breach prevention

Results 1 - 25 of 43Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : 
data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
    
McAfee
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn the three basic elements for risk assessment and see how an understanding of these elements will allow you to better understand risk in your organization.
Tags : 
data breaches, protection, prevent data breaches, avoid costs, risk prevention, risk, security, data management
    
HP Enterprise Services
Published By: Kaspersky     Published Date: Feb 05, 2015
This guide provides information on how to reduce risk in today's IT environment.
Tags : 
reduce risk in it environment, it environment security, data security breach prevention, preventive measures for data security
    
Kaspersky
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Data breaches are on the rise. The number of breach notifcations issued by the New York State Attorney General’s ofce, for example, has risen 40% during 2016 compared with the same period a year earlier.
Tags : 
palo alto, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? 2. What measures not necessarily implemented do respondents consider preventive? 3. What barriers have stopped respondents from doing what they should be doing?
Tags : 
    
Palo Alto Networks
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Forcepoint     Published Date: Apr 19, 2016
In 2014, data breaches compromised over 700 million records with financial losses estimated to be at least $400 million – and security incidents grew up to 66 percent. But don’t allow fear to stifle growth. The “Data Theft Prevention” report focuses on how to stay secure while you innovate from a broader, in-scope, more intelligent in application perspective.
Tags : 
    
Forcepoint
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: CrowdStrike     Published Date: Feb 14, 2019
How to navigate a crowded vendor landscape and find the best endpoint protection solution According to the 2018 SANS Endpoint Security Survey, more than 80 percent of known breaches involve an endpoint. That’s why finding the most effective endpoint protection has never been more important. Unfortunately, with hundreds of options on the market, all claiming the same “next-gen” features, choosing the best endpoint security for your organization can be challenging. Read the Endpoint Protection Buyers Guide to learn: • Why you should ensure that the solution you choose includes these five key elements: prevention (NGAV), detection (EDR), managed threat hunting (MDR), threat intelligence, and IT hygiene and vulnerability assessment • Details on the role each of these elements plays in ensuring your organization’s security • The evaluation criteria you should apply and questions to ask to ensure a solution is truly effective • How the cloud-native CrowdStrike Falcon® next-gen endpoint prote
Tags : 
    
CrowdStrike
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, malware, viper
    
ThreatTrack Security
Published By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : 
data loss prevention, data breaches, threats and mobility, security executives, corporate data, security
    
Symantec
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, security
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks, web risks, social media risks, security
    
Kaspersky Lab
Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data, certificate security, trust protection platform
    
Venafi
Published By: Damballa     Published Date: Apr 14, 2014
Learn about the new ways to detect advanced threats and see how you can integrate big data intelligence to enable breach prevention.
Tags : 
malware, threats, security, network based intelligence, detection, big data, breach prevention, malware analysis
    
Damballa
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection
    
AlienVault
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security
    
Process Software
Published By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates, security controls
    
Venafi
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Kaspersky Lab     Published Date: Aug 27, 2015
As networks increase in complexity, keeping them secure is more challenging. With users connecting to unsecured public networks, running multiple applications on both company-owned and personal devices, corporate data can now be accessed – and lost – from more endpoints than ever. This guide provides simple, practical advice to help simplify these issues.
Tags : 
    
Kaspersky Lab
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, mobile, byod
    
ThreatTrack Security
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.