forcepoint

Results 1 - 25 of 86Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Apr 19, 2016
The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 19, 2016
In 2014, data breaches compromised over 700 million records with financial losses estimated to be at least $400 million – and security incidents grew up to 66 percent. But don’t allow fear to stifle growth. The “Data Theft Prevention” report focuses on how to stay secure while you innovate from a broader, in-scope, more intelligent in application perspective.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 19, 2016
Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 19, 2016
The right cybersecurity solutions can improve your bottom line. According to a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, SureView®Insider Threat (SVIT) monitors and investigates internal threats across all endpoints and channel communications. It “lowers risk and increases productivity” and can mean significant ROI to your enterprise.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 19, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 19, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 19, 2016
Prevención del robo de datos: La clave para la seguridad, el crecimiento y la innovación
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 19, 2016
As consequências financeiras e jurídicas dos ciberincidentes de alta visibilidade ocorridos no passado enviam uma mensagem incontestável: o furto de dados é importante demais para que o conselho de administração não se envolva. O relatório "Cibersegurança e Prevenção contra Furto de Dados" fornece uma visão geral não técnica que todo conselho de administração pode usar para avaliar a abordagem de segurança da organização.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 03, 2016
Quanto mais tempo os atacantes permanecerem em sua rede, mais movimento lateral é possível e maior o risco de furto de dados. Parar a exfiltração de dados, em vez de tentar impedir as violações de dados, é a abordagem mais realista para a segurança de dados e a redução do tempo do comprometimento à reparação de ameaças.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 03, 2016
Quanto mais tempo os atacantes permanecerem em sua rede, mais movimento lateral é possível e maior o risco de furto de dados. Parar a exfiltração de dados, em vez de tentar impedir as violações de dados, é a abordagem mais realista para a segurança de dados e a redução do tempo do comprometimento à reparação de ameaças.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 06, 2016
Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 06, 2016
Download this infographic to learn 5 steps to get your insider threat program funded and protect your organization's sensitive data.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.
Tags : 
cyber security, security application, security, cybersecurity, data prevention
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
En 2014, les fuites de données ont compromis plus de 700 millions de dossiers, engendrant des pertes financières estimées à au moins 400 millions $, et la fréquence des incidents liés à la sécurité est passée à 66 pour cent. Mais ne laissez pas la crainte étouffer votre croissance. Le rapport sur la prévention contre le vol de données se penche principalement sur la manière de vous protéger lorsque vous innovez, mais selon une perspective plus large en termes de portée et plus intelligente dans l’application.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.
Tags : 
cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
security, security protection, security architecture, security, protection
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datensätze durch Verletzungen der Datenintegrität kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschätzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorfälle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, während Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 29, 2016
For free trials, please choose the appropriate trial package below and complete the registration. You will receive an email guide on how to set up and manage your trial. Product support is available for the duration of your trial. Please visit our Support section if you have any questions.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 03, 2016
Todos nuestros productos están disponibles para una demostración personalizada. Por favor complete el formulario de la derecha. Algunos de nuestros productos —que se enlistan a continuación— también están disponibles para evaluaciones gratuitas (en inglés) para que pueda probarlos en su propio entorno de TI. De cualquiera de estas dos opciones, un representante de Forcepoint™ trabajará con usted para asegurarse de que esté evaluando exactamente el producto adecuado con las opciones adecuadas para usted. Para evaluaciones gratuitas, escoja el paquete de evaluación correspondiente abajo y complete el registro. Recibirá un mensaje de correo electrónico que lo guiará para configurar y administrar su evaluación. El soporte del producto estará disponible durante el tiempo que dure la evaluación del producto. Visite nuestra sección de soporte si tiene alguna pregunta.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 03, 2016
Todos os nossos produtos estão disponíveis para uma demonstração personalizada, basta preencher o formulário à direita. Alguns produtos — listados abaixo — também estão disponíveis para avaliação gratuita (em inglês) para que você possa testá-los em seu próprio ambiente de TI. Em qualquer caso, um representante da Forcepoint™ trabalhará com você para garantir que avalie o produto certo e com as opções mais adequadas para você. Para avaliações gratuitas, escolha o pacote de avaliação apropriado abaixo e conclua o registro. Você receberá um guia por e-mail sobre como configurar e administrar a avaliação. O suporte do produto estará disponível durante a avaliação. Acesse a seção Suporte se tiver perguntas.
Tags : 
    
Forcepoint
Start   Previous   1 2 3 4    Next    End
Search Resource Library