> Technology > Data Security
 

Data Security

Data Security
Results 51 - 75 of 289Sort Results By: Published Date | Title | Company Name
Webinar Published By: IBM     Published Date: Apr 26, 2016
New channels and cashless payment ecosystems have created greater risk for financial institutions; the increase in fraudulent activities has compounded the need for more rapid detection and counter measures. Please view this webcast and learn: - The key challenges financial institutions face in rapidly detecting, responding and countering new fraud schemes - The value a cognitive computing approach offers an institution; enabling them to make swifter, more accurate decisions while providing more control and transparency
Tags : 
ibm, ibm banking industries, risk management, predictive analytics, fraud
    
IBM
White Paper Published By: Code42     Published Date: Apr 22, 2016
Read this whitepaper to find out strategic solutions to your data protection issues.
Tags : 
data protection, data control, code 42, data visibility, data security
    
Code42
White Paper Published By: Mimecast     Published Date: Apr 21, 2016
Download the new E-book, Email Security Uncovered: The Five Faces of IT Preparedness, to learn the latest trends in email security and tips on how you can boost your security confidence.
Tags : 
email, security, trends, cyber attacks, threats
    
Mimecast
White Paper Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats
    
Mimecast
White Paper Published By: Citrix Systems     Published Date: Apr 15, 2016
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Tags : 
citrix, it security, app virtualization, desktop virtualization, app
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Apr 15, 2016
Read this paper to learn how to deliver Windows apps to Chromebooks.
Tags : 
citrix, chromebooks, windows, apps, productivity
    
Citrix Systems
White Paper Published By: Citrix Systems     Published Date: Apr 15, 2016
ESG investigates what drives organizations to adopt desktop virtualization, the benefits they realized, and the key criteria to consider when selecting a desktop virtualization vendor.
Tags : 
citrix, esg, app delivery, desktop delivery, operational benefits
    
Citrix Systems
White Paper Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention
    
CarbonBlack
White Paper Published By: IBM     Published Date: Apr 06, 2016
By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM Security Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.
Tags : 
ibm, data security, data security, ibm security gaurdium, security
    
IBM
White Paper Published By: IBM     Published Date: Apr 06, 2016
As big data environments ingest more data, organizations will face significant risks and threats to the repositories containing this data. Failure to balance data security and quality reduces confidence in decision making. Read this e-Book for tips on securing big data environments
Tags : 
ibm, big data, data security, risk management, security
    
IBM
White Paper Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data, security
    
IBM
White Paper Published By: IBM     Published Date: Mar 21, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
security, data security
    
IBM
White Paper Published By: Telx     Published Date: Mar 15, 2016
The cloud isn't just for startups and enterprises. Typically, businesses with 20-1,000 employees do not have huge IT teams or budgets. As result, understanding the potential of the Cloud hasn’t been easy and figuring out the benefits of the Cloud can be a huge challenge. The FierceCIO Midmarket and SMB Guide to Cloud Computing sponsored by Digital Realty | Telx and accompanying webinar shows how you can benefit from the Cloud, too.
Tags : 
cloud, telx, smb, midmarket, security
    
Telx
Free Offer Published By: LogicNow     Published Date: Mar 10, 2016
Layered Security in less than 10 minutes. All from a single, easy to use dashboard. Try MAX free for 30-days!
Tags : 
msp, layerd security, web protection, antivirus, patch management
    
LogicNow
White Paper Published By: LogicNow     Published Date: Mar 10, 2016
Our annual health check of the global IT support market looks at the relationships between IT Service Providers and IT departments and asks, are the two sides working together in harmony, or in a state of Discord? Based on the views of over 1,300 IT departments and almost 700 IT Service Providers, this report delivers the data and vital insights that will help every IT Service Provider to focus on improving sales figures, growing their portfolio and ensuring their service matches customer expectations. Overlook at your peril!
Tags : 
logicnow, it service providers, cyberdefense, cybersecurity, security
    
LogicNow
White Paper Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security
    
Akamai Technologies
White Paper Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management
    
BitSight Technologies
White Paper Published By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
ibm, network, cloud, analytics, mobile
    
IBM
Webinar Published By: Palo Alto Networks     Published Date: Feb 24, 2016
Attackers are more sophisticated than ever
Tags : 
palo alto, cyber security, data, security organization, security
    
Palo Alto Networks
Webinar Published By: Palo Alto Networks     Published Date: Feb 24, 2016
Next generation security for financial services.
Tags : 
palo alto, financial services, cyber security, data security, security
    
Palo Alto Networks
White Paper Published By: IBM     Published Date: Feb 22, 2016
Survive the big data storm by getting ahead of integration and governance functional requirements
Tags : 
ibm, data, big data, integration, governance
    
IBM
White Paper Published By: IBM     Published Date: Feb 22, 2016
IBM commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by leveraging IBM InfoSphere Information Integration and Governance (IIG) solutions.
Tags : 
ibm, data, information integration, governance, roi
    
IBM
White Paper Published By: Cisco     Published Date: Feb 16, 2016
This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
cisco, malware, data security, analytics, global security threat
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
While the companion comparative reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this individual test report provides detailed information not available elsewhere.
Tags : 
cisco, breach detection, system test, data security, threat
    
Cisco
White Paper Published By: Cisco     Published Date: Feb 16, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere.
Tags : 
cisco, threat, cybercrime, infrastructure, security
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com