security data

Results 76 - 100 of 1761Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : 
cloud, aws, security, organizations, visibility, control, networks, platforms
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Jul 25, 2018
As easy as it is to get swept up by the hype surrounding big data, it’s just as easy for organizations to become discouraged by the challenges they encounter while implementing a big data initiative. Concerns regarding big data skill sets (and the lack thereof), security, the unpredictability of data, unsustainable costs, and the need to make a business case can bring a big data initiative to a screeching halt. However, given big data’s power to transform business, it’s critical that organizations overcome these challenges and realize the value of big data. Download now to find out more.
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
The European Union’s new regulatory framework for data protection laws, the General Data Protection Regulation (GDPR), became enforceable on 25 May, 2018. Under GDPR, organisations have new obligations to improve the security and privacy practices for the personal data they collect and use. With these new obligations comes the potential for heavier fines and penalties. Fortunately, Amazon Web Services (AWS) can help guide your organisation toward compliance under the new requirements. Take advantage of our services, resources, and experts as you navigate these changes.
Tags : 
    
Amazon Web Services APAC
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
In January 2016, the Federal Risk and Authorization Management Program released a draft of its high-impact baseline for moving federal data to the cloud. Not long after, Amazon Web Services (AWS) accepted an offer to pilot the new security threshold. AWS worked with FedRAMP to develop a set of standards under which highly sensitive government data could securely migrate into cloud environments. If ever you doubted that cloud computing was the new frontier for federal data and software management, look around. Over 2,300 government agencies worldwide have already migrated to the AWS Cloud. And in the U.S., this will only increase with the release of FedRAMP’s high baseline standards. Previously, CSPs could only become certified at a low or moderate baseline under FedRAMP, meaning agencies had no security baseline from which to spring their sensitive data into the cloud. These new standards effectively represent the fall of the final formal barrier to federal cloud computing. Terabytes o
Tags : 
    
Amazon Web Services APAC
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
This document provides information to assist customers who want to use AWS to store or process content containing personal data, in the context of common privacy and data protection considerations. It will help customers understand: the way AWS services operate, including how customers can address security and encrypt their content, the geographic locations where customers can choose to store content, and the respective roles the customer and AWS each play in managing and securing content stored on AWS services.
Tags : 
    
Amazon Web Services APAC
Published By: Amazon Web Services EMEA     Published Date: Sep 24, 2018
Under GDPR, we all have new obligations to improve the security and privacy of personal data at our organisations. With the new Amazon Web Services eBook, GDPR: The Basics, you’ll gain a fundamental understanding of this new EU regulation. In this eBook, you will learn about: • How to view GDPR as an opportunity, and how you can build on it • Article 32 – a core part of the security principle • Data subject rights • Key players and responsibilities • And much more
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: Amazon Web Services EMEA     Published Date: Aug 02, 2019
AWS Service Catalog is the tool for governing and managing your organization’s approved software and infrastructure services on AWS.
Tags : 
marketplace, security, catalog, aws, software, users, cloud, data
    
Amazon Web Services EMEA
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp
    
APC by Schneider Electric
Published By: apperian     Published Date: Apr 13, 2012
The BYOD demand was initially created by the popularity of the iPhone and the iPad from Apple. Relying on the closed iOS operating environment, these devices presented a fairly straightforward challenge for businesses that wanted to allow access to corporate apps without compromising the security of company data. Read to find out more.
Tags : 
apperian, technology, enterprise applications, mobile device, wireless communication, mobile management, wireless application software, wireless communications
    
apperian
Published By: AppNexus     Published Date: Apr 04, 2017
Email marketing is one of digital media’s most effective channels. Inside the inbox, marketers can capture the consumer’s undivided attention in a uniquely intimate environment, creating a perfect opportunity for meaningful brand engagement and driving new purchase transactions. However, with open rates for even the most effective brands hovering around 25%, there is huge opportunity for marketers to reach their customers with impactful formats on the open internet to successfully engage them across the marketing funnel. Download the free eBook “Beyond The Inbox: How To Transform Your Email Marketing Platform Into An Omnichannel Solution” to learn: • How to rapidly build an omni-channel solution for your clients • How AppNexus can help your platform reach your marketer’s customers most cost-effectively • How AppNexus ensures complete security for your client’s CRM data assets ?
Tags : 
appnexus, email marketing, omni-channel, crm data, branding, marketing, brand engagement, customer engagement
    
AppNexus
Published By: Apstra     Published Date: Aug 19, 2019
You may have read in the news about horrific security gaps that have the potential of bringing down whole infrastructures, leaking critical business and personal data, and exposing organizations to massive liability. There is no question that improving organizations’ security posture is a critical requirement for infrastructure and security teams.
Tags : 
    
Apstra
Published By: Arbor     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Arbor Networks     Published Date: Sep 29, 2012
This newsletter is intended to educate and inform enterprise network and data center operators about the problem of distributed denial of service (DDoS).
Tags : 
ddos, distributed denial of service, data center, malware, security threats, database servers, dns, access control
    
Arbor Networks
Published By: Arbor Networks     Published Date: Sep 29, 2012
Botnets and DDoS attacks are perceived as being malevolent and unstoppable. Fortunately there are companies like Arbor Networks, who are dedicated to analyzing and stopping botnets and DDoS attacks on a global basis.
Tags : 
ddos attacks, distribution denial of service, botnet, network infrastructure, database security, data center, security threats, anti virus
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches. Cyber threats continue to mutate and grow in volume. Read on to learn more.
Tags : 
defeating cyber threats, wider net, arbor networks, network security, improving ability to protect data, data security, security, data management
    
Arbor Networks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data, security
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Security Analytics is one of the two fastest growing product categories in security.
Tags : 
arbor networks, insegment, security analytics, data protection, cyber defense, cyber security, security, data management
    
ArborNetworks
Published By: Arcserve     Published Date: Apr 22, 2015
Review this analysis to get a better understanding of how you can eliminate application downtime.
Tags : 
disaster recovery, security, business continuity, data loss, cloud computing, data center design and management
    
Arcserve
Published By: Arcserve     Published Date: Apr 22, 2015
We’ll walk you through the driving forces behind these rapidly evolving data protection architectures, the trends you’ll want to be keeping an eye on, what we should all demand of next generation architectures, and the state of the current market landscape.
Tags : 
network architecture, security, backup, disaster recovery, data loss, application security, cloud computing, data center design and management
    
Arcserve
Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss
    
ArcSight
Published By: Artemis Health     Published Date: Aug 08, 2019
Most benefits professionals agree: access to data is the key to a solid benefits strategy. But there are some hurdles in your way to finding and implementing a data solution. In this guide, we’ll show you how to overcome some of the challenges commonly faced by benefits teams: • Prioritizing data amongst other initiatives and finding the time for analysis • Ensuring data quality and security, and working with internal teams to get buy-in • Justifying the cost and learning how to educate others on the value of data
Tags : 
    
Artemis Health
Published By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : 
astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
    
Astaro
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.