Data Protection

RSS
Data protection news, software and solutions, and analysis for IT professionals
  • White Paper

    Data and Identity Security

    Posted August 17, 2012 - 12:30 pm

    This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
  • White Paper

    Indicators of Intellectual Property Theft

    Posted August 17, 2012 - 12:30 pm

    Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
  • Webcast

    Symantec is Data Loss Prevention

    Posted August 17, 2012 - 12:30 pm

    This video documents the importance of data loss prevention solutions. It touches upon the negative effects data breaches have on companies and how unified DLP solutions from Symantec can help locate confidential data, how this data is being used, and how to prevent its loss.
  • White Paper

    The Cloud: When & Why?

    Posted August 17, 2012 - 11:15 am

    This white paper discusses the many reasons companies choose to adopt cloud solutions from superior cost structure to strategic agility, simplified product renewals, ease of adoption, improved security, time to value, operating expenses, and more. Read this whitepaper now to look at these in detail.
  • White Paper

    How Can IAM Help Me with PCI Compliance?

    Posted August 16, 2012 - 12:45 pm

    PCI compliance is a critical requirement for many businesses. This paper highlights ways in which the CA Content-Aware IAM solutions can greatly simplify your PCI compliance efforts.
  • Leaky web sites provide trail of clues about corporate executives

    Posted August 13, 2012 - 12:55 pm

    Fortune 500 executives are using their business e-mail addresses to access a wide range of prominent social media web sites, leaving a potentially troublesome trail of clues for sophisticated hackers and cyber criminals, a security researcher has discovered.
  • Review

    DLP tools deliver strong endpoint protection

    Posted August 13, 2012 - 11:42 am

    With serious data breaches occurring on almost a daily basis, concerns about data protection have skyrocketed. While some experts believe endpoint breaches may no longer comprise the majority of data leaks, the intentional or unintentional release of sensitive data from endpoints within an organization, whether by employees, contractors or guests, remains a serious problem that data loss prevention (DLP) products seek to address.
  • Review

    Cisco Ironport delivers strong email protection

    Posted August 13, 2012 - 11:39 am

    The Cisco Ironport is an appliance that is deployed into an existing mail infrastructure. All emails are sent to the IronPort and the IronPort is either the last point out (most common configuration) or it can process email and then send it back to the mail server where it is sent out.
  • The cloud versus the taxi cab

    Posted August 13, 2012 - 9:44 am

    The simple fact is that almost everybody is going to lose a computer-like gadget at some point. That includes you.
  • 'Wall of Shame' exposes 21M medical record breaches

    Posted August 7, 2012 - 6:05 am

    Over the past three years, about 21 million patients have had their medical records exposed in data security breaches that were big enough to require they be reported to the federal government.
  • White Paper

    Quick-Start to Data Recovery

    Posted August 6, 2012 - 1:00 pm

    As with many enterprises today, your data center houses critical IT components that your business depends on. But are they fully secure and protected from potential threats such as intruders or natural disasters? A data recovery plan is very important to be fully prepared in the event of a disaster.
  • White Paper

    Data Protection: 5 Trends To Impact Your IT Planning in 2012

    Posted August 2, 2012 - 6:01 pm

    Businesses of all sizes find themselves storing more data than ever before. According to IDC, data is growing at an average rate of 50 percent each year and 2012 will be no exception. Even as data continues to grow, small businesses need a way to keep it secure and protect it from loss. They also need the ability to recover data when something goes wrong. Taken together, the concepts of data security, backup and recovery are known as "data protection." It's a holistic approach to making sure data is available when the business needs it.
  • Spotlight on data protection

    Posted August 2, 2012 - 4:49 pm

    With 22,918,441 million records exposed in data breaches in 2011, it's more clear than ever that what you don't know about data protection can hurt you. Get up to speed here.
  • Apple 'nearly axed' iPhone because of 'ear dialing' problem

    Posted August 1, 2012 - 10:39 am

    Apple's Sir Jonathan Ive describes the struggle to work past multiple design and technology flaws developing the iPhone.
  • A brush with genius: analytics help detect art fraud

    Posted July 31, 2012 - 8:00 am

    Digital authentication is a relatively new and promising approach to detecting art fraud. Taking a detailed look at brush patterns in a painting, it compares them against the same artist's known, proven works of art.
  • Review

    Top cloud services for online backup

    Posted July 30, 2012 - 11:21 am

    You can lose your valuable data in plenty of ways, including hard-drive failure, theft (laptops are particularly vulnerable), and catastrophe (fire, extreme weather, earthquake). Although the cloud can’t rebuild your home or office after a disaster, it can provide a safe haven for your files.
  • Security 2012: Prepare for rogue employees before they strike

    Posted July 30, 2012 - 11:09 am

    Information stolen electronically by rogue ex-employees can be detected and used in prosecutions if companies take adequate steps to lock down computers and mobile devices involved, according to a forensics investigator.
  • Don't buy that security software!

    Posted July 26, 2012 - 8:00 am

    First check out these 12 excellent free, open source personal security apps for PCs and mobile devices (and one for dirt cheap).
  • 10 disaster preparedness questions to ask your cloud services provider

    Posted July 19, 2012 - 3:05 pm

    A typical cloud contract contains uptime clauses and credits for missed service levels, but it often fails to adequately protect the enterprise customer. Here are 10 questions the intelligent cloud customer can ask to make sure they are sheltered from potential disaster.
  • White Paper

    Effective Techniques for Preventing Fraud and Proving Compliance

    Posted July 19, 2012 - 1:00 pm

    Multi‐channel monitoring, application activity monitoring, and information security responses to suspicious activity. This chapter makes clear that the ability to monitor multiple applications and correlate events across diverse platforms is a key element of effective fraud prevention and detection.
  • White Paper

    The Cost of Insider Fraud and Abuse

    Posted July 19, 2012 - 1:00 pm

    Examine different types of insider abuse, such as fraud and privacy breaches, and their cost to businesses. We also briefly describe the basic requirements for effective insider abuse monitoring, such as the need to monitor multiple types of systems and correlate events across those systems.
  • White Paper

    Threats from Within Your Government Agency

    Posted July 19, 2012 - 1:00 pm

    This solution brief tells how Attachmate Luminet fraud management software can help government agencies and departments get ahead of the fraud curve-by providing 100 percent visibility into who did what, and when.
  • White Paper

    Stop Insider Threats Inside Your Bank

    Posted July 19, 2012 - 1:00 pm

    This solution brief tells how Attachmate Luminet fraud management software helps banks, credit unions, and other financial institutions see the big picture, identify fraudulent activity upfront, and gather the intelligence needed to take informed action.
  • White Paper

    Shine a Light on Insider Abuse

    Posted July 19, 2012 - 1:00 pm

    This solution brief describes the four technical challenges you face and tells you how Luminet can help you overcome them.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question
randomness