HIT Consultant Insightful coverage of healthcare innovation
 

damage

Results 151 - 175 of 192Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: May 07, 2014
An in depth look at stealth crimeware, the damage it can cause and how you can protect against it.
Tags : 
stealth crimeware, mcafee, malware, spyware, protection
    
McAfee
Published By: IBM     Published Date: Apr 29, 2014
With a wealth of information readily available online, consumers are now better able to compare products, services and prices—even as they shop in physical stores. When consumers interact with retailers publicly through social media, they have greater power to influence other customers or damage a brand. These and other changes in the retail industry are creating important opportunities for retailers. But to capitalize on those opportunities, retailers need ways to collect, manage and analyze a tremendous volume, variety and velocity of data.
Tags : 
ibm, retail, ecommerce, big data, retail technology, social media, data analytics, customer insights, customer analytics, personalization, ecommerce
    
IBM
Published By: McAfee     Published Date: Apr 25, 2014
Estimating the cost of malicious cyberactivities is complicated. But the real issue is how it affects trade, technology, and economic competition. This in-depth report takes a look at the scope of the problem and what factors determine the real cost of cybercrime.
Tags : 
cybercrime, cyberespionage, data loss, intellectual property loss, reputational damage, security costs, commercial espionage, business confidential information, denial of service attacks, pilferage
    
McAfee
Published By: IBM     Published Date: Apr 22, 2014
Is IT leaving your company exposed to reputational damage? Find out how your organization compares to companies with “excellent” reputations.
Tags : 
ibm, it management, risk management, risk, risk management strategy, reputational risk, security
    
IBM
Published By: Corporate Visions     Published Date: Apr 03, 2014
Are your team’s seemingly small discount concessions doing major hidden damage to your profit margins? Read our FREE eBook to find out the five negotiating mistakes that may be costing you BIG money!
Tags : 
corporate visions, marketing, sales, sales myths, marketing myths, powerpoint, sales techiniques
    
Corporate Visions
Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption
    
SilverSky
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance
    
Intralinks
Published By: iNetU Managed Hosting     Published Date: Mar 06, 2014
Putting together an effective post-breach response plan can greatly reduce the costs and damage to the business inflicted by a breach. The following guide can help organizations get started.
Tags : 
managed hosting, cloud hosting, inetu, inet manahed hosting, data centers, blades, racks, rack, storage, data storage, cloud hosting, cloud, hybrid cloud
    
iNetU Managed Hosting
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network, networking, network, performance, optimization, network infrastructure, service provider, cdn, risks
    
Noction
Published By: IBM     Published Date: Jan 09, 2014
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics. Downtime can be highly disruptive and expensive to an organization, with cost drivers including lost revenue, reduced employee productivity, reputational damage, and the cost of resources required to address and avoid outages. Most organizations in IDC surveys indicate that even one hour of downtime can have a severe business impact or greater and businesses are investing in highly available servers and systems. Hear from leading industry analysts as they share top resiliency trends and top practices. Also see how Power Systems can build a highly stable infrastructure
Tags : 
    
IBM
Published By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : 
mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information, steal information, secure data, secure passwords, security breaches, broken privacy, reputational damage, cyber-security, business closures, business security, insider rights, threat environment
    
CA Technologies
Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map
    
Intralinks
Published By: Infoblox     Published Date: Nov 07, 2013
Failure to meet compliance can result in fines, dangerous network exposure and damage to a company’s reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Tags : 
infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri, spm, acm, switch_port_manager, automation_change_manager, change_and_configuration, compliance_manager, network_compliance, network_complexity, multi-vendor_network, network_change_configuration, network_discovery
    
Infoblox
Published By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : 
security, data security, networks, branding, attacks, security, security breach, safeguarding, infastructure, risk, risk tolerance, security attacks
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding, social media, supply chain, supply chain management, chief digital officer, mitigation, corporate reputation
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
In an around-the clock business world, you need nearly instantaneous failover and failback of your critical applications. Otherwise, you risk business losses and brand damage in the event of disruption or disaster. But how can you improve your existing disaster recovery operations? Read this brochure to learn how the power of cloud technologies can help you increase recovery speed, reliability and scalability
Tags : 
cloud, cloud technologies, cloud computing, applications, critical applications, applications management, risk, business losses, brand damage, disruption, disaster recovery, disaster recovery operations, loss prevention, recovery speed, reliability, scalability
    
IBM
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks
    
IBM
Published By: McAfee     Published Date: Feb 06, 2013
Monitor memory operations in real time, and stop unknown, zero-day infections before they have a chance to do damage.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security
    
McAfee
Published By: dynatrace     Published Date: Feb 01, 2013
Studies have shown that poor performance of e-commerce web sites can directly result in loss of revenue, poor customer satisfaction and damaged reputation. This white paper provides an overview to application performance management for e-commerce.
Tags : 
    
dynatrace
Published By: Arbor Networks     Published Date: Jan 31, 2013
Because of the damage they cause and the bewildering speed with which they mutate, botnets are perceived as malevolent and unstoppable. Fortunately there are companies such as Arbor Networks, which are dedicated to analyzing and stopping botnets.
Tags : 
anatomy of a botnet, botnet, ddos, global basis, distributed denial of service, analyzing, service, arbor networks
    
Arbor Networks
Published By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : 
database, security, mcafee, data breach
    
McAfee
Published By: Impact Recovery Systems     Published Date: Oct 17, 2012
Solving problems related to vehicle collisions with fixed bollards while maintaining the function of access denial bollards.
Tags : 
    
Impact Recovery Systems
Published By: IBM     Published Date: Oct 09, 2012
This whitepaper contains a study that investigates how organizations around the world are managing their reputations in today's digital era, where IT is an integral part of the organization and IT failures can result in reputational damage.
Tags : 
it risk management, security, it threats, corporate reputations
    
IBM
Published By: Internap     Published Date: Dec 29, 2011
Performance plays a vital role in the success of your online applications and web-based content - whether you are processing millions of transactions, delivering business-critical software or servicing a massive gaming community. Research shows that even one second of delay on a typical website can result in 7% fewer customer conversions. For many businesses, that means lost revenue and damage to their brand. As cloud is becoming an increasingly viable infrastructure choice for enterprise applications, it is essential to select a high-performance cloud service that will support the best possible experience for your end users. Determining the right cloud solution for your needs also necessitates thorough analysis of the level of security, control, customization and support your business requires. In this webcast, thought leaders from Gartner and Internap outline the performance factors that affect your cloud decision-making process and discuss how to optimize your IT Infrastructure to create satisfied end users.
Tags : 
enterprise cloud, cloud computing, technology, cloud solution
    
Internap
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.