loss prevention

Results 51 - 75 of 119Sort Results By: Published Date | Title | Company Name

Loss Prevention: Protecting Profits with Actionable Insight

Published By: Oracle     Published Date: Jul 08, 2015
This e-book from Oracle Retail discusses the use case for expection-based reporting with specific examples and recommendations.
Tags : 
    
Oracle

Discover, Monitor and Protect Your Sensitive Information: Symantec Data Loss Prevention

Published By: Symantec     Published Date: Jun 18, 2015
Learn how to discover, monitor and protect your sensitive information to maximize the efficiency of your data management and see how you can greatly improve your data loss prevention.
Tags : 
security, data loss prevention, data management, monitor and protect, data efficiency
    
Symantec

Service-Based Masking: Critical to Data Loss Prevention and Threat Reduction

Published By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
    
Delphix

Agile Data Masking for Loss Prevention and Threat Reduction

Published By: Delphix     Published Date: Mar 24, 2015
With the recent spike in data theft and cybercrime, data masking is becoming an invaluable element of organization's security strategies. Delphix Agile Masking transforms secure data delivery, and enhances compliance and security while accelerating data management processes across the board.
Tags : 
    
Delphix

Nine Essential Requirements for Web Security

Published By: McAfee     Published Date: Nov 12, 2014
This paper characterizes web threats and explains why most security solutions in place today are ineffective.
Tags : 
web security, web protection, mcafee web gateway, mcafee saas web protection, mcafee data loss prevention, security, it management, business intelligence
    
McAfee

Data Loss Prevention Best Practices for Healthcare: The perils of data loss

Published By: McAfee     Published Date: Nov 12, 2014
This white paper outlines the best practices for better data loss prevention for healthcare organizations—from data discovery to classification to protection.
Tags : 
data loss prevention, dlp, healthcare, dlp best practices, data management, best practices, business activity monitoring
    
McAfee

Magic Quadrant for Content-Aware Data Loss Prevention

Published By: McAfee     Published Date: Nov 12, 2014
With noise about data loss prevention capabilities at an all-time high, this Gartner Magic Quadrant for Content-Aware Data Loss Prevention covers enterprise content-aware DLP solutions.
Tags : 
data loss prevention, dlp, healthcare, gartner magic quadrant, content-aware dlp, data management, best practices, business intelligence
    
McAfee

Best Practices for Implementing Data Loss Prevention (DLP) Webinar

Published By: McAfee     Published Date: Nov 12, 2014
Webinar showcasing best practices for implementing data loss preventino (DLP). Featuring Michael Avdeev, Enterprise Security Architect for the Intel Security Group.
Tags : 
data loss prevention, dlp, best practices, dlp implementation, it management, data management
    
McAfee

Five DLP Tips from Security Executives

Published By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : 
data loss prevention, data breaches, threats and mobility, security executives, corporate data, security
    
Symantec

Best Practices for Mobile Application Lifecycle Management

Published By: IBM MaaS360     Published Date: Sep 30, 2014
There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices, risk management, secure content management
    
IBM MaaS360

How Access Governance Makes Data Loss Prevention Successful

Published By: RSA Security     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
    
RSA Security

How Access Governance Makes Data Loss Prevention Successful

Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework, security, data management
    
RSA

Gartner MQ for Email & Web Security

Published By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, web services, web service security
    
Cisco

Making a business case for fraud-prevention technology

Published By: IBM     Published Date: Aug 08, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security, data loss prevention
    
IBM

Making a Business Case for Fraud-Prevention Technology

Published By: IBM     Published Date: Aug 06, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, banking, business, fraud-prevention, fraud, technology, security
    
IBM

Three Ways System Downtime Affects Companies and Four Methods to Minimize It

Published By: Globalscape     Published Date: Jul 31, 2014
Downtime happens and often at the worst time possible. Organizations experiencing downtime face direct and indirect costs from the loss of critical systems. This whitepaper discusses a Globalscape survey of 283 IT professionals and end users revealing the frequency of unplanned downtime, the effects on organizations, including average costs, and what IT administrators can do to minimize core system failure.
Tags : 
globalscape, downtime, productivity, it environments, critical systems, mission-critical systems, data loss prevention, security, load balancing, highly-scalable infrastructures, servers
    
Globalscape

Five Strategies for Email Data Loss Prevention

Published By: SilverSky     Published Date: May 22, 2014
Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.
Tags : 
silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention, data loss prevention, dlp, encryption, content delivery, secure content management, cloud computing, business technology
    
SilverSky

Five Strategies for Email Data Loss Prevention

Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption, it management, platforms, security management, information management, messaging
    
SilverSky

Mitigating DDoS Attacks with F5 Technology

Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks, business logic attacks, security, protections, data loss prevention, attack tools, network reconnaissance, low-bandwith asymmetric attacks, anti-attack technology, network security, application security, security management
    
F5 Networks Inc

Interactive Archiving

Published By: Mimecast     Published Date: Oct 29, 2013
Don’t just store information. Use it. Mimecast makes your email archiving work harder for business advantage.
Tags : 
mimecast, email, interactive archive, email archiving, interaction platforms, email platforms, ediscovery, data loss prevention, disaster recovery, cloud computing, backup and recovery, document management, information management, records management, business technology
    
Mimecast

The case for cloud-based disaster recovery

Published By: IBM     Published Date: Oct 10, 2013
In an around-the clock business world, you need nearly instantaneous failover and failback of your critical applications. Otherwise, you risk business losses and brand damage in the event of disruption or disaster. But how can you improve your existing disaster recovery operations? Read this brochure to learn how the power of cloud technologies can help you increase recovery speed, reliability and scalability
Tags : 
cloud, cloud technologies, cloud computing, applications, critical applications, applications management, risk, business losses, brand damage, disruption, disaster recovery, disaster recovery operations, loss prevention, recovery speed, reliability, scalability, security, it management, risk management, data protection
    
IBM

The Convergence Of Reputational Risk and IT Outsourcing

Published By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : 
reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets, protection, safeguarding, outsourcing, risk management, data loss, data loss prevention, global it solutions, best practices, enterprise resource planning, it spending, return on investment
    
IBM

2013 Mobile Malware Report

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless, business technology, data center
    
Blue Coat Systems

Mobile Security Challenge Emerges

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless, storage, business technology, data center
    
Blue Coat Systems
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.