Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

prevent

Results 426 - 450 of 1029Sort Results By: Published Date | Title | Company Name
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that when properly designed, built and operated, are an integral part of the business strategy driving the success of any enterprise, yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems, with little thought given to the structure and space in which it is to be housed, serviced and maintained. This invariably leads to facility infrastructure problems, such as thermal hot spots, lack of UPS, rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: VMware     Published Date: Feb 26, 2009
The primary goal of this guide is not simply to provide a checklist of tasks, but to help you develop an understanding of the disaster recovery (DR) planning process and the principles that underlie it. Before getting into the details, let’s consider first just what this guide will do for you and equally importantly, what it will not do. What this guide will do is to lay out a framework for DR planning that keeps things conceptually simple and helps you know what steps must be carried out and why, without a lot of jargon or unnecessary formality.
Tags : 
ca xosoft, vmware, disaster recovery, business impact analysis, bia, outside-in analysis, inside-out analysis, contingency planning guide, planning, plan maintenance, system information form, sif, cost to recover, disaster planning, crm application, mission critical data, preventative measures, scale of disaster, scope of disaster, recovery team
    
VMware
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention
    
PC Mall
Published By: Virgin Pulse     Published Date: Nov 19, 2010
The Patient Protection and Affordable Care Act (PPACA) will make some employers focus only on compliance. Forward-thinking companies that take advantage of the available benefits the reform laws have to offer will take the competitive advantage. Provisions of the new regulations, specifically wellness and prevention strategies, will have long-term tax benefits, while also decreasing lifestyle-related healthcare costs.
Tags : 
virginhealth miles, healthcare, employee health, costs, wellness, ppaca, legislation
    
Virgin Pulse
Published By: Virgin Pulse     Published Date: Dec 13, 2010
The Patient Protection and Affordable Care Act (PPACA) will make some employers focus only on compliance. Forward-thinking companies that take advantage of the available benefits the reform laws have to offer will take the competitive advantage. Provisions of the new regulations, specifically wellness and prevention strategies, will have long-term tax benefits, while also decreasing lifestyle-related healthcare costs.
Tags : 
virginhealth miles, healthcare, employee health, costs, wellness, ppaca, legislation, participation, wellness, benefits
    
Virgin Pulse
Published By: Virgin Pulse     Published Date: Nov 03, 2011
Getting employees to participate in prevention-based health and wellness programs remains a challenge for many human resource leaders. But you are not alone. Download this report to learn best practices in incentive planning from your peers. You'll also discover how to translate this data-rich survey into actionable tactics for your company's health care savings and long-term growth.
Tags : 
vhm, human resources, incentive programs, employees, health, survey report
    
Virgin Pulse
Published By: Mimecast     Published Date: Nov 10, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, software as a service, saas, data loss prevention, risk and compliance, email, security
    
Mimecast
Published By: EMC Corporation     Published Date: Aug 05, 2014
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
EMC Corporation
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security
Published By: Citrix Systems     Published Date: Nov 10, 2014
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security
    
Citrix Systems
Published By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : 
risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention, skillsoft, human resources, corporate counsel
    
Skillsoft
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats, security
    
Skillsoft
Published By: Skillsoft     Published Date: Jan 12, 2015
Keeping your employees safe and preventing accidents is essential for your company’s business and operating plans. Having a comprehensive workplace safety program can help your organization stay on-track. Skillsoft Global Compliance Solutions has compiled this resource guide that outlines essential areas you may be overlooking in constructing your program, as well as details on how considering these can assist in yielding the highest impact possible.
Tags : 
workplace safety, training, osha, safety, health, environmental health and safety, compliance, hazards, safety intervention, accident prevention
    
Skillsoft
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: CDW     Published Date: Nov 13, 2012
Webinar discussing the Best Practices for Deploying Data Loss Prevention Solutions.
Tags : 
cdw webinar, dlp, personal information protection act, data loss provention
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data, storage encryption, encryption prevention, mobile policy
    
CDW
Published By: Concur     Published Date: Feb 04, 2013
Expense fraud costs a median loss of $33,000 in each instance, according to Association of Certified Fraud Examiners (ACFE). Despite the nonchalant attitude of many employees, expense fraud is a crime that affects organizations large and small.
Tags : 
fraud, expense fraud, corporate expense policy, preventing fraud, identifying fraud
    
Concur
Published By: McAfee     Published Date: Jan 23, 2013
DLP solutions must move beyond simple keyword matching and regular expressions. Learn how Gartner evaluates DLP providers and why McAfee is again a leader in the 2013 Gartner MQ for Content-Aware DLP.
Tags : 
dlp, data loss prevention, content-aware dlp, context-aware dlp
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
This report guides you through some quick and easy steps you can take for major security gains without wasting productivity or important resources.
Tags : 
dlp, data loss prevention, content-aware dlp, context-aware dlp
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats.
Tags : 
network security, intrusion prevention system, ips
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
A criminal industry develops. This paper explores bot evolution, it’s global prevalence, who’s at risk, a look forward and combating bots using Global Threat Intelligence.
Tags : 
botnets, bots, defense in depth, threat prevention, advanced attacks, malware
    
McAfee
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.