"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

prevention

Results 51 - 75 of 469Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention, best practices, network architecture, network performance, network performance management, network provisioning, network security, business intelligence
    
Akamai Technologies
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data, user authentication
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile
Published By: Namogoo     Published Date: Jul 11, 2017
This report helps e-commerce companies understand the scale and scope of the “Online Journey Hijacking” phenomenon, where your customer’s online journey is disrupted, and your revenue is impacted, by third-party product ads cause by client-side Digital Malware.
Tags : 
ecommerce optimization, conversion rate optimization, ecommerce, online customer journey, online journey hijacking, digital malware, ad injections
    
Namogoo
Published By: Schneider Electric     Published Date: Jun 05, 2018
Power industries - including Nuclear, Fossil, Hydro, Wind and Geothermal - are susceptible to a variety of cyber threats which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.
Tags : 
smart control, power generation, power industry, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: McAfee     Published Date: Sep 15, 2014
This report presents the results of ESG Lab’s validation testing of the McAfee Next Generation Firewall. Integrating application control, intrusion detection, and evasion prevention, the product is designed to provide next generation firewall services, leveraging a unified software core to enable the deployment of multiple security services when and where they are needed.
Tags : 
application control, network security, firewall, firewall services, it security
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Quick-to-deploy protection for remote locations.
Tags : 
firewall, firewall protection, it security, intrusion prevention systems
    
McAfee
Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect prominent securities.
Tags : 
firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt, business intelligence, data mining, productivity
    
Vectra Networks
Published By: Fiserv     Published Date: Sep 14, 2017
Sanctions screening and fraud prevention solutions use real-time detection to prevent terrorist financing and financial crime; whereas anti-money laundering (AML) primarily follows an “observe and report” process. Such a process is all that is currently required by many regulators. Increasingly though, international compliance teams are choosing to stop transactions before they are executed – based on suspicions of money laundering activity. More and more, the industry has been asking itself if this approach of rejecting suspicious activity is a more effective strategy to prevent money laundering. This paper explores where and why AML real-time detection might make sense as a new paradigm for global financial institutions.
Tags : 
aml, anti-money laundering, compliance, regulatory compliance, financial crime, financial crimes, financial action task force, fatf, customer due diligence, cdd, aml monitoring solutions, currency transaction reporting
    
Fiserv
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Fiserv     Published Date: Jul 09, 2018
Cash may be popular with consumers, but it often presents challenges and extra costs for retailers. Manually handling, counting, reconciling and depositing cash every day, or multiple times a day, can be expensive. Smart safe technology and automated cash handling can help and benefit all areas of your business – from Finance to Operations to Loss Prevention – but, more importantly, your customers. Read this eBook to learn the four key benefits of automated cash handling: • Maximize your cash flow • Gain more flexibility with open systems • Reduce shrinkage and reconciliation • Care for customers instead of counting cash
Tags : 
cash automation, smart safe, cash handling, cash-in-transit, cash management, cit, cash vault, cash counting, cash reconciliation, cash transaction, fraudulent currency, counterfeit detection, counting errors, shrinkage, reconciliation
    
Fiserv
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
Don't let the risk or cost of ransomware storm your organization's castle. it will wreak havoc on your valuable data and impact business continuity. Instead, employ a multi-layer security strategy that not only includes anti-malware, firewall, and hard disk and file encryption, but also data loss prevention technology and standards- based data protection. Each are critical to mitigate cyber security risks and protect vital information so you can avoid business disruption without ever paying a king's ransom.
Tags : 
ransomeware, organization, data, business optimization technology, it protection, commvault
    
Commvault ABM Oct
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Forcepoint     Published Date: Apr 20, 2016
Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.
Tags : 
cyber security, security application, security, cybersecurity, data prevention, application security
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.
Tags : 
security, data theft prevention, data security, security application, application security, security management
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
En 2014, les fuites de données ont compromis plus de 700 millions de dossiers, engendrant des pertes financières estimées à au moins 400 millions $, et la fréquence des incidents liés à la sécurité est passée à 66 pour cent. Mais ne laissez pas la crainte étouffer votre croissance. Le rapport sur la prévention contre le vol de données se penche principalement sur la manière de vous protéger lorsque vous innovez, mais selon une perspective plus large en termes de portée et plus intelligente dans l’application.
Tags : 
security, data theft prevention, data security, security application, application security, security policies
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datensätze durch Verletzungen der Datenintegrität kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschätzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorfälle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, während Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application, application security, security policies
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control, application security, security management
    
Forcepoint
Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, application security
    
Forcepoint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory