"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

loss

Results 251 - 275 of 532Sort Results By: Published Date | Title | Company Name
Published By: iShares by BlackRock     Published Date: May 21, 2018
Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal.Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal. The iShares Funds are distributed by BlackRock Investments, LLC (together with its affiliates, “BlackRock”).This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 503791
Tags : 
financial management
    
iShares by BlackRock
Published By: iShares by BlackRock     Published Date: Jun 15, 2018
While the accumulated knowledge of a portfolio manager should not be undervalued, a move toward more systematic instrument selection could ultimately enhance fund returns. This material is provided for educational purposes only and is not intended to constitute investment advice or an investment recommendation within the meaning of federal, state, or local law. Investing involves risk, including possible loss of principal. This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. Prepared by BlackRock Investments, LLC, member FINRA. BlackRock, Inc. is not affiliated with The Economist. 530180
Tags : 
best practices
    
iShares by BlackRock
Published By: Druva -AWS     Published Date: Apr 28, 2018
In this report by Osterman Research, you’ll learn about the reducing the limits of Microsoft Office 365 including potential data loss, security risks, missing recovery functions and more.
Tags : 
    
Druva -AWS
Published By: Druva -AWS     Published Date: Apr 28, 2018
Data Loss Protection for Your SaaS & Cloud Apps SaaS applications like Office 365, G Suite, Box and Salesforce are not necessarily built to deliver a complete solution for data protection. This guide reveals the unforeseen risks of trusting your SaaS application to protect your data.
Tags : 
    
Druva -AWS
Published By: VMware Inc.     Published Date: Nov 23, 2010
The VMware SMB Survey is designed to help small and midsize businesses (SMBs) understand the benefits their peers are achieving with virtualization.
Tags : 
vmware, virtualization, smbs, data loss, disaster recovery, business continuity
    
VMware Inc.
Published By: Acronis     Published Date: Dec 28, 2011
According to a 2010 ESG survey, 73% of midmarket companies face "significant revenue loss or other adverse business impact" within three hours of experience downtime. Read this article to find out why you need the automated disaster recovery plan that's built in to Acronis Backup & Recovery® 11!
Tags : 
automated disaster recovery, server backup, server disaster recovery, server data protection, windows server backup, vmware disaster recovery, hyper-v disaster recovery, server backup, backup vmware, backup hyper-v, acronis, acronis backup & recovery, image-based backup, backup virtual machine, backup and recovery, storage area networks, storage management, virtualization, cloud computing
    
Acronis
Published By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
courion, access risk management, cloud based environment, mobile, data loss prevention, security, data management, data center
    
Courion
Published By: MX Logic     Published Date: May 21, 2008
In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.
Tags : 
managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections, anti-botnet, denial-of-service, dha, dos, intrusion detection, security, network security, access control, application security, security management, security policies
    
MX Logic
Published By: Computhink     Published Date: Dec 10, 2007
TMCC's Financial Aid Department (FA) stores about 14,000 hardcopy files, and processes approximately 7,000 new applications a year. FA workers were running out of space to house all of the files when they were told their office might be moved, resulting in the loss of their file room altogether. Since they are required by the U.S. Department of Education to keep files for four years (sometimes longer depending on a specific regulation) they knew converting to an electronic file system would save both time and money while serving their students better.
Tags : 
college, university, education, school, case study, paperless, document management, electronic document management, workflow, roi, return on investment, idm, computhink, viewwise, viewise
    
Computhink
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Whether your data loss is accidental or malicious, you need to gain insight into the magnitude of your data loss problem, identify security gaps, and develop a proactive approach to stop data loss before it happens.
Tags : 
watchguard xcs, data loss protection, data loss prevention, data breach, content analysis, contextual analysis, dlp solution, network security appliance, access control, application security, analytical applications, content delivery, content management system, secure content management
    
WatchGuard Technologies
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.
Tags : 
watchguard xcs, securemail encryption, email encryption, ibe, data loss over e-mail, compliance, identity-based encryption, encryption, sarbanes oxley compliance
    
WatchGuard Technologies
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks, web applications, pci dss 2.0, spear phishing, application control, drive-by download, malicious activity, network security solutions, business continuity, application security
    
WatchGuard Technologies
Published By: Debix     Published Date: Jun 30, 2008
Fraud preventative solutions are designed to avert new accounts fraud before it occurs. The strategic advantage of fraud prevention therefore lies in the ability avoid losses to institutions and consumers.
Tags : 
database security, pci, pci-dss, compliance, pci compliance, data protection, identity theft, hacker detection, hack, hacking, debix, customer experience management
    
Debix
Published By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : 
webroot, email security, threats, spam, data security policy, knowledge management, performance management, encrytion, anti virus, data loss prevention, integrate email, web security, pace framework, ddos, encryption
    
Webroot UK
Published By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : 
webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention, anti-virus, threat protection
    
Webroot UK
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read about how Symantec provides the security needed to protect valuable information without hindering productivity. This white paper documents how Symantec helps identify, authorize, inspect and protect, so companies feel comfortable with their employees working from anywhere and from any device.
Tags : 
mobile, wireless, cloud computing, virtualization, data storage, data management, symantec, smart phones, rsa, cloud applications, data loss prevention, encryption, dlp, storage virtualization, mobile computing, wireless application software, wireless communications, data center
    
CDW Symantec
Published By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : 
ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp, tablets, it systems, endpoint device growth, symnatec, integration, cisos, wireless, data management, data center
    
CDW Symantec
Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map, security management, secure content management
    
Intralinks
Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework, security, data management
    
RSA
Published By: Oracle     Published Date: Oct 22, 2015
As many retailers know, fraud can be disguised by training issues and vice versa. So how do you determine fraud versus training issues and take institutional or tribal knowledge and build meaningful reports for end users? This e-book from Oracle Retail discusses the use case for expection-based reporting with specific examples and recommendations.
Tags : 
oracle retail, oracle, loss prevention, actionable insight, protecting profits
    
Oracle
Published By: Oracle     Published Date: Jun 20, 2016
This report examines how two major players in the grocery, pharmacy and wholesale markets are leveraging loss prevention technology to centralize enterprise-wide data collection, analysis, and reporting to protect profits, reduce shrink and provide actionable insight across the organization from merchandising and planning to supply chain.
Tags : 
analytics, loss prevention, enterprise applications, best practices, business intelligence, content management system
    
Oracle
Published By: Oracle_Hospitality F&B     Published Date: Aug 08, 2016
In our new report, Cost Control in Food & Beverage: How Technology Can Help Maximize Profits, we surveyed more than 200 independent operators and chains to understand how they are managing labor, inventory, and loss prevention costs.
Tags : 
cost control, best practices, technology, maximize profit, operators, business analytics
    
Oracle_Hospitality F&B
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery, backup and recovery, disaster recovery
    
Code42
Published By: VMware     Published Date: Nov 04, 2016
Managing a mix of private, public, and hybrid cloud environments is a challenge for even the most robust IT departments. An enterprise-grade cloud management platform (CMP) puts you back in charge. It allows you to manage heterogeneous multi-cloud environments as one, enabling rapid delivery of infrastructure and applications with no loss of control. This paper reviews the top three ways a cloud management platform from VMware can help you manage your environment more efficiently.
Tags : 
    
VMware
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management, data protection, data integration, information management
    
Mimecast
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory