Data Loss Prevention White Papers

Results 1 - 25 of 135Sort Results By: Published Date | Title | Company Name
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Arbor     Published Date: Sep 15, 2014

DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.

Tags : ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention
    
By: Arbor     Published Date: Sep 15, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.

Tags : cyber defenses, threat actors, it security, security analytics, application security, firewalls, hacker detection, security management
    
By: IBM     Published Date: Aug 08, 2014

Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.

Tags : technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security
    
By: Websense     Published Date: Jul 08, 2014

A white paper on the shortest path to prevention and risk production.

Tags : protecting ip data, dlp implementation, websense data security suite, anti spam, anti spyware, anti virus, internet security, intrusion detection
    
By: Symantec     Published Date: May 02, 2014

Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.

Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
By: Symantec     Published Date: May 02, 2014

Find out why Symantec was named a “Champion” in virtual backup software.

Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
By: Symantec     Published Date: May 02, 2014

How are savvy CIO's conquering these types of challenges? Find out how in this white paper by vExpert, David Davis

Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
By: Symantec     Published Date: May 02, 2014

This paper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries.

Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
By: Black Lotus     Published Date: Apr 21, 2014

Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.

Tags : black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
By: Citrix     Published Date: Apr 16, 2014

Learn how NetScaler has kept pace with industry changes and is winning the hearts and minds of IT leaders.

Tags : data center, adc, cloud computing, virtualization, netscaler, citrix, racks, blades
    
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
By: SilverSky     Published Date: Mar 26, 2014

The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.

Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security
    
By: SilverSky     Published Date: Mar 26, 2014

In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.

Tags : silversky, exchange, cloud exchange, cloud, security, scalability, flexibility, hosted exchange
    
By: Rapid7     Published Date: Mar 19, 2014

This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.

Tags : rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection
    
By: Nativeflow     Published Date: Feb 25, 2014

Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.

Tags : enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage
    
By: McAfee     Published Date: Jan 28, 2014

AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.

Tags : av-test, deep defender, rootkits, detection, anti spam, anti spyware, anti virus, application security
    
By: McAfee     Published Date: Jan 28, 2014

BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.

Tags : endpoint encryption, epolicy orchestrator, drive encryption, anti spam, anti spyware, anti virus, encryption, internet security
    
By: CA Technologies     Published Date: Jan 06, 2014

As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.

Tags : mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users
    
By: VMware, Inc     Published Date: Dec 05, 2013

Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.

Tags : vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm, networking, it management, knowledge management
    
By: VMware, Inc     Published Date: Dec 05, 2013

PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.

Tags : vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup
    
By: VMware, Inc     Published Date: Dec 05, 2013

VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.

Tags : vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery
    
By: Savvis     Published Date: Dec 04, 2013

The data security and IT integrity of enterprises just like yours is under unprecedented attack. A startling increase in the sophistication and number of cyber attacks is forcing virtually every company to raise their level of security consciousness. Buying IT security as a managed service can provide your organization the hardware, software, infrastructure, and the expertise that you need to protect your business in today’s complex and evolving threat environment. Read this whitepaper to learn how to maintain and grow your business in today’s ever-changing threat environment and at a commodity price. Help protect your organization and customers with a dynamic and proactive defense plan.

Tags : anti spam, anti virus, application security, firewalls, hacker detection, internet security, data loss prevention
    
By: IBM     Published Date: Nov 08, 2013

See how you can maximize productivity and operational performance with IBM Predictive Maintenance and Quality.

Tags : ibm, predictive maintenance and quality, improving productivity, solving production problems, virtually eliminate downtown, eliminate quality problems, anticipating maintenance, data integration
    
Start   Previous   1 2 3 4 5 6    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.