it protection

Results 301 - 325 of 1569Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care. • How built-in data encryption keeps your PHI, DICOM studies safe • Why more security pros are concerned with user behavior than cloud tools • What your organization should know about the cloud and compliance
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: CrowdStrike     Published Date: Feb 01, 2017
A large and growing number of security solutions are being touted as the ""next generation"" in cyber defense, and endpoint protection products are no exception. This has led to widespread confusion about which solutions have truly incorporated next-generation technologies and approaches, and which ones are making empty claims or half-hearted attempts. CrowdStrike developed this white paper to help you sift through the hype and uncover the critical elements that a true next-generation endpoint security solution must include. Download this white paper to explore: ? An explanation of the essential elements of Next-Generation Endpoint Protection ? An evaluation matrix for comparing the potential impact of different solutions ? A list of the top questions to ask potential vendors ? Tools to help you measure and compare different solutions
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Apr 10, 2017
All ML technology isn’t created equal. Learn how the CrowdStrike® ML-based Engine Defends Against Unknown Malware. While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware.
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Oct 05, 2017
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection. IT pros need confidence that the protection they deploy can: •Ensure long-term survivability of historical data •Deliver data securely to different waypoints. •Extend protection as environments change.
Tags : 
data protection, data security, carbonite, data recovery, data resiliency, data backup
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses.
Tags : 
ransomware, malware, cybercrime, lockscreen, encryption
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Today it is possible, even for smaller organizations, to establish both backup and full-fledged hybrid data protection under one robust onsite/offsite underpinning. ESG has four recommendations to assist such organizations as they try to pursue a disk-to-disk-to-cloud data protection strategy in the right way, with particular consideration for EVault by Carbonite.
Tags : 
evault, midsized businesses, data protection strategy, hybrid data protection, backup, recovery
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Carbonite provides data protection solutions for businesses and the IT professionals who serve them. Our product suite provides a full complement of backup, disaster recovery, and high availability solutions for any size business in any location around the world, all supported by a state-of-the-art global infrastructure.
Tags : 
draas, data recovery, recovery capability, cloud support, infrastructure
    
Carbonite
Published By: Intel     Published Date: May 15, 2017
The intent of this document is to help customers who are interested in implementing security protection mechanisms in Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) domains.
Tags : 
software-defined wan, security, network functions virtualization, nfv, wide area network, intel
    
Intel
Published By: Wasabi     Published Date: Oct 26, 2017
Kim Komando, “America’s Digital Goddess,” is a leading radio host and web entrepreneur. Every month her video-taped three-hour weekly radio show adds 2.8 TB of video content to its extensive playback library. Switching from their current storage solution, a combination of NAS Arrays and Tape Drives, to Wasabi not only generated huge savings it was simpler and faster. Plus, since Cloudberry works seamlessly with Wasabi, the show also enjoys efficient and cost-effective remote data protection. In this Case Study read in detail how the ‘Kim Komando Show’ made the transition to next generation cloud storage.
Tags : 
data protection, multimedia content, cloud storage, backup, recovery, secondary storage platform
    
Wasabi
Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Splunk     Published Date: Aug 21, 2018
How can you utilize machine data to support compliance with the General Data Protection Regulation of the European Union? This white paper, “How Machine Data Supports GDPR Compliance”, answers this question and identifies three use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment – on-premises, in the cloud or hybrid Download the white paper to: *Master the risks necessary to be prepared for GDPR through real-world scenarios *Understand which articles of GDPR will impact your business *Learn how machine data can help you overcome those requirements
Tags : 
    
Splunk
Published By: CyberSource     Published Date: Aug 31, 2018
Gain a bird's-eye view of how online fraud affects the airline industry Fraud continues to be a major source of revenue loss for the global airline industry. With airlines pushing for more direct bookings and the accelerating use of mobile as a booking platform, incidence of fraud is rising, albeit only slightly. Despite these factors, many airlines are not devoting the necessary resources and tracking the required metrics to measure and control fraud. CyberSource partnered with Phocuswright to benchmark global metrics and trends in fraud management and protection among airlines. The study also explores airline awareness of various fraud-related issues and examines their approaches to and implementation of fraud management tools and services. To learn more, download the study today
Tags : 
    
CyberSource
Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA
Published By: Gigamon     Published Date: Dec 13, 2018
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Cloud Access Security Brokers are one of the fastest growing security technologies today because they provide cloud service visibility, data security, threat protection, and compliance. CASBs are an effective and easy way to mitigate the top cloud security threats and security practitioners look to trusted CASB providers as strategic partners to help advise on key cloud security decisions.
Tags : 
    
Oracle Security Solutions
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Whether you are leveraging the cloud for software as a service (SaaS), infrastructure as a service (IaaS), or platform as a service (PaaS), cloud security is a mandatory cost of doing business. In June 2016, Gartner issued a press release identifying the top information security technologies and included cloud access security brokers (CASBs) at the top of that list. Protecting your data and IP in the cloud is not an option. Knowing that an ROI for a CASB could be longer term, how do you quickly quantify the additional value a CASB provides so that it gets a high priority in your already stretched information security budget? This white paper helps you to build a business case by walking you through the cost considerations and payback of a CASB. It demonstrates that a CASB provides stronger cloud protection at a lower cost than traditional security processes and tools.
Tags : 
    
Oracle Security Solutions
Published By: Dell & Microsoft     Published Date: Jul 10, 2013
This guide will examine major business risks associated with traditional data protection approaches, particularly with regard to their applicability for a hybrid, virtual + physical data center. It will redefine the business goals and drivers for data protection, and consider alternative approaches that better meet those goals.
Tags : 
data protection, virtual data center, physical data center, hybrid
    
Dell & Microsoft
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.