prevention

Results 76 - 100 of 508Sort Results By: Published Date | Title | Company Name
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Forcepoint     Published Date: Mar 14, 2019
Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepoint CASB to extend DLP policies into cloud applications and more. Read the report to learn more.
Tags : 
data protection, data security, analyst report, dlp, cloud apps, data loss prevention, data leakage prevention, cybersecurity, cyber security, casb, radicati, radicati market quadrant
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
"Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive"
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP.
Tags : 
data protection, data security, critical data, intellectual property, intellectual property protection, dlp, cybersecurity, data loss prevention
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Forcepoint     Published Date: Aug 31, 2018
Ihr Unternehmen kann, ohne dass Sie es wissen, Exploit-Angriffen und Malware ausgesetzt sein, auch wenn Sie eine Firewall der nächsten Generation (Next Generation Firewall, NGFW) oder ein Intrusion Prevention System (IPS) eines Markenherstellers verwenden. In Anbetracht der weiten Verbreitung von Umgehungsmethoden, mit denen Angriffe verschleiert werden, überdenken immer mehr Organisationen ihre derzeitigen Abwehrmaßnahmen und die Sicherungskonzepte für ihre Netzwerke. In einem aktuellen PulseReport von Gatepoint Research* bewertete die Hälfte der Befragten die Effizienz ihrer Netzwerksicherheit mit 99 %. Klingt zu schön, um wahr zu sein? Da muss NSS Labs leider zustimmen. Im diesjährigen NGFW-Bericht enthüllte NSS Labs, dass die überwältigende Mehrheit der Firewalls in wenigen Sekunden überwunden werden kann.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.
Tags : 
cyber security, security application, security, cybersecurity, data prevention, anti spam, anti spyware, anti virus, application security, email security, internet security, intrusion detection, intrusion prevention
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.
Tags : 
security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security, internet security, intrusion prevention, security management
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
En 2014, les fuites de données ont compromis plus de 700 millions de dossiers, engendrant des pertes financières estimées à au moins 400 millions $, et la fréquence des incidents liés à la sécurité est passée à 66 pour cent. Mais ne laissez pas la crainte étouffer votre croissance. Le rapport sur la prévention contre le vol de données se penche principalement sur la manière de vous protéger lorsque vous innovez, mais selon une perspective plus large en termes de portée et plus intelligente dans l’application.
Tags : 
security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, security policies
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datensätze durch Verletzungen der Datenintegrität kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschätzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorfälle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, während Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security, intrusion detection, security policies
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, intrusion prevention, security management
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, anti spam, anti spyware, anti virus, application security, identity management, internet security, intrusion detection, intrusion prevention
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control, anti spam, anti spyware, anti virus, application security, internet security
    
Forcepoint
Published By: Arbor     Published Date: Feb 07, 2013
HOW TO PROTECT YOUR DATA CENTER’S AVAILABILITY
Tags : 
arbor, firewalls, ddos protection, intrusion prevention systems, ips
    
Arbor
Published By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, market trends, infonetics, ddos prevention, arbor networks, security, network, intrusion prevention, anti spyware, application security, disaster recovery, encryption, hacker detection, high availability, internet security, intrusion detection, security management, vulnerability management
    
Arbor
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
    
EMC Corporation
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification, cloud security, cloud based security saas security, strong authentication, fingerprint, full disk encryption, single sign-on, cloud management
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication, biometrics, fraud prevention, transaction authentication, identification, access control, anti spam, anti spyware, anti virus, application security, authentication, email security, encryption
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security, strong authentication, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Teradata     Published Date: Jun 12, 2013
The ever-changing environment has offered fraudsters some tactical advantages to probe for holes in the defenses of financial services companies. Conventional approaches to fraud detection and remediation remain effective to a point, but conventional tools cannot effectively and economically process what is known as big data.
Tags : 
enterprise risk intelligence, fraud detection, big data, fraud prevention, finance
    
Teradata
Published By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
    
Delphix
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: Intel Security     Published Date: Oct 20, 2015
Most effective DLP solutions are implemented as a business process, rather than a “set and forget” technology. Get complimentary access to this Gartner report ($195 value.) In this report, Gartner dentifies some key challenges CISOs face and provides guidance on a business process approach to a successful DLP implementation.
Tags : 
intel, gartner, data loss, dlp, ciso, networking, data management
    
Intel Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.