Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

prevent

Results 376 - 400 of 1029Sort Results By: Published Date | Title | Company Name
Published By: Websense     Published Date: Oct 18, 2010
Data Loss Prevention (DLP) solutions are moving targets. They keep changing to meet evolving regulatory requirements and business needs. It's tough to select the best DLP solution. This white paper from leading information security research firm Securosis gives you an overview of the DLP industry, technologies, and architectures.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing
    
Websense
Published By: Websense     Published Date: Feb 16, 2010
This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.
Tags : 
tco, websense, web security, osterman, hybrid, security solutions
    
Websense
Published By: Websense     Published Date: Apr 16, 2010
Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing, secure gateways
    
Websense
Published By: KPMG     Published Date: Jul 31, 2019
Banks need to be agile to respond to threats and embrace new approaches and technologies to predict and prevent fraud. Read our global perspective of how banks are tackling internal and external fraud threats. Read this report to discover: • how banks are deploying resources to optimise their fraud risk management efforts • trends in fraud typologies from investigations and group security professionals • challenges banks are facing in mitigating internal and external threats
Tags : 
    
KPMG
Published By: NAVEX Global     Published Date: Jul 31, 2018
Learn everything you need to know about creating an engaging training programme—from defining your strategy to measuring effectiveness—in our comprehensive guide. What you'll learn: How to prevent misconduct through training How to create an engaging training programme - from defining strategy to measuring effectiveness How to develop the foundation of an ethical culture Tips, advice and examples to help organisations develop cost-effective, high-value and successful ethics and compliance training programmes How to mitigate risk and promote adherence to compliance objectives How to improve employee engagement and trust and strengthen alignment around a set of core values
Tags : 
    
NAVEX Global
Published By: Solidcore     Published Date: Aug 21, 2007
Learn how change control technology helps organizations comply with PCI DSS by tracking changes to critical files, determining if changes are authorized, and selectively preventing unauthorized change.  Read this white paper on how you can relieve the burden of out-of-process and other unauthorized changes by using real-time monitoring and selective enforcement software. 
Tags : 
pci data, credit card, payment card, pci, compliance, privacy, customer information, data security, database security, solidcore, solid core, security
    
Solidcore
Published By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security
Published By: Klocwork     Published Date: May 11, 2011
This white paper examines how the next generation of source code analysis tools are moving high-quality source code analysis to the developer's desktop and performing it at the earliest point in the development cycle - before code check-in. Learn why the developer must be an integral part of the process of identifying, fixing and preventing bugs from reaching the code stream.
Tags : 
klocwork, software development cycle, static analysis, source code analysis tool, developer desktop, code stream, productivity
    
Klocwork
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications
    
Oracle
Published By: Websense     Published Date: Aug 23, 2012
Websense redefines the security gateway with advanced threat and data theft defenses.
Tags : 
security, malware analysis, websense, dlp, data loss prevention, threat defense
    
Websense
Published By: Websense     Published Date: Aug 23, 2012
All DLP controls have two things in common.First, they provide the ability to identify: data-in-motion, data-in-use, data-at-rest. Read this whitepaper to find out more about DLP.
Tags : 
websense, data loss, prevention, dlp
    
Websense
Published By: Tripwire     Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics.
Tags : 
security, configuration, basics, security flaw, it assets, it infrastructure, security infrastructure, tripwire, data center
    
Tripwire
Published By: Tripwire     Published Date: Feb 08, 2013
It’s no small feat to balance access to data to meet business goals with protecting that very same data from hackers.
Tags : 
high availability, cloud, security, hacker detection, intrusion prevention
    
Tripwire
Published By: Tripwire     Published Date: Feb 08, 2013
Continuous monitoring is not a single solution—it’s a best practice for IT security.
Tags : 
automation, continuous monitoring, security, threat detection, threat prevention, hacker, malware, cyber attack
    
Tripwire
Published By: CodeBaby     Published Date: Nov 27, 2012
This guide reviews market drivers which are spurring innovation in benefits self-service and enrollment as well as wellness engagement. In addition, it overviews the main capabilities of the leading virtual assistant solution, CIVA benefits advisor.
Tags : 
online self-service, self-service, patient engagement, patient experience, healthcare consumerism, ehealth, customer service, intelligent virtual assistants, web self-service, healthcare providers, virtual agent, hospital marketing, healthcare, wellness, disease management, epatient, disease prevention, healthcare marketing, mhealth
    
CodeBaby
Published By: CodeBaby     Published Date: Nov 27, 2012
This guide reviews some market drivers which are spurring innovation in patient engagement and wellness participation. In addition, it overviews the main capabilities of the leading virtual assistant solution, CIVA health adviser.
Tags : 
online self-service, self-service, patient engagement, patient experience, healthcare consumerism, ehealth, customer service, intelligent virtual assistants, web self-service, healthcare providers, virtual agent, hospital marketing, healthcare, wellness, disease management, epatient, disease prevention, healthcare marketing, mhealth
    
CodeBaby
Published By: Tripp Lite     Published Date: Jun 28, 2018
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. End users may assume they need to increase cooling capacity, but this is often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : 
    
Tripp Lite
Published By: Polycom     Published Date: Mar 13, 2015
Collaboration across the healthcare team has always been important. What’s different today? You can collaborate over video anywhere anytime to education, delivery care or get things done! Education, It’s a good thing, right? But education to prevent unnecessary re-hospitalizations is a great thing. Patients with chronic disease may find themselves in the hospital on Monday, released to go home a few days later, just to find themselves back in the Emergency room the following Monday creating an expensive cycle of declining health. Collaborative video education is breaking this cycle helping healthcare teams and patients better manage disease through community and home based education.
Tags : 
health problems, social care, readmission, hospital, video solutions, telehealth, improving costs, aging population, economic status
    
Polycom
Published By: Polycom     Published Date: Mar 13, 2015
For those suffering from chronic or long-term health problems, there is often nothing quite as relieving as being sent home from the hospital—but also nothing quite as heartbreaking as readmission. Unfortunately, it is not unusual. Patients are sent home with instructions to continue improving their health, but few manage to do everything they need to do for a variety of reasons. Thankfully, there are ways to prevent this readmission.
Tags : 
health problems, social care, readmission, hospital, video solutions, telehealth, improving costs, aging population, economic status
    
Polycom
Published By: SolarWinds     Published Date: May 18, 2015
Learn how to prevent application downtime and optimize performance with this EMA Whitepaper “It’s All About the App: Application-Centric Systems Management” that provides the methodology an IT admin needs to utilize an application-focused approach.
Tags : 
application downtime, performance optimization, it admin, it infrastructure, application performace, it management
    
SolarWinds
Published By: NuCompass     Published Date: Oct 25, 2017
Relocation isn’t an everyday event for your employees. It’s one of the most stressful life events, and it can very easily spill into work. When that happens (and it inevitably will), your organization and your relocation provider have to be prepared. That’s why it pays to build a relationship early with your provider. If you spend the time preparing for relocation hiccups, you can proactively prevent some and be ready to take care of the rest. In this white paper, we will give you seven steps to follow to build a better partnership with your relocation provider, including: ? Understanding the significance of relocation ? Learning from successes and failures ? How to approach policies ? Personalizing your approach Download the white paper now!
Tags : 
    
NuCompass
Published By: Pega     Published Date: Sep 11, 2015
In December 2013, Pegasystems commissioned Forrester Consulting to evaluate the people, process, and technology pain points and best practices overall in each of the key phases of commercial and investment client onboarding. Then to further explore this trend, Forrester developed a hypothesis that tested the assertion that commercial onboarding has a number of pain points that prevent a unified client-centric experience.
Tags : 
    
Pega
Published By: HP Software     Published Date: Feb 02, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
security, bios, threat prevention, threat detection, malware, hacking
    
HP Software
Published By: AWS     Published Date: Aug 01, 2018
Learn more about the AWS Partner Webinar Series at - https://amzn.to/2ILG0R7. Join our webinar to hear how Lyft and other data-driven organizations benefit from uncovering hidden insights in real time with AI solutions from Amazon Web Services (AWS) and Anodot. Learn how to prevent events that can impact your revenue and brand integrity with a solution that detects anomalies quickly, allowing you to address issues in a timely manner to help ensure a consistently high-quality experience for your customers.
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.