"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

loss

Results 101 - 125 of 509Sort Results By: Published Date | Title | Company Name
Published By: Workday Netherlands     Published Date: Aug 16, 2018
De hype rondom de cloud is enorm geweest. En dat is ook terecht gebleken. De meeste organisaties werken momenteel al met een cloudservice als onderdeel van hun IT-infrastructuur. Terwijl on-premisesoftware verouderd raakt en hybride oplossingen tekortschieten, maken cloudtoepassingen nieuwe manieren mogelijk om innovatieve oplossingen te leveren. Deze oplossingen zijn praktisch en ze zijn eenvoudig te gebruiken en te beheren. De cloud biedt nu de fundamentele infrastructuur waarop innovatieve organisaties hun bedrijfsactiviteiten kunnen uitvoeren
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 16, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 16, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 16, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Oracle     Published Date: Nov 03, 2016
Over the next decade, almost $78 trillion will be invested in infrastructure projects, according to PWC1. That represents an annual growth from an already colossal $4 trillion per year in 2012 to more than $9 trillion per year by 2025
Tags : 
    
Oracle
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).
Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management
    
IBM
Published By: Absolute Software     Published Date: Feb 14, 2012
Leonard Niebo, Director of IT for Brick Township Public Schools leads a discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs, and incidents of loss and theft.
Tags : 
school, education, budget, diversity, managing diversity, auditing, project management, business intelligence, itil, productivity, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security, best practices, business process management, project management, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: Adaptive Planning     Published Date: Apr 18, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A in 2011.
Tags : 
fp&a, adaptive planning, insurance, loss and seating ratio, amortization of premiums, budgeting, forecasting, revenue stream, technology
    
Adaptive Planning
Published By: Oracle     Published Date: Mar 09, 2017
In this white paper, IDC discusses the inherent difficulties associated with traditional backup schemes and the changing dynamics of data protection strategies. We examine Oracle's Zero Data Loss Recovery Appliance (ZDLRA) and the role it can play in providing significantly improved service levels for all types of Oracle databases.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 09, 2017
In questo white paper, IDC prenderà in esame le difficoltà legate agli schemi di backup tradizionali e al continuo cambiamento delle dinamiche nelle strategie di protezione dei dati.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 09, 2017
DANS CE LIVRE BLANC, IDC ANALYSE LES DIFFICULTES INHERENTES AUX SCHEMAS DE SAUVEGARDE TRADITIONNELS ET LES DYNAMIQUES MOUVANTES DES STRATEGIES DE PROTECTION DES DONNEES.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 09, 2017
In diesem Whitepaper diskutiert IDC die inhärenten Schwierigkeiten, die mit herkömmlichen Datensicherungslösungen und der sich wandelnden Dynamik der Datensicherungsstrategien verbunden sind.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 09, 2017
En este estudio, IDC trata el tema de las dificultades inherentes asociadas a los planes tradicionales de copia de seguridad de los datos y la dinámica cambiante de las estrategias de protección de datos.
Tags : 
    
Oracle
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: • Risk management – avoiding data breaches and loss of information that can result in non-compliance • Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device • IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management
    
Intralinks
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management
    
Intralinks
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
More and more people are using their personal devices to work from home, but are they secure enough? With the proper preparation, your laptop or smartphone can actually help improve security. Read our white paper for 5 easy tips to work securely on your personal device: Where to store your files to avoid data theft or loss Why those pesky update notifications are too important to ignore How often you should change your passwords, really
Tags : 
data security, personal device, security tips, passwords
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory