HIT Consultant Insightful coverage of healthcare innovation
 

insider

Results 76 - 100 of 160Sort Results By: Published Date | Title | Company Name
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
    
VeriSign Incorp.
Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
LogRhythm
Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox
    
ArcSight
Published By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : 
fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats
    
ArcSight
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption, vulnerability
    
CREDANT Technologies
Published By: SpectorSoft     Published Date: Aug 20, 2013
Quickly detect and be alerted to insider threats by monitoring employee activity with this free trial from Spector 360.
Tags : 
monitor employee, employee tracking, monitor computer activity, employee monitoring software, data loss protection, track web usage, detect fraud, insider threat
    
SpectorSoft
Published By: Attachmate     Published Date: Mar 20, 2013
Traditional fraud detection methods, such as application logging, can’t address the scale and sophistication of today’s threats. Find out how to get the visibility you need to better and manage enterprise risk with Luminet.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management
    
Attachmate
Published By: Attachmate     Published Date: Mar 20, 2013
Insider threats continue to challenge organizations, particularly as BYOD brings complexity to enterprise risk management. The latest Ponemon research highlights recent trends, risk factors and what organizations need to do now to reduce risk.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management
    
Attachmate
Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organization’s most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring
    
McAfee
Published By: Forcepoint     Published Date: Apr 19, 2016
The right cybersecurity solutions can improve your bottom line. According to a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, SureView®Insider Threat (SVIT) monitors and investigates internal threats across all endpoints and channel communications. It “lowers risk and increases productivity” and can mean significant ROI to your enterprise.
Tags : 
    
Forcepoint
Published By: LogRhythm     Published Date: Aug 08, 2016
Security threats continue to be more sophisticated and advanced with each day, with the majority often going completely undetected. • Organizations are usually scrambling to keep up and implement new security controls to protect themselves, which adds a new layer of complexity. • With the rise of Advanced Persistent Threats (APTs) and insider attacks, it becomes extremely difficult for security staff to detect all the risks. • Many IT and IT Security staff are already stretched thin by keeping track of many different security technologies that already exist.
Tags : 
security, technology, best practices, information technology
    
LogRhythm
Published By: Logrhythm     Published Date: Feb 24, 2016
This guide focuses solely on SIEM solutions that are available as appliances that include both the hardware and software needed to deploy them.
Tags : 
security, application security, siem, siem solutions
    
Logrhythm
Published By: Darktrace     Published Date: Apr 02, 2019
This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks. While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were only detectable using Darktrace AI, which learns what is normal for the business environment and autonomously responds to attacks – before damage is done.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Apr 02, 2019
As organizations increasingly rely on cloud services and SaaS applications to streamline business practices, the familiar paradigm of the network perimeter has dissolved, leaving a porous and ever-changing digital estate in its wake. While the benefits of cloud computing will ensure that migrations continue apace, the unique security challenges presented by the cloud will not only require a more agile mindset, but also self-learning technologies that can move at the speed of cloud deployments and spot subtle deviations indicative of a threat, while providing complete, real-time visibility across the digital business. Darktrace’s world leadership in the field of artificial intelligence for cyber security makes it the most effective and proven solution to detect unprecedented threats and anomalous cyber-incidents in the cloud. Whether faced with an insider threat, an attacker targeting sensitive data in test containers, or a significant misconfiguration that could be exploited in the fut
Tags : 
    
Darktrace
Published By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : 
netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection
    
NetIQ
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec, psychology, research, corporate
    
CDW Symantec
Published By: NETIQ     Published Date: Dec 05, 2013
This flash point paper discusses advanced persistent threats, the risks they pose, and how automation makes real-time response a reality. It covers questions you should ask yourself and things to consider before making an investment.
Tags : 
netiq, advanced persistent threats, insider credentials, real-time threat response, automation
    
NETIQ
Published By: NETIQ     Published Date: Jun 20, 2014
Having identity and access management solutions is a must these days. But what happens when someone gets around your solution?
Tags : 
netiq, api, hijacking, cyberthreats, insider credentials
    
NETIQ
Published By: Code42     Published Date: Mar 31, 2017
Today’s enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, you’re expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
    
Code42
Published By: IBM     Published Date: Oct 13, 2009
Explore a topic often overlooked during discussions about data security: the risk of insider threats. This report, "Stopping insider attacks: how organizations can protect their sensitive information," provides an overview of the issue of insider attacks and offers suggestions that may help organizations mitigate their risk. Plus, listen to a podcast about stopping insider threats.
Tags : 
sensitive information, ibm, personal data privacy, global business security, threats, malware, insider attacks
    
IBM
Published By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : 
netiq, insider threat, security, audits, access control, enterprise software
    
NetIQ
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa
    
NetIQ
Published By: IBM Corp     Published Date: Jun 20, 2011
Find out more about how the x3400 M3 makes a strong foundation can solve a number of interesting business challenges for small and medium businesses.
Tags : 
flexibility, scalability, ibm, x3400 m3 server, small business, medium business, smb, expansion
    
IBM Corp
Published By: Jobvite     Published Date: Oct 02, 2013
Optimizing Your Referral Program is an essential guide for anyone who is interested in implementing a new referral program—or for those with existing programs that are looking to improve their success rates.
Tags : 
employee referral, referral program, social recruiting
    
Jobvite
Published By: NETIQ     Published Date: Jan 12, 2017
Today’s attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
    
NETIQ
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.