"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

loss

Results 451 - 475 of 532Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Sep 19, 2012
This guide discusses the combined risk of data loss and customer trust, planning, deploying and maintaining SSL certificates and how SSL certificates can protect your business.
Tags : 
information security, information technology, web applications, security, web service security
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Norse     Published Date: Oct 22, 2013
As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.
Tags : 
threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks, enterprise security, exploits, live threat, encryption, security management
    
Norse
Published By: RSA Security     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
    
RSA Security
Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 07, 2018
De hype rondom de cloud is enorm geweest. En dat is ook terecht gebleken. De meeste organisaties werken momenteel al met een cloudservice als onderdeel van hun IT-infrastructuur. Terwijl on-premisesoftware verouderd raakt en hybride oplossingen tekortschieten, maken cloudtoepassingen nieuwe manieren mogelijk om innovatieve oplossingen te leveren. Deze oplossingen zijn praktisch en ze zijn eenvoudig te gebruiken en te beheren. De cloud biedt nu de fundamentele infrastructuur waarop innovatieve organisaties hun bedrijfsactiviteiten kunnen uitvoeren.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: ProStor Systems     Published Date: Mar 15, 2007
The need for protecting data is universal – whether a small to mid-size business, the largest enterprise data center, or an individual. The recognition of the value of information and the impact of data loss has reached the point where repeating it is no longer required. The issue now has turned to how to protect the data.
Tags : 
smb, archiving, backup, hardware, security, data management, database security, data protection, small business networks, prostor, prostor systems, backup and recovery
    
ProStor Systems
Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks, rto, rpo, recovery time objective, recovery point objective, tape, lan, san, das, direct attached storage, rdx, d2d, disk to disk
    
HP
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Mar 04, 2009
The complexity and number of logons employees must manage on a daily basis are increasing sources of frustration and lost productivity. The time wasted entering, changing, writing down, forgetting and resetting passwords might be in small increments, but they are frequent and add up to a significant consumption of employee time. When employees are locked out because they’ve forgotten their passwords, they cannot perform their jobs.
Tags : 
"ibm, tivoli asset manager, password loss, employee time management, esso", human resource technology, workforce management software, employee performance management
    
IBM
Published By: XOsoft     Published Date: Aug 21, 2009
The primary information management concern in the enterprise today is to ensure that the knowledge necessary to drive critical business processes is available where it needs to be, when it needs to be. The costs of failure to do this are high. 
Tags : 
cost control, data loss, data protection, information management, data management, business process management, xosoft, knowledge management, storage, best practices
    
XOsoft
Published By: XOsoft     Published Date: Aug 21, 2009
Traditional backup systems provide a critical layer of insurance, but they represent all-or-nothing strategies that do not cover the minute by minute daily data writes to the disk. Continuous data protection fills in this gap by capturing changes to data while users are working. In the event of a data interruption, administrators can automatically reconstitute the data in reverse order to a point before it was corrupted or lost.
Tags : 
disaster plan, disaster recovery, data protection, storage, backup and recovery, backup, recovery, prevent data loss, xosoft
    
XOsoft
Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management
    
Quocirca
Published By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : 
quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing, remote, data loss, critical information, private information, customer information, identity management, dlp, data loss protection, mfps, it infrastructure, authentication, mps
    
Quocirca
Published By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : 
data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage, data replication, xiotech, data management, backup and recovery, storage management
    
Xiotech
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: ElcomSoft     Published Date: Dec 06, 2007
In order to protect important data, we use a large variety of methods and technologies, especially when the data in question is confidential and essential for day-to-day operations of a business and for making important management decisions. "If you have the information, you own the world" has become the basic tenet of our times, where control over data is of the utmost significance. The loss of access to important data can have a very negative impact on the company’s business.
Tags : 
password, password management, access control, server access, network management, windows, windows management, user access, data protection, elcomsoft
    
ElcomSoft
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : 
passwords, password, password management, security management, good password, bad password, data protection, elcomsoft
    
ElcomSoft
Published By: Microworld     Published Date: Dec 12, 2007
Unwanted PopUp Ads are intrusive Internet advertisements that are displayed when you access web pages. This white paper provides information about different type of PopUp Ads, losses they cause, how they work and suggests key features that a good PopUp Ad Filter software should have.
Tags : 
pop-up, popup, ads, pop-up ad, pop-up ads, internet security, online security, virus, anti-virus, anti virus, popup filter, pop-up filter, pop-up blocker, popup blocker, microworld
    
Microworld
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory