investigation

Results 51 - 75 of 92Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network, application security, encryption, internet security, network security appliance, security management, security policies, web service security
    
Blue Coat Systems
Published By: IBM     Published Date: Jul 24, 2012
Detect and prevent fraud by finding subtle patterns and associations in your data. IBM SPSS predictive analytics solutions have proved to be very effective at helping tax collection agencies to maximize revenues by detecting non-compliance more efficiently and by focusing investigations on cases that are likely to yield the biggest tax adjustments.
Tags : 
fraud, business, healthcare, taxes, government, ibm, spss, capital, finance
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: KPMG     Published Date: Jul 31, 2019
Banks need to be agile to respond to threats and embrace new approaches and technologies to predict and prevent fraud. Read our global perspective of how banks are tackling internal and external fraud threats. Read this report to discover: • how banks are deploying resources to optimise their fraud risk management efforts • trends in fraud typologies from investigations and group security professionals • challenges banks are facing in mitigating internal and external threats
Tags : 
    
KPMG
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Published By: SpectorSoft     Published Date: Aug 28, 2012
This whitepaper will describe the best methodologies used to perform investigations, and why investigating proactively can help.
Tags : 
human resources, spectorsoft, employee investigations, file auditing, user activity monitoring
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the Simplifying Employee Investigations white paper and learn about some of the real-world issues businesses face that result in employee investigations, the methodologies used to perform investigations, and then we’ll look at why investigating proactively can help.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 03, 2015
You just got news of yet another issue that just happened in your business that now you need to deal with – it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. Especially in cases of data theft, fraud, embezzlement, etc., having detail on everything the employee did leading up to the purported “bad deed” will be critical in determining whether something improper occurred or not.
Tags : 
sexual harrassment, embezzlement, employee investigations
    
SpectorSoft
Published By: Qualys     Published Date: Jan 11, 2017
When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Viavi Solutions     Published Date: Feb 22, 2018
Ensure that your Network Data Can Stand Up in Court
Tags : 
    
Viavi Solutions
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
best practices, storage, mobile workforce, technology, data, office 365, mobile device, backup and recovery, mobile computing
    
Druva
Published By: Server Technology     Published Date: Feb 10, 2015
WebEx elected to pursue a course of investigation and analysis that required a granular picture of its application-centric hardware implementations and corresponding power usage profiles. To accomplish this, WebEx decided to retool their datacenters with intelligent power strips having the ability to remotely report power consumption.
Tags : 
server technology, power consumption, power and cooling, energy costs, roi, infrastructure, internetworking hardware, it spending, return on investment, data center design and management
    
Server Technology
Published By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, enterprise security
    
Illusive Networks
Published By: Symantec     Published Date: Dec 13, 2017
Enterprise’s are increasingly under threat from sophisticated attacks. In fact, research has found that threats dwell in a customer’s environment an average of 190 days1. These Advanced Persistent Threats use stealthy techniques to evade detection and bypass traditional security defenses. Once an advanced attack gains access to a customer environment the attacker has many tools to evade detection and begin to exploit valuable resources and data. Security teams face multiple challenges when attempting to detect and fully expose the extent of an advanced attack including manual searches through large and disparate data sources, lack of visibility into critical control points, alert fatigue from false positives, and difficulty identifying and fixing impacted endpoints.
Tags : 
investigation, exposure, attacks, endpoints, network, email, cloud, security, symantec
    
Symantec
Published By: IBM     Published Date: Jul 06, 2017
In order to exploit the diversity of data available and modernize their data architecture, many organizations explore a Hadoop-based data environment for its flexibility and scalability in managing big data. Download this white paper for an investigation into the impact of Hadoop on the data, people, and performance of today's companies.
Tags : 
hadoop, flexibility, scalability, data architecture
    
IBM
Published By: SAP     Published Date: Jul 18, 2016
People on the frontlines of public-sector fraud management have considerable need to detect, monitor and prevent fraud in real time. They recognize that speed in analysis, detection, investigations and simulations is the key to minimizing taxpayer dollars lost to fraud. Read the report to learn more.
Tags : 
    
SAP
Published By: HireVue     Published Date: May 18, 2018
Recruiting and selecting talented people has become a top HR priority. To support this priority, many organizations are leveraging assessment tools and processes to find, hire, and select the best candidates. To better understand both the use and value of modern assessments, HR.com and its partner, HireVue, launched The State of Assessments survey. The investigation covered the following topics: • The biggest challenges to hiring the best talent • Primary benefits and uses of assessments • Features that HR professionals want most from assessment tools • Most commonly used components of assessments • Time-to-completion and completion rates associated with assessments • The role of video interviewing in the assessment process • Future investments in pre-hiring assessments • And, finally, the ways that high-performing organizations tend to differ from other organizations in terms of how they use these tools
Tags : 
    
HireVue
Published By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : 
security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring, security threats
    
Viavi Solutions
Published By: Asurint     Published Date: Aug 02, 2019
The majority of employers today perform background investigations of some type, according to the National Association of Professional Background Screeners (NAPBS). All background checks aren’t created equal, however. Whether you’re seeking to improve existing talent acquisition capabilities or are among the employers introducing a new background search policy, it’s vital to identify the right partner for background checks With so many options on the market, the quest for the best-fit background screening provider can seem overwhelming at first. To help cut through the clutter, we’ve compiled five basic questions, which home in on the central issues related to background checks and can help any organization identify the companies most capable of meeting their needs.
Tags : 
    
Asurint
Published By: Asurint     Published Date: Aug 05, 2019
The majority of employers today perform background investigations of some type, according to the National Association of Professional Background Screeners (NAPBS). All background checks aren’t created equal, however. Whether you’re seeking to improve existing talent acquisition capabilities or are among the employers introducing a new background search policy, it’s vital to identify the right partner for background checks With so many options on the market, the quest for the best-fit background screening provider can seem overwhelming at first. To help cut through the clutter, we’ve compiled five basic questions, which home in on the central issues related to background checks and can help any organization identify the companies most capable of meeting their needs. ©
Tags : 
    
Asurint
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Start   Previous    1 2 3 4    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.