protecting

Results 401 - 425 of 504Sort Results By: Published Date | Title | Company Name
Published By: DoubleTake     Published Date: Jul 14, 2010
SMBs in regulated industries are also subject to the same data availability and data protection requirements as large corporations for regulations such as HIPAA, FDA Part 11, Sarbanes-Oxley and SEC Rule 17, but without the budgets necessary to meet these requirements. This whitepaper provides six tips for an SMB approach to protecting data, such as confidential employee information, so download now to learn how keep your SMB protected from this critical loss of data.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability
    
DoubleTake
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information is crucial in decision making. No wonder that protection of information is paid much attention. The most part of information is created and stored digitally (Microsoft Office documents, different databases, and financial data in Intuit Quicken etc). Thus software and hardware means of protecting information are the first to talk about.
Tags : 
password, password recovery, system recovery, elcomsoft
    
ElcomSoft
Published By: ProStor Systems     Published Date: Mar 15, 2007
The need for protecting data is universal – whether a small to mid-size business, the largest enterprise data center, or an individual. The recognition of the value of information and the impact of data loss has reached the point where repeating it is no longer required. The issue now has turned to how to protect the data.
Tags : 
smb, archiving, backup, hardware, security, data management, database security, data protection, small business networks, prostor, prostor systems, backup and recovery
    
ProStor Systems
Published By: Riverbed     Published Date: Apr 27, 2011
One of the greatest challenges today is effectively backing up and protecting the vast amounts of data stored throughout an organization. With WAN optimization, you can accelerate network-based backup by 5x and can reduce bandwidth use by up to 95%. Download this paper and learn more about this strategy today.
Tags : 
riverbed, storage intelligence, wan optimization, backup, replication, disaster recovery, steelhead appliance, dr strategy
    
Riverbed
Published By: Nativeflow     Published Date: Jun 06, 2014
Download the solution brief to learn more about protecting your organization’s enterprise data.
Tags : 
nativeflow, healthcare, enterprise app, physicians, mobile app, doctors, healthcare solutions, data encryption, data security, user experience, enterprise mobile applications
    
Nativeflow
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Storing, protecting, and analyzing greater amounts of digital content can strain already limited information technology (IT) resources and put heavy demands on business managers’ attention. Learn how to overcome these challenges, with scalable server technology that automates routine tasks and improves system performance with minimal supervision.
Tags : 
cloud, server, proliant gen8, it management, data management
    
Hewlett-Packard Company
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility
    
GeoTrust
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response
    
Symantec
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : 
financial profit, economic espionage, it security, risk mitigation, it management, knowledge management
    
Kaspersky Lab
Published By: Thawte     Published Date: Nov 12, 2011
In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : 
phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
    
Thawte
Published By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, phishing, website protection, phishing scams, sensitive information, extended validation, validation, ssl technology, spam, scam, ev ssl, safety threats, ecommerce
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Phishing scams are a serious problem around the world. The number of attacks – and their level of sophistication – has skyrocketed in recent years. If you have a website and do business online, you are probably at risk. Fortunately, there is an effective way to protect your customers, your company and your brand from phishing: SSL and Extended Validation (EV) SSL. In this guide, you’ll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : 
phishing scams, web protection, customer protection, attacks, ssl, ev ssl
    
GeoTrust
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At the most fundamental level an organization only does two things: operations and changes to operations. Regardless of the industry an organization is part of, or whether it is private or public sector, large or small, there is a constant drive to protect and improve operational aspects. Whether it is launching a new product or service, decreasing costs, protecting infrastructure from failure or preventing regulatory noncompliance, there are numerous areas where an organization wants to change something about how it operates. That’s where projects come in. In this whitepaper we look at what causes projects to fail so regularly and offer a sustainable approach for improving performance consistently.
Tags : 
    
CA Technologies EMEA
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: HP-Intel®     Published Date: Jul 22, 2013
When it comes to IT risk, most people think in terms of disaster recovery and protecting critical patient data in the event of a natural disaster like a hurricane or an earthquake.
Tags : 
strategy guide, disaster recovery, healthcare, hp healthcare, off-site disaster recovery
    
HP-Intel®
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper examines how states like Massachusetts have implemented one of the most stringent and far-reaching requirements for protecting consumer data and how organizations of all sizes can meet the privacy requirements with simple, scalable encryption technologies.
Tags : 
consumer privacy regulation, globalsign, biowrap, encryption solutions, wisp, compliance, personal information, security breach
    
Globalsign Inc.
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper examines how states like Massachusetts have implemented one of the most stringent requirements for protecting consumer data and how organizations of all sizes can meet the privacy requirements with simple, scalable encryption technologies.
Tags : 
consumer privacy regulation, globalsign, biowrap, encryption solutions, wisp, compliance, personal information, security breach, encryption, privacy, meeting privacy regulations
    
Globalsign Inc.
Published By: Cisco     Published Date: Sep 15, 2015
Wi-Fi is about to get a reboot. New 802.11ac Wave 2 products will make it possible to deliver LAN-like multigigabit speeds over the wireless network for the first time, enabling previously unimagined scale and flexibility in the enterprise workspace. But how will businesses capitalize on this new capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second (Gbps)? This white paper: ? Introduces the new generation of Cisco® Catalyst® switches with Multigigabit Ethernet technology, the first platforms to combine support for multigigabit wireless speeds with full power over Ethernet (PoE) in an easy-to-deploy solution ? Shows how Cisco Catalyst Multigigabit Ethernet switches use NBASE-T technology to empower you to deliver 5-Gbps speeds over your existing access cabling ? Details how Cisco Catalyst Multigigabit Ethernet switches gives you the scale and capacity you need today, while protecting your network investments for the future Are you ready to learn more?
Tags : 
migration, ethernet, deploy, wireless, network, it management
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Wi-Fi is about to get a reboot. New 802.11ac Wave 2 products will make it possible to deliver LAN-like multigigabit speeds over the wireless network for the first time, enabling previously unimagined scale and flexibility in the enterprise workspace. But how will businesses capitalize on this new capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second (Gbps)? This white paper: ? Introduces the new generation of Cisco® Catalyst® switches with Multigigabit Ethernet technology, the first platforms to combine support for multigigabit wireless speeds with full power over Ethernet (PoE) in an easy-to-deploy solution ? Shows how Cisco Catalyst Multigigabit Ethernet switches use NBASE-T technology to empower you to deliver 5-Gbps speeds over your existing access cabling ? Details how Cisco Catalyst Multigigabit Ethernet switches gives you the scale and capacity you need today, while protecting your network investments for the future
Tags : 
    
Cisco
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.