security event

Results 126 - 150 of 517Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Apr 20, 2016
Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
En 2014, les fuites de données ont compromis plus de 700 millions de dossiers, engendrant des pertes financières estimées à au moins 400 millions $, et la fréquence des incidents liés à la sécurité est passée à 66 pour cent. Mais ne laissez pas la crainte étouffer votre croissance. Le rapport sur la prévention contre le vol de données se penche principalement sur la manière de vous protéger lorsque vous innovez, mais selon une perspective plus large en termes de portée et plus intelligente dans l’application.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.
Tags : 
cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datensätze durch Verletzungen der Datenintegrität kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschätzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorfälle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, während Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, market trends, infonetics, ddos prevention, arbor networks, security, network, intrusion prevention
    
Arbor
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
Learn how by watching the RSA Security Analytics and RSA ECAT virtual on-demand event.
Tags : 
security, analytics, incidents, ecat, logs
    
EMC Corporation
Published By: EMC Corporation     Published Date: Oct 01, 2014
RSA Security Analytics 10.4 and RSA ECAT 4.0 will be revealed when you watch this on-demand event.
Tags : 
security, analytics, incidents, ecat, logs
    
EMC Corporation
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification, cloud security, cloud based security saas security, strong authentication, fingerprint, full disk encryption, single sign-on, cloud management
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security, strong authentication, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
    
Fortinet, Inc.
Published By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : 
governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices
    
Wisegate
Published By: RSA Security     Published Date: Oct 24, 2013
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : 
rsa, emc, security, operations center, threat, threat detection, intelligence-driven
    
RSA Security
Published By: RSA Security     Published Date: Oct 24, 2013
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
rsa, emc, secuirty, warning, threat, analytics
    
RSA Security
Published By: MarkLogic     Published Date: Jun 21, 2017
Global financial organizations are facing increasing demands from the business for more granularity, transparency, reporting and security. If you’re on the IT side, you know this adds a different set of ‘mores’ to the equation: More duplication, delays, and people. What’s the net-net? More cost and more risk. You can balance the scales to satisfy those demands. And it starts with thinking differently about data management. Our financial services technology experts will explore the implications of governance, risk and compliance (GRC) imperatives. You’ll learn: • Why data is at the heart of an effective and dynamic GRC strategy • Why technological capabilities used to enable standard GRC programs can reduce transparency and prevent you from gaining a holistic view of your data • A new approach to data can provide the business with complete transparency • Review a sample regulatory reporting architecture Stop burning time on tooling — and start building a dynamic GRC strategy that can
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, mobile, hybrid, buyer's guide, mobile applications, mobile application platforms
    
IBM
Published By: IBM     Published Date: Oct 06, 2016
IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.
Tags : 
cyber security, intelligence, prevention, ibm, data protection
    
IBM
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Traditional antivirus (AV) is not the solution to preventing security breaches on the endpoint – it is the problem. AV is no longer effective at stopping today’s cyberthreats. Although AV satisfies many regulatory, governance and compliance requirements, it saddles organizations with hidden costs while providing little to no real security value.
Tags : 
palo alto, antivirus, security, security value, prevention
    
Palo Alto Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library