reach

Results 176 - 200 of 1529Sort Results By: Published Date | Title | Company Name

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies

Breaking the Kill Chain: Stopping Data Breaches with Privileged Access Management

Published By: CA Technologies     Published Date: Aug 26, 2016
It’s impossible for a day to pass in which we don’t hear news of yet another data breach, with its resulting loss of proprietary secrets, financial records or personal information. These incidents span all sectors of the economy: commerce, education and government
Tags : 
    
CA Technologies

Determining the True Costs of a Data Breach

Published By: Secureworks     Published Date: Nov 11, 2016
This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.
Tags : 
managed security services, data breach, security, hackers, security, threat and vulnerability management, cost, hacker detection, vulnerability management, data loss prevention
    
Secureworks

Warehousing challenges and opportunities for the middle market

Published By: RSM US     Published Date: Apr 01, 2019
Middle market companies face a host of warehousing challenges that can limit growth and potentially hamper sustainability. Your organization must work to understand these issues and develop solutions to store, manage and move goods more effectively and therefore increase efficiency and productivity. With competition growing and new enhancements reaching the market on a regular basis, your company must be proactive to build and retain a competitive advantage. While each company is different, with unique issues and goals, the following four struggles are common across companies and their warehouses.
Tags : 
    
RSM US

Anatomy of a Cyber Attack The Lifecycle of a Security Breach

Published By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
    
Oracle Linux

Deep Packet Inspection for Threat Analysis Advisory

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity

Enterprise Data Security: The Basics Of User Behavior Analytics

Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies

Using Threat Analytics To Protect Privileged Access And Prevent Breaches

Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies

How Can I Defend My Hybrid Enterprise From Data Breaches And Insider Threats?

Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies

Breaking The Kill Chain Stopping Data Breaches With Privileged Access Management

Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies

Cybercrime Tactics and Techniques Q1 2019

Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA

Identity Theft Have Met Their Match

Published By: Intel     Published Date: Jul 17, 2019
The need for identity protection has never been stronger. Identity theft accounted for 74 percent of all data breaches in the first half of 2017, and costs associated with cybercrime are expected to reach $6 trillion annually by 2021. Any time an employee's username and password are compromised, your business is vulnerable. Eight-character passwords that changed every 90 days worked well a decade ago, but increasingly commonplace attack methods like password cracking, phishing, or screen scraping call for a new kind of protection.
Tags : 
    
Intel

Insiders are Still the Weakest Link in your Data Security Chain

Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software, content management system
    
Absolute Software

Achieving HIPAA Compliance

Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity, business intelligence, business management
    
Absolute Software

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security, security management, business analytics, business integration, business intelligence
    
Absolute Software

DEVOPS AND SECURITY: TOO LITTLE, TOO LATE

Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard

Learn How Citrix Can Help Reduce Costs While Reaching New Levels of Mobility

Published By: Citrix Systems     Published Date: Feb 23, 2011
By using Citrix ReceiverT, organisations are able to deliver virtualized applications and desktops to their employees' mobile devices.
Tags : 
citrix systems australia, customer profile, apple ipad, citrix receiver, employee productivity, mobile devices, virtual desktop, mobile computing, mobile data systems, mobile workers, productivity, desktop management
    
Citrix Systems

The Four Social Marketing Tools You Need

Published By: Adobe     Published Date: Jan 27, 2014
Tools and Technology: The Social Marketing Playbook
Tags : 
social media, social media marketing, social technology, social reach, social vendors
    
Adobe

Ten ways Cross-Channel Marketing is not Rocket Science

Published By: Adobe     Published Date: Feb 09, 2016
Marketing is changing. The traditional model, which saw the customer path as a linear funnel, is broken. Today, customers follow whatever path they want, and you’re expected to reach out to them on their terms.
Tags : 
marketing, marketing strategies, marketing trends, customer experience, data, customer relationships, customer interaction service, customer relationship management
    
Adobe

Le Marketing Cross-Canal est moins compliqué que la conquête spatiale : Les dix raisons

Published By: Adobe     Published Date: Feb 09, 2016
Marketing is changing. The traditional model, which saw the customer path as a linear funnel, is broken. Today, customers follow whatever path they want, and you’re expected to reach out to them on their terms.
Tags : 
marketing, marketing strategies, marketing trends, customer experience, data, customer relationships, customer relationship management, customer satisfaction, customer experience management
    
Adobe

10 Gründe, warum Cross-Channel-Marketing nichts Überirdisches ist.

Published By: Adobe     Published Date: Feb 09, 2016
Marketing is changing. The traditional model, which saw the customer path as a linear funnel, is broken. Today, customers follow whatever path they want, and you’re expected to reach out to them on their terms.
Tags : 
marketing, marketing strategies, marketing trends, customer experience, data, customer relationships, customer relationship management, customer satisfaction, content management system, customer experience management
    
Adobe

LOCATION, LOCATION, LOCATION. For your customers, it matters. For you, it should too

Published By: Adobe     Published Date: Oct 05, 2016
Retailers are always searching for ways to enhance the in-store shopping experience. Now, beacon technology allows them to reach out to customers on mobile as they shop, to deliver special offers and real-time answers to their in-store questions.
Tags : 
customer experience, ecommerce, customer relationship, customer
    
Adobe

STANDORT, STANDORT, STANDORT Wichtig für Ihre Kunden. Und für Sie.

Published By: Adobe     Published Date: Oct 05, 2016
Retailers are always searching for ways to enhance the in-store shopping experience. Now, beacon technology allows them to reach out to customers on mobile as they shop, to deliver special offers and real-time answers to their in-store questions.
Tags : 
customer experience, ecommerce, customer relationship, customer
    
Adobe

UN MAÎTRE MOT : LA GÉOLOCALISATION. Elle est importante pour vos clients.

Published By: Adobe     Published Date: Oct 05, 2016
Retailers are always searching for ways to enhance the in-store shopping experience. Now, beacon technology allows them to reach out to customers on mobile as they shop, to deliver special offers and real-time answers to their in-store questions.
Tags : 
customer experience, ecommerce, customer relationship, customer
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.