data for internal and external threat detection

Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy, risk management, vulnerability management, access control, identity management, intrusion detection, intrusion prevention, security management, security policies
    
IBM Software

Leveraging data for internal and external threat detection

Published By: IBM Software     Published Date: Oct 24, 2011
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software

Intelligence-Led Security: Develop a Concrete Plan

Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance

The Keys to Securing Data in a Collaborative Workplace

Published By: Dropbox for Business     Published Date: Jun 09, 2014
Losing data is costly. According to the Ponemon Institute, the average data breach costs US organizations an estimated $200 per record, or $5.4 million total per breach. And apparently these breaches are equally likely to be from criminal attack as from employee or contractor negligence. It makes sense then that surveys point to data loss via unsecured file sync and share solutions as one of IT’s biggest concerns. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?
Tags : 
dropbox, data, workplace, breach, security, data management, data center
    
Dropbox for Business

The Impact of Messaging and Web Threats

Published By: Sunbelt Software     Published Date: Mar 27, 2008
Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses.
Tags : 
messaging, security, web threats, email threats, email security, spam, trojan, sunbelt, internet security, intrusion prevention, secure instant messaging
    
Sunbelt Software

Should You Install Messaging Security Software on Your Exchange Server?

Published By: Sunbelt Software     Published Date: Aug 04, 2008
Security is the most single critical task for any email administrator. Starting with a foundation of anti-spam and anti-virus capabilities, organizations should focus on other capabilities, as well, including policy management and a variety of other tasks designed to protect the network and the company from external and internal threats.
Tags : 
email security, secure messaging, secure im, exchange, exchange server, microsoft exchange, ms exchange, sunbelt, sunbelt software, security, security management, secure instant messaging
    
Sunbelt Software

Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring

Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire

The endpoint platform for organizations of every size

Published By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
ibm, ibm bigfix, risk management, data security, security, knowledge management, enterprise applications
    
IBM

The endpoint platform for organizations of every size.

Published By: IBM     Published Date: Jul 15, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : 
cyberattack, ibm, security, access protection, best practices, business intelligence, business management, business technology
    
IBM

8 Elements of Complete Vulnerability Management

Published By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : 
vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus, auditing, compliance, email security, encryption, hacker detection, high availability, identity management, intrusion detection, intrusion prevention, security management, data loss prevention
    
SilverSky

Major Concerns for Network and Systems Administrators in 2008

Published By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : 
gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats, internal, spam, gullibility, security holes, human error, pebcac, network security, access control, monitoring, email security, business activity monitoring, data protection
    
GFI

Why It Pays to Take a Business-Centric Approach to Compliance

Published By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance, business technology
    
NETIQ

Internal Threats Personified: How Employees Can Jeopardize Your Cybersecurity

Published By: Mimecast     Published Date: Oct 02, 2019
When it comes to securing email and protecting against cyberattacks, most organizations focus their attention and resources on inbound emails. Yet, only 40% of email originates through inbound system traffic. The other 60% of email traffic is introduced via internal-to-internal (40%) or outbound (20%) email communications. This E-book takes a close look at several email-related activities that employees often engage in that contribute to the spread of insider threats and discusses what measures organizations can take to protect themselves.
Tags : 
    
Mimecast

Enterprise Organizations Need to Prepare for Cyber-attack ‘Hunting’

Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data, security, business technology
    
ArborNetworks
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.