insider

Results 1 - 25 of 163Sort Results By: Published Date | Title | Company Name

10 Essential SQL Server Security Tasks

Published By: GreenSQL     Published Date: Nov 11, 2014
This report provides the 10 essential SQL server security tasks
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
    
GreenSQL

2017 Digital Marketing Trends

Published By: Sparxoo     Published Date: Dec 21, 2016
With a new year upon us, it's time to put out Nostradamus hat on and give our best predictions for 2017. It's time for a fresh perspective as you look at your marketing plans and /make sure your initiatives are aligned for success. Our digital marketing gurus have pulled insights and trends together to give you insider secrets on digital marketing and how can you get a leg up on your competition. Why? Because we dig digital, and want to spread the love.
Tags : 
sparxoo, digital marketing, trend, marketing, forecast, insights, analytics
    
Sparxoo

5 Best Practices for Application Security: A How-To Guide

Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable

5 must-have hospitality payments solutions to improve customer experience in 2018

Published By: Sage People     Published Date: Dec 06, 2017
Your customers won't rave about a simple payment experience. They won't talk on social media about the slickness of the online checkout process, but they will make a lot of noise about a bad payment experience, and your conversion rates and sales will take a hit. Learn how to delight your customers with our FREE insider’s guide to creating the perfect payments customer experience
Tags : 
    
Sage People

5 questions executives should be asking their security teams

Published By: Microsoft Office 365     Published Date: Sep 20, 2016
Data security isn’t just about data security. It’s about job security. And marketing. And finance. And company valuation. Download the new eBook to see what questions you need to ask about your organization’s security measures, why they matter, and what else you need to know. Here’s what you need to ask your team: 1. Do you feel limited by budget or staff size? 2. How often do you see unsanctioned cloud services in use? 3. Are you protecting yourself against insider threats? 4. Do you have a cybersecurity task force in place? 5. Is your "bring your own device" policy secure?
Tags : 
    
Microsoft Office 365

5 Secrets to Increase Website Traffic

Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales
    
VisiStat

A Field Guide to Insider Threat

Published By: Intel Security     Published Date: Apr 06, 2016
Enterprises can use the Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
Tags : 
risk, threat, attack vector, security strategy, security architect, information, continuous response, incident
    
Intel Security

A Zendesk cheat sheet for picking your support solution

Published By: Zendesk     Published Date: Aug 22, 2017
Shopping around for customer support software? Here’s our cheat sheet with over 50+ questions to ask each vendor in your RFP. We know evaluating vendors can be overwhelming, but hopefully armed with this insider knowledge you’ll feel like a pro.
Tags : 
customer support software, customer service tool, customer relationship, multichannel support tool, customer support vendor evaluation, knowledge base management, help desk software, help desk portal
    
Zendesk

Accidental or Malicious? Five Pillars of Insider Threat Risk Mitigation

Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application, anti spam, anti spyware, anti virus
    
Forcepoint

Address the Insider Threat of Privileged Users

Published By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : 
netiq, insider threat, security, audits, access control, enterprise software, anti spam, anti spyware
    
NetIQ

Advanced Persistent Threats: Insider Credentials at Risk

Published By: NETIQ     Published Date: Dec 05, 2013
This flash point paper discusses advanced persistent threats, the risks they pose, and how automation makes real-time response a reality. It covers questions you should ask yourself and things to consider before making an investment.
Tags : 
netiq, advanced persistent threats, insider credentials, real-time threat response, automation, security, it management
    
NETIQ

An Email Marketing Delivery Report for 2010: Yahoo, Hotmail, AOL & Gmail

Published By: EmailDirect     Published Date: Nov 12, 2009
Insider information pertaining to deliverability changes affecting email sent to Yahoo, Hotmail, AOL and Gmail. Find out how authentication, domain reputation and user engagement metrics will affect your email delivery in 2010. It's not all about your IP's anymore!
Tags : 
emaildirect, email marketing, emarketing, gmail, yahoo, aol, deliverability, email
    
EmailDirect

An Insiders' Guide to 3D Imaging for Mobile Systems

Published By: Movidius     Published Date: Jan 10, 2011
This whitepaper outlines methods for creating high quality HD 3D images and shows the potential of 3D as a new standard for mobile devices
Tags : 
mobile, autostereoscopic, parallax, convergence
    
Movidius

An Insider’s Guide to Agile Testing and Service Virtualization

Published By: IBM     Published Date: Oct 10, 2014
Get the essentials about agile testing and service virtualization from several different perspectives – get an analyst’s take from Diego Lo Giudice of Forrester Research on how to remove agile testing bottlenecks and ways to calculate your potential return on investment for Service Virtualization
Tags : 
ibm, virtualization, service virtualization, service components, deploying service, team productivity, software quality, dependent services
    
IBM

An Insider’s Guide to Agile Testing and Service Virtualization

Published By: IBM     Published Date: Oct 02, 2015
Get the essentials about agile testing and service virtualization from several different perspectives
Tags : 
agile testing, service virtualization, return on investment, roi, mobile development, packaged applications, software development, it management
    
IBM

Anticipating the Unknowns: Chief Information Security Officer (CISO) Benchmark Study

Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA

Anticipating the Unknowns: Chief Information Security Officer (CISO) Benchmark Study

Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA

Avoiding Insider Threats to Enterprise Security

Published By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : 
ibm, user access, enhanced security, security risk, networking, security, it management, knowledge management
    
IBM

Balancing Social Networking with Network Security Objectives

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems

Balancing Social Networking with Network Security Objectives

Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems UK

Battling security threats from within your organization

Published By: IBM     Published Date: Jan 07, 2016
This paper outlines the challenge of insider threats - who they are, the damage and financial loss they can cause, and what organizations can do to protect themselves.
Tags : 
ibm, security, threat, insider threat
    
IBM

Bekämpfung von Insiderbedrohungen und gezielten Angriffen

Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager Schützt und steuert privilegierte Anwender und die Anmeldeinformationen, die sie für die Nutzung und das Management Ihrer digitalen Infrastruktur verwenden. Die Lösung erzwingt proaktiv Security-Richtlinien und rollenbasierte Begrenzungen für Zugriffe privilegierter Anwender – und überwacht und zeichnet gleichzeitig die Aktivitäten privilegierter Anwender in virtuellen, physischen und Cloud-basierten Umgebungen auf.
Tags : 
    
CA Technologies EMEA

Bloor: Data Masking Market Update

Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix

Blue Coat WebFilter: Delivering the web access your users want with the control you need

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems

Blue Coat WebPulse: Technical Overview of the WebPulse Collaborative Defense

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.