HIT Consultant Insightful coverage of healthcare innovation
 

insider

Results 101 - 125 of 160Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.
Published By: Jobvite     Published Date: Sep 24, 2013
Optimizing Your Referral Program is an essential guide for anyone who is interested in implementing a new referral program—or for those with existing programs that are looking to improve their success rates.
Tags : 
    
Jobvite
Published By: Aasonn     Published Date: Sep 26, 2014
Download to hear individual reflections and advice from SuccessFactors customers on their implementation journey. Personally listen to the unique takeaways and recommendations from the world’s most experienced Implementation Consultants, Project Managers, SAP Solution Architects, Sales Executives and Strategic Change Management Consultants. Here is your chance to get the insiders view.
Tags : 
aasonn, successfactors, hr project, customer experiences
    
Aasonn
Published By: Sparxoo     Published Date: Dec 21, 2016
With a new year upon us, it's time to put out Nostradamus hat on and give our best predictions for 2017. It's time for a fresh perspective as you look at your marketing plans and /make sure your initiatives are aligned for success. Our digital marketing gurus have pulled insights and trends together to give you insider secrets on digital marketing and how can you get a leg up on your competition. Why? Because we dig digital, and want to spread the love.
Tags : 
sparxoo, digital marketing, trend, marketing, forecast, insights, analytics
    
Sparxoo
Published By: SAP     Published Date: Dec 20, 2010
Mobility is sweeping across the enterprise. Consider a company like Kindred Healthcare, which has boosted the productivity of its rehabilitation therapists and the accuracy of its patient records through the use of mobile devices.
Tags : 
sap, sybase, mobility, mobile workers, idc, mcommerce, healthcare
    
SAP
Published By: SAP     Published Date: Mar 25, 2011
Read the article about SAP Rapid Deployment Solutions for SAP CRM. The article answers three important questions about these solutions, discussing what functionality is available, why you can be sure the implementation will bring rapid benefits, and where you can find more information. (SAPinsider, Jan - March 2011 )
Tags : 
sap rapid deployment solutions, sap crm, rds for sales, rds for marketing
    
SAP
Published By: SAP     Published Date: Mar 25, 2011
SAP Insider Article covering new SAP CRM innovations which help companies empower their employees, substantially improve the customer experience, and thereby achieve a competitive advantage.
Tags : 
competitive advantage, sap crm, customer experience, customer experience advantage
    
SAP
Published By: SAP     Published Date: Apr 14, 2011
The recent wave of new business analytics tools, solutions, and capabilities marks a true revolution in BI. In this SAPinsider Special Report on Business Intelligence, SAP Executive Vice President Sanjay Poonen lends his insights on the market drivers for this BI revolution, and explains what it all means for SAP customers. The article also features SAP ecosystem partners highlighting how SAP customers can unleash the power of information to truly innovate their business.
Tags : 
business intelligence, business analytic tools, sanjay poonen, information management, enterprise performance management, governance, manufacturing intelligence, sap
    
SAP
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective
    
Centrify Corporation
Published By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS’ unique, hybrid approach to insider threat deterrence – which combines traditional detection methods and investigative methodologies with behavioral analysis – enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
    
SAS
Published By: Sysomos     Published Date: Oct 24, 2012
The fast food business is worth more than $200 billion. This report digs into social media conversations to discover who's winning the burger wars. Includes social media ratings for Burger King, McDonald's, KFC, and Taco Bell.
Tags : 
sysomos, heartbeat, map, social media monitoring tools, business intelligence, analysis, analytics, dashboard
    
Sysomos
Published By: Intel Security     Published Date: Apr 06, 2016
Enterprises can use the Insider Threat Field Guide to understand and prioritize insider threats to further improve enterprise security strategies.
Tags : 
risk, threat, attack vector, security strategy, security architect, information, continuous response, incident
    
Intel Security
Published By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : 
ibm, user access, enhanced security, security risk
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
White paper describes how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
Tags : 
ibm, security intelligence, identity assurance, intelligent iam, boost compliance, qradar
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Read this white paper to learn about how to get smart about insider threat prevention, including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third party collaboration.
Tags : 
ibm, data, big data, security, data loss, data protection, threat provention
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: Microsoft Office 365     Published Date: Sep 20, 2016
Data security isn’t just about data security. It’s about job security. And marketing. And finance. And company valuation. Download the new eBook to see what questions you need to ask about your organization’s security measures, why they matter, and what else you need to know. Here’s what you need to ask your team: 1. Do you feel limited by budget or staff size? 2. How often do you see unsanctioned cloud services in use? 3. Are you protecting yourself against insider threats? 4. Do you have a cybersecurity task force in place? 5. Is your "bring your own device" policy secure?
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
    
Microsoft Office 365
Published By: Forcepoint     Published Date: May 06, 2016
Insider threat is a growing issue that often exceeds expectations. While most organizations go to great lengths implementing background checks to vet employees; often the accidental insider and outsider turned insider (due to compromise), are overlooked. It is time for a new protect from within mentality.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 06, 2016
Download this infographic to learn 5 steps to get your insider threat program funded and protect your organization's sensitive data.
Tags : 
    
Forcepoint
Published By: EmailDirect     Published Date: Nov 12, 2009
Insider information pertaining to deliverability changes affecting email sent to Yahoo, Hotmail, AOL and Gmail. Find out how authentication, domain reputation and user engagement metrics will affect your email delivery in 2010. It's not all about your IP's anymore!
Tags : 
emaildirect, email marketing, emarketing, gmail, yahoo, aol, deliverability, email
    
EmailDirect
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.