confidential data

Results 26 - 50 of 88Sort Results By: Published Date | Title | Company Name
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside ar
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside,
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Public cloud will continue to be a viable deployment model for some applications, primarily software as a service (SaaS) and less differentiated horizontal workloads like test/dev and infrastructure. Workloads that define the business—the high value vertical applications or those containing confidential / sensitive data—will remain on-premises. Not everything can move to a public cloud, and each day sharpens the understanding that more IT deployments will be on-premises. Hybrid IT will be the de facto deployment strategy. It is simply unrealistic, except for very small businesses, to have an IT footprint that does not include a healthy dose of on-premises infrastructure. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
Dell and VMWare
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data, user authentication
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile
Published By: Redstor UK     Published Date: Mar 12, 2018
Founded in 1810, with its UK headquarters in Liverpool, Hill Dickinson is an international commercial law firm with more than 1050 people across its offices in the UK, mainland Europe and Asia. Servicing a wide range of clients including multinational companies, major corporations and UK plcs, the firm delivers strategic advice and guidance spanning the full legal spectrum. Given the nature of Hill Dickinson’s client base, it has the responsibility to manage and store a significant amount of highly confidential data, therefore having an extremely secure and reliable backup solution is critical to the running of the organisation.
Tags : 
data, management, organisations, cloud, customer, commercial, law
    
Redstor UK
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications
    
Oracle
Published By: Intralinks     Published Date: May 29, 2013
Ensuring the security of confidential, sensitive information is an essential element of enterprise Security and Governance, Risk Management and Compliance programs. Regulations, such as the HIPAA, FDA, and SOX, place significant requirements on organizations for securely sharing sensitive data such as confidential personally identifiable information (PII) and personal health information (PHI).
Tags : 
security, sensitive information, sharing, mobile file sharing, solutions, confidential
    
Intralinks
Published By: McAfee     Published Date: Feb 06, 2013
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.
Tags : 
vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases
    
McAfee
Published By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : 
ssl certificates, communication, webmail, technical support, technology, data
    
Symantec Corporation
Published By: SafeNet     Published Date: Jul 13, 2010
To add extra protection for confidential data while reducing the time and cost for achieving regulatory compliance, many organizations will benefit from integrating tokenization into their SafeNet solution.
Tags : 
safenet, tokenization, data protection, regulatory compliance, application integration, encryption, audit
    
SafeNet
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security
    
Intralinks
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: • Exchange confidential client files and emails with superior encryption and security. • Offer a more professional solution compared to password-protected PDFs. • Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
client engagement, data security, confidential data, data protection, email security, customer service
    
Citrix ShareFile
Start   Previous    1 2 3 4    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.