You Are Browsing ‘Data Security ’ Category

Posted on Jan 9 2014 - 2:20am by admin
Comments Off on Big Data, Big Risks
The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and reliable protection strategies. ...
Posted on Jan 9 2014 - 1:47am by admin
Comments Off on Securing Sensitive Data within Amazon Web Services EC2 and EBS
In this white paper, learn about the specific problems around data protection when using servers within Amazon Web Services (AWS) environments. This includes both problems specific to the environment, the motivations that drive the need for this data protection, and recent changes in cyber threats that highlight the need for this protection. The paper also examines the core elements of a data protection solution for AWS implementations, and then revie...
Posted on Jan 7 2014 - 3:13am by admin
Comments Off on Protection for Every Enterprise: How BlackBerry 10 Security Works
If you’re choosing a platform for enterprise-grade Mobile Device Management, security is probably near the top of your list of concerns. So you'll be relieved to know that the BlackBerry® 10 platform has been built specifically to meet the complex and ever-changing security demands of the enterprise. Read this whitepaper to learn how the BlackBerry® Enterprise Service 10 platform can help you secure and manage not only BlackBerry 10 devi...
Posted on Jan 6 2014 - 12:02am by admin
Comments Off on Cisco Security: Applied Intelligence for a Risky World Infographic
This engaging infographic illustrates the trends, attitudes, and statistics shaping the way employees connect and share in the workplace—and how Cisco Security Intelligence Operations can help protect your government network with industry-leading malware intelligence. ...
Posted on Jan 4 2014 - 12:27pm by admin
Comments Off on Website Security Threat Report 2013
Each year we publish a larger Internet Security Threat Report – this is a subset of that document which focusses on the threats that impact your website and online business. Looking back at the past calendar year it provides an insight into the state of the online world. Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand...
Posted on Jan 3 2014 - 2:46am by admin
Comments Off on Consumerization Security for the Changing Enterprise
Use this guide to help you put hardware-enhanced security in place and gain layered protection for every aspect of your business, including network, platforms, applications, data, and remediation capabilities. ...
Posted on Dec 25 2013 - 12:47pm by admin
Comments Off on Introduction To Web Analytics For E-Commerce: How To Track Activity To Optimize Your Web Site
Analytics can be a powerful tool, so now is a great time to learn more about web metrics. Use this guide to understand the basics of what web analytics are and why they’re important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more. ...
Posted on Dec 24 2013 - 10:14am by admin
Comments Off on GeoTrust Enterprise Security Center A New Way to Buy and Easily Manage SSL Certificates
The business and security benefits of GeoTrust Enterprise Security Center. IT departments face a range of issues-some obvious, some more subtle-when dealing with SSL certificates. These issues can have serious business and security consequences. GeoTrust Enterprise Security Center was designed with customer input to address these problems. ...
Posted on Dec 24 2013 - 8:00am by admin
Comments Off on Securing Multiple Domains With SSL
As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certific...
Posted on Dec 24 2013 - 7:57am by admin
Comments Off on Your Highway Code to the Internet – Keeping You Safe Online
We all use the internet in different ways. For banking, shopping, emailing, chatting, downloading, reading the news, dating … the more that becomes available online, the longer the list becomes. Again, some of us do only one thing on the internet, while others do all of these things. The other similarity between road and internet users is our level of experience and proficiency. The more we use either, the more we think we can do so safely, know...