sensitive data

Results 101 - 125 of 269Sort Results By: Published Date | Title | Company Name

Five Key Business Insights for Mobile Security In a BYOD World

Published By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
insights, mobile, security, byod, lookout
    
Lookout

Five Key Business Insights for Mobile Security in a BYOD World

Published By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout

Five Strategies for Email Data Loss Prevention

Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption, it management, platforms, security management, information management, messaging
    
SilverSky

Forrester TechRadar: Data Security

Published By: Intralinks     Published Date: Jan 16, 2015
As the tide of data continues to rise, the burden of protecting sensitive data and preventing security breaches can be crushing. This Forrester TechRadar ™: Data Security report provides a framework for developing a long-term approach to keeping your organization’s information secure. This TechRadar evaluates 20 of the key traditional and emerging data security technologies that can be used to support the key recommendations and best practices of Forrester’s Data Security and Control framework. Key Contents: - Why the Future of Data Security Matters - Why Do These 20 Technologies Appear in the TechRadar?- Most Tech is Still in the Early Stages
Tags : 
data security, sensitive data, secure information, control framework, security
    
Intralinks

Four steps to a proactive big data security and privacy strategy

Published By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : 
big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches, compliance, identity management, intrusion detection, intrusion prevention, security management, pci compliance, data loss prevention
    
IBM

Frost & Sullivan Analyst Paper, 'Six Golden Rules for Selecting an SSL Certificate'

Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec

Gartner: Seven Imperatives to Adopt a CARTA Strategic Approach

Published By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
    
Tenable

Get the Access Control You Need for Office 365

Published By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. It’s easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month — and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
    
SecureAuth

GlobalSCAPE Provides a Competitive Edge for Williams Lea

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Williams Lea is a leading global provider of customized corporate information solutions. The company needed to reliably, easily and securely transfer sensitive files and implement a system to share files and ensure a business continuity/disaster recovery plan.  Today, Williams Lea uses the GlobalSCAPE’s Enhanced File Transfer (EFT) solution to provide secure protocol support and encryption to protect data in transit and at rest.
Tags : 
eft, enhanced file transfer, managed file transfer, mft, disaster recovery, business continuity, data protection, globalscape, security, information management
    
GlobalSCAPE

Guard Your Organization's Data With Intelligent IBM Encryption

Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM

Guard Your Organization's Data with Intelligent IBM Encryption

Published By: IBM     Published Date: Oct 16, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on-premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
ibm, encryption, hybrid-cloud, data protection
    
IBM

Here’s what’s missing from your security strategy

Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Cybersecurity has been the #1 higher education IT concern for three straight years. Find out why identity plays an integral role in providing easy access to applications and files, while also securing sensitive data. Download the Report
Tags : 
    
SailPoint Technologies

Here’s what’s missing from your security strategy

Published By: SailPoint Technologies     Published Date: Sep 16, 2019
Cybersecurity has been the #1 higher education IT concern for three straight years. Find out why identity plays an integral role in providing easy access to applications and files, while also securing sensitive data. Download the Report
Tags : 
    
SailPoint Technologies

HIPAA Compliant Data Centers

Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure, patients, utmost, security, confidentiality, integrity, sensitive, information, compliant, compliance, practice, particular, emphasis
    
Dell Storage

Hosted Web Analytics Versus Server Log Files

Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag, web logs, log files, server logs, server log files, log-file analysis, web metrics, on demand reporting, real time data, real-time reporting, data collection, statistics analysis, business metrics
    
VisiStat

How AON Simplified & Automated Files Transfers with GlobalSCAPE

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : 
file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape, business process automation, data protection, information management
    
GlobalSCAPE

How to Streamline Security and DLP Policy Management with McAfee

Published By: AWS     Published Date: Oct 07, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data. Register for our webinar to learn how Pacific Dental leveraged McAfee’s CASB solution, McAfee MVISION Cloud, to address these challenges and fulfill their security responsibility.
Tags : 
    
AWS

How to Streamline Security and DLP Policy Management with McAfee

Published By: AWS     Published Date: Oct 09, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data.
Tags : 
    
AWS

IDC: Rethinking the Network as a Network Enforcer

Published By: Cisco     Published Date: Jul 11, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco

Improve Visibility and Threat Detection with Security Intelligence and Big Data

Published By: IBM     Published Date: Jul 09, 2014
Most organizations are managing data sets that are larger than ever before, where many security offenses can be hidden and undetected, posing severe risks to business operations and the protection of sensitive, private information. Watch this video and learn how these exposures can be addressed with IBM's integrated Security Intelligence and Big Data solution.
Tags : 
ibm, security, cyber security, security intelligence, big data, visibility, threat detection
    
IBM

Infographic: How to Get Your Insider Threat Program Funded

Published By: Forcepoint     Published Date: May 06, 2016
Download this infographic to learn 5 steps to get your insider threat program funded and protect your organization's sensitive data.
Tags : 
    
Forcepoint

Information Protection in the Web and Cloud Era

Published By: Symantec     Published Date: Jul 11, 2017
This white paper explores the challenges associated with protecting data in today’s enterprise and starts to detail how a modern data loss prevention (DLP) solution, delivered as part of a cloud-based web security gateway, can provide continuous monitoring and protection of sensitive data on mobile devices, on-premises and in the cloud.
Tags : 
data protection, security, encryption, cloud, web security
    
Symantec

Information Security for Government Agencies: Checks, Balances and a More Secure Endpoint

Published By: Lumension     Published Date: Jun 10, 2011
Government agencies must protect sensitive data while improving transparency and accessibility-all in the face of rising cyberthreats. Download this free whitepaper to learn how.
Tags : 
malware, endpoint security, cyberattack, hacker, government security, identity, hacker detection, identity management, security management
    
Lumension

Information Security in 2015: Just How Much Worse Can Things Get?

Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks

Information Security: It's Not an Option

Published By: IBM     Published Date: Feb 08, 2008
Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.
Tags : 
bank, banks, financial, financial institutions, fisma, compliance, data security, information management, information security, database security, customer data, ibm, network security, data protection
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.