sensitive

Results 1 - 25 of 403Sort Results By: Published Date | Title | Company Name
Published By: McAfee APAC     Published Date: Apr 19, 2020
Sensitive data resides across widely distributed environments; making the job of securing it increasingly complex, time-consuming and costly. The emergence of unified security solutions that tightly integrate largely siloed security products at the edge, promises to address today's highly convoluted data security infrastructure. Download the IDC Research Report and learn how to regain control over unstructured data, reduce hybrid complexity risks, and increase security awareness.
Tags : 
    
McAfee APAC
Published By: IBS Software     Published Date: Dec 20, 2019
"Pharma logistics today is about the safe and secure transportation of pharmaceuticals from production to consumption while ensuring that integrity of product is not compromised. However, with increasing complexity of the global pharma supply chain to meet the increasing spend in healthcare sector, regulatory requirements surrounding transportation of temperature controlled pharma will become increasingly stricter and wider in scope and reach. Partnerships between logistics service providers will become key for business expansion ably supported by IT vendors supplying the right tools for operating temperature sensitive products and services. In this Whitepaper, we touch upon: • The Business Opportunity – Pharma logistics by airfreight • The challenges at multiple touch-points in the entire supply chain • Solutions & effective Mitigation Strategies "
Tags : 
    
IBS Software
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
    
APC by Schneider Electric
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: Spirion     Published Date: Feb 26, 2020
In today’s world, data breaches are an increasingly common occurrence. The greatest financial damage typically comes when breaches expose sensitive data, such as social security numbers, credit card data, health information, business secrets, government records, and other valuable data that is costly to lose, especially when a breach captures the media’s attention. Once public, such breaches result in tens or hundreds of millions of dollars in post?breach losses. In this book, you’ll discover how to identify sensitive data, implement a data classification process, and minimize the risk of data breaches. You’ll also learn about the risks of not classifying data and the components of a data classification and sensitive data management life cycle. This book will arm you with the tools for managing risks and preventing the next financially damaging breach of sensitive data.
Tags : 
    
Spirion
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Aug 29, 2019
Many businesses attempting to implement digital strategies are held back by subpar Internet connectivity. Networks with insufficient bandwidth and inconsistent performance cause a wide range of problems that prevent businesses from competing effectively. Such issues can range from unsatisfying online experiences for customers to unreliable connectivity for employees to the inability to run latency-sensitive applications and share large files. In short, their networks are delivering poor value that affects nearly all areas of their businesses.
Tags : 
    
Spectrum Enterprise
Published By: Citrix     Published Date: Mar 26, 2020
According to the 2019 Ponemon Global Encryption Trends Study, 54 percent of companies consider employee mistakes the greatest risk to their information security. With your employees working on personal devices and taking their work outside of the office, it’s time to get serious about protecting your sensitive files and data. In this guide, you’ll learn 8 ways to safeguard your users from security mistakes, including: 1. Best practices for deploying and controlling file encryption 2. How to secure mobile devices wherever they’re used 3. The best ways to prevent unauthorized sharing of confidential files
Tags : 
    
Citrix
Published By: Citrix     Published Date: Mar 26, 2020
There's a lot to think about when it comes to securing your sensitive data — like controlling access and meeting compliance. It can be overwhelming for small and medium-sized businesses. But we can help you boost your knowledge and simplify your approach to protecting important data so you can stay a step ahead in the security game. Download this e-book, and get your step-by-step guide to managing risk across: • Physical vulnerabilities • Unsecured networks • Mobile devices
Tags : 
    
Citrix
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
    
Oracle CX
Published By: IBM     Published Date: Jun 29, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
IBM
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Automation Anywhere     Published Date: Feb 21, 2019
Robotic Process Automation was born with the vision of empowering business users to create software bots that could interact with enterprise systems just like humans. Its benefits include substantial time and cost savings, improved customer satisfaction, increased workforce morale, and the ability to build a competitive advantage over competitors. But to fully realize all these benefits, it’s important for businesses to select a solution with a robust RPA security architecture that supports core principles, such as least privileges and separation of duties while delivering end-to-end protection for the critical apps and sensitive data involved. This paper provides an overview of the industry’s highest standard for enterprise-grade security as demonstrated by the market’s leading Digital Workforce platform, Automation Anywhere Enterprise.
Tags : 
    
Automation Anywhere
Published By: Dell EMC     Published Date: Oct 10, 2019
The explosion of data and proliferation of devices demands better security tools and monitoring from businesses. Protecting sensitive company data shouldn’t just be a compliance obligation, it should be a business imperative. For this reason, the right technology partners will help push security, risk, and compliance objectives forward. This Forrester Consulting study evaluates evolving security trends and technology needed to protect and enable employees. Download it now to discover how empowering employees while adhering to security protocols actually improves employee productivity. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.