safeguards

Results 1 - 23 of 23Sort Results By: Published Date | Title | Company Name
Published By: Viavi Solutions     Published Date: Feb 22, 2018
Is your Network Performance Monitoring and Diagnostics (NPMD) solution a target for attackers? With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. NPMD tools that do not keep pace can leave your information vulnerable.
Tags : 
    
Viavi Solutions
Published By: RSA     Published Date: Sep 19, 2017
The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.
Tags : 
gdpr, data protection, rsa, rsa security, personal data, privacy
    
RSA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
To move your business from its current state to the connected enterprise, you have to define a common API to your database and other systems, while providing the infrastructure to support the new model. The new systems must incorporate the security safeguards while ensuring the infrastructure can support the new growing, but variable, load. With the rapid adoption of mobile and web-based services across the industry, the REST architecture has emerged as the de facto standard for API integration across systems. This white paper addresses the concepts of REST, creating REST APIs for your databases and integrating with other systems: • What is REST? • Why use REST for database access? • Building REST infrastructure for database access • The REST enabled database • Integrating REST with other services • Criteria for selecting REST services platform
Tags : 
    
CA Technologies EMEA
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing
    
Intralinks
Published By: SAS     Published Date: Apr 25, 2017
Digital currency is here. Consumers have demanded more choice in ways to pay merchants, move money to friends and access their accounts. Payment providers have done well to meet these expectations for immediacy and convenience in managing money. The convenience is great for account holders, but it requires financial institutions and merchants to apply fraud safeguards at the same speed, sometimes in less than a second. Each new accelerated service brings new risks.
Tags : 
    
SAS
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Partnering with Spectrum Enterprise sustains client loyalty by instilling confidence in how the bank operates, provides superior network service level agreements that ensure minimal downtime and assures smoother state and FDIC audits thanks to cybersecurity safeguards such as built-in redundancy and private network service.
Tags : 
    
Spectrum Enterprise
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration
    
Prodiance Corp.
Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure, patients, utmost, security, confidentiality, integrity, sensitive, information, compliant, compliance, practice, particular, emphasis
    
Dell Storage
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
    
IBM
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Properly managed, multi-server and wildcard certificates can provide increased flexibility. Since the consequences of a compromise can be more severe than they would be for a conventional certificate, supplemental safeguards should be employed. In the absence of these safeguards, we do not recommend the use of either multi-server or Wildcard certificates, due to both the security risks involved and the expanded scope of management issues in the wake of a compromise.
Tags : 
    
Entrust Datacard
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: CDW     Published Date: Nov 13, 2012
With the right SaaS security solutions, small businesses can gain enterprise-class safeguards at an affordable price.
Tags : 
cdw, cloud, cloud computing, cloud based security, cybertheft, data breaches
    
CDW
Published By: DataCore     Published Date: Jun 06, 2019
With so many moving pieces involved in business continuity and disaster recovery planning, anticipating the downstream impact of new SAN arrays, hyperconverged systems, and disaster recovery site relocation is increasingly more difficult. Learn how DataCore™ SDS services help you adapt your safeguards accordingly in the face of these common initiatives and business challenges: - Storage Array Replacement - Mergers and Acquisitions - Cloud Replication - Hyperconverged Infrastructure - Multi-Site Metro Cluster
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure, cloud, hyperconverged
    
DataCore
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
Intel Security
Published By: VMware AirWatch     Published Date: May 19, 2016
Innovation in business mobility is adding up to opportunity for the enterprise— opportunity to accelerate employee productivity, increase collaboration, and streamline business processes through mobile applications. At the same time, IT organizations are keen to control costs and maintain safeguards around their corporate information. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. But how do you know your organization is poised to make the move to EMM, or if you should be leveraging more from an existing EMM solution? Here are five cues to consider that the time is right to adopt EMM for your organization.
Tags : 
innovation, opportunity, best practices, productivity, mobile, application
    
VMware AirWatch
Published By: Tripwire     Published Date: Jun 30, 2009
Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.
Tags : 
tripwire, glba, compliance, managers, officers, directors, financial, institutions, safeguard, gramm leach bliley act, organization, solution, control, data automated, configuration, system, regulation, banking, administration, ncua
    
Tripwire
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: AppDynamics     Published Date: Sep 20, 2017
Every industry is going through digital transformation. Whether retail, manufacturing, media, finance, or software - in order to survive organizations are changing the way they operate in order to meet the demands of today’s connected customers. Whether it’s Uber redefining urban transportation for consumers, Slack enabling teams to collaborate in totally new ways, or Docker rivaling legacy virtualization providers, innovation is being powered by technology, and it’s happening faster than ever before.
Tags : 
development operations, digital transformation, application, automation, safeguards
    
AppDynamics
Search      

Add Research

Get your company's research in the hands of targeted business professionals.