compromise

Results 1 - 25 of 277Sort Results By: Published Date | Title | Company Name
Published By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : 
security, compliance, enterprise, mobile solution
    
xMatters
Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Forcepoint     Published Date: Oct 02, 2019
If you want greater—and earlier—visibility into indicators of security threats like intellectual property theft, compromised accounts, and insider risk, behavioral analytics may be the answer. Download this Gartner Market Guide if you’re considering or planning to integrate User and Entity Behavior Analytics (UEBA) to augment other security solutions or achieve risk-adaptive protection.
Tags : 
    
Forcepoint
Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical, medical grade servers, electronic medical records, emr, patient health records, phrs, computerized health record system, community health record (chr), diagnostic records, lab results, prescribed medication, downtime risk, stratus ftserver
    
Stratus Technologies
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA
Published By: Dell Server     Published Date: Aug 24, 2018
Edge computing will soon become the new norm as we enter the era of zettabytes and billions of connected devices. Dell EMC PowerEdge servers are uniquely designed to meet the demands of edge computing with integrated security, no-compromise scalability and intelligent automation.
Tags : 
    
Dell Server
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : 
cyberthreat, healthcare, gdpr, ransomware
    
Mimecast
Published By: Vindicia     Published Date: Oct 04, 2017
Software-as-a-service (SaaS) businesses and other cloud-based service providers have taken the industry by storm. Innovative startups hatched just a few short years ago have now exploded into major household brands such as Angie’s List, LifeLock, and Allrecipes.
Tags : 
    
Vindicia
Published By: Marketo     Published Date: May 18, 2017
Across industries, marketing increasingly plays a critical role in company growth. After all, the top expectation of CEOs polled by Gartner, in the 2014 Gartner Executive Summary for CMO Leadership, Accountability, and Credibility within the C-suite, is that the CMO would not only improve, but also own the customer experience by 2016. Combine this with the fact that digital is quickly becoming the de facto medium for customer interactions, and it’s easy to see why it’s essential that CMOs build an effective, efficient, and scalable marketing technology (aka MarTech) stack. Today, according to Forrester’s 2015 research, “Don’t Let Muddled Messaging Compromise Customer Experience,” as much as 90% of a buyer’s journey is self directed. Your buyers have moved online and many of them (likely a majority of them) prefer to be reached through digital channels.
Tags : 
integrate, social lead tool, slide share, webinar platform, lead capture, web forms, delivery assurance, event automation
    
Marketo
Published By: Oracle     Published Date: Jun 01, 2016
With a powerful, modern cloud commerce solution, e-commerce sites don’t need to sacrifice functionality, customization, or site experience to gain agility. Download this whitepaper to learn four key considerations to keep in mind when evaluating SaaS commerce solutions to achieve agility without compromise.
Tags : 
    
Oracle
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
With a powerful, modern cloud commerce solution, e-commerce sites don’t need to sacrifice functionality, customization, or site experience to gain agility. Download this whitepaper to learn four key considerations to keep in mind when evaluating SaaS commerce solutions to achieve agility without compromise.
Tags : 
    
Oracle Commerce Cloud
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.ą IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
In a world of perpetual innovations in technology, brands are continually stuck between slowing down and reinventing the wheel of martech which keeps them going, and staying put with delays in data activation. But they don’t have to settle for either of these approaches. Now is the time for enterprises to reclaim their brand’s independence in agility, innovation and customer obsession, removing all traces of vendor lock-in, slow-down or strategic compromise with a comprehensive, centralized approach to marketing technology which goes beyond DMP: Intelligent Orchestration.
Tags : 
data, brand, scaling, customer, marketing
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: Lenovo UK     Published Date: Nov 07, 2018
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity, mobility, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity, mobility, lenovo x1, workforce mobility
    
Lenovo UK
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Delphix     Published Date: Mar 24, 2015
You may not be as protected from data loss as you thought you were. Download this infographic to see how you may be compromised.
Tags : 
    
Delphix
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library