You Are Browsing ‘Data Security ’ Category

Comments Off on SANS Whitepaper: Correlating Event Data for Vulnerability Detection and Remediation
Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting. ...
Comments Off on Financial Services Firms Remain Vulnerable to Insider Attacks
Financial services firms enjoy a few advantages over organizations in other industries. Banks and investment firms tend to have larger IT/security budgets and highly experienced security staff members. Large metropolitan banks also have more lucrative salary structures, and so they also have the luxury of recruiting the best and brightest security talent. In spite of these advantages, financial services firms remain nearly as vulnerable to insider ...
Comments Off on Data Security Architecture Overview
The Vormetric Data Security Architecture white paper provides an understanding of the architectural underpinning of Vormetric Data Security Platform, a comprehensive solution for a data-centric security architecture for minimizing the attack surface of sensitive data and to assist in meeting data compliance requirements.  It uses Vormetric Data Firewall™, encryption, access controls and security intelligence across physical, virtual and tradi...
Posted on Jan 9 2014 - 3:32am by admin
Comments Off on Server Data is the Main Target for Advanced Persistent Threats
This white paper discusses why the old data security model no longer works, the inherent risks of APTs and why perimeter defenses alone are not sufficient to safeguard organizations against the current generation of security threats. Read this paper to learn more about: · The benefits of a data-centric security model · New data security protection strategies and best practices · Why data security automation has become a requirement in t...
Posted on Jan 9 2014 - 3:19am by admin
Comments Off on The Insider Threat – How Privileged Users Put Critical Data at Risk
This white paper discusses the growing insider risks. It will also cover how organizations become breached—either by internal users through malicious or benign actions or from external threats that acquire the credentials of trusted insiders. It also touches on how organizations can limit privileged users’ access to data so that, in either case, sensitive information does not leave your organization in an unencrypted state. Finally, it s...
Posted on Jan 9 2014 - 3:06am by admin
Comments Off on Data Security in the Cloud
Maintaining control over the data is paramount to cloud success. In this CSO Magazine whitepaper, learn about Cloud Computing Security Challenges, Techniques for Protecting Data in the Cloud and Strategies for Secure Transition to the Cloud. ...
Posted on Jan 9 2014 - 2:20am by admin
Comments Off on Big Data, Big Risks
The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and reliable protection strategies. ...
Posted on Jan 9 2014 - 1:47am by admin
Comments Off on Securing Sensitive Data within Amazon Web Services EC2 and EBS
In this white paper, learn about the specific problems around data protection when using servers within Amazon Web Services (AWS) environments. This includes both problems specific to the environment, the motivations that drive the need for this data protection, and recent changes in cyber threats that highlight the need for this protection. The paper also examines the core elements of a data protection solution for AWS implementations, and then revie...
Posted on Jan 7 2014 - 3:13am by admin
Comments Off on Protection for Every Enterprise: How BlackBerry 10 Security Works
If you’re choosing a platform for enterprise-grade Mobile Device Management, security is probably near the top of your list of concerns. So you'll be relieved to know that the BlackBerry® 10 platform has been built specifically to meet the complex and ever-changing security demands of the enterprise. Read this whitepaper to learn how the BlackBerry® Enterprise Service 10 platform can help you secure and manage not only BlackBerry 10 devi...
Posted on Jan 6 2014 - 12:02am by admin
Comments Off on Cisco Security: Applied Intelligence for a Risky World Infographic
This engaging infographic illustrates the trends, attitudes, and statistics shaping the way employees connect and share in the workplace—and how Cisco Security Intelligence Operations can help protect your government network with industry-leading malware intelligence. ...