filtering

Results 51 - 75 of 98Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications, cloud computing
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: SAS     Published Date: Mar 06, 2018
Traditional procurement fraud detection methods – manual searches; spreadsheets; and simple slice, dice, filtering and reporting from silo systems – are not keeping pace. Whatever tools and processes are in place now, there’s always the opportunity to evolve to a higher level for more accurate detection – more high-value alerts and fewer false positives.
Tags : 
    
SAS
Published By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : 
email management, email, email security, messaging, spam, anti spam, spyware, anti spyware, virus, anti virus, sunbelt, sunbelt software, architecture, phishing, policy based, policy-based, malware, trojan, trojans, mail server
    
Sunbelt Software
Published By: SAS     Published Date: Mar 19, 2013
Use drag-and-drop, autocharting and data filtering to understand your data.
Tags : 
big data, visualization, interactive, data, data visualization
    
SAS
Published By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : 
web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories, spam, archive, archiving, instant, backup, mail, white, paper, whitepaper, migration, disaster, recovery
    
Osterman Research, Inc.
Published By: Incapsula     Published Date: Jul 11, 2014
DDDoS attacks are bigger, smarter and more dangerous than ever. Incapsula's research shows that almost 33% of Network (Layer 3&4) DDoS attacks exceeded 20 Gbps. At the same time, DDoS botnets used to wage Application (Layer 7) attacks are up by 240% compared to 2013. This report details our findings and insights into the latest DDoS attack trends.
Tags : 
threat, landscape, report, intelligent traffic, filtering, solutions, technology, ddos bots, networking, security
    
Incapsula
Published By: Internap     Published Date: Mar 30, 2015
Selecting an Infrastructure-as-a-Service (IaaS) provider can be a complex exercise that involves an array of considerations including business needs, budget, and application requirements. Buyers frequently respond to this complexity by filtering vendors based on variables that are more easily comparable, usually product features, location, and price. By contrast, performance, which is a critical factor to ensuring fit with business needs and ultimately satisfaction with the service, is often ignored. Virtual machine (VM) performance can be challenging to assess because it can vary drastically across vendors, instance sizes and prices, as well as in terms of a particular application’s unique requirements.
Tags : 
infrastructure, benchmarking, cloud computing, database
    
Internap
Published By: Act-On     Published Date: May 10, 2012
For an email campaign to be successful, marketers must reach the right person at the right time, with the right offer. By learning the basics of deliverability, you're better prepared to build emails that will actually reach your potential customers.
Tags : 
email deliverability, deliverability, best practices, spamtrap, spam filtering, blacklists, blocklists, soft bounce, hard bounce, content filtering
    
Act-On
Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet, failover, ssl, vpn, intrusion, web filtering, anti-malware, security, anti spyware, intrusion detection, intrusion prevention
    
Astaro
Published By: Astaro     Published Date: Aug 10, 2009
The Fowlerville Community Schools, a K-12 institution, has all the regular security needs of an educational institution.
Tags : 
inappropriate web content, internet usage, download, music, movies, content filtering, astaro, filter, security gateway, internet security, internet, firewall, proxy, security, vpn, firewalls
    
Astaro
Published By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn, 320, gateway, protection, content filtering, kauffman, protection, security, anti spam, internet security, security management
    
Astaro
Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro
Published By: Astaro     Published Date: Aug 10, 2009
Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.
Tags : 
hannoush, jewelery, private network, frame relay, vpn, tunnels, hackers viruses, spam, anti malware, astaro, internet security, content filtering, malware, security, cisco, sonicwall, anti spam, anti spyware, hacker detection, security management
    
Astaro
Published By: Brandwatch     Published Date: Apr 22, 2015
Download this case study to learn how agency DDB was able to use Brandwatch’s powerful coverage and flexible filtering capabilities to measure the success of its new Game of Thrones campaign.
Tags : 
social media, social analytics, social media monitoring, campaign measurement, campaign management, social listening, social business intelligence, social media campaigns, social media management
    
Brandwatch
Published By: GetActive Software     Published Date: Jan 23, 2007
Nonprofit organizations of all sizes are facing considerable challenges as they reach out to their supporters using email. Learn how to overcome these challenges and connect with your customer with a minimum of filtering and blocking.
Tags : 
email marketing, deliverability
    
GetActive Software
Published By: netVigilance     Published Date: May 30, 2007
Bonded Sender, the world’s leading email accreditation program, increases inbox delivery at more that 35,000 domains, averaging a 21 percent improvement across accepting ISPs according to a recent Return Path study. For marketers, email deliverability translates directly to the bottom line.
Tags : 
deliverability, deliverable, undeliverable, spam filter, filter, blocking, filtering, email marketing, email content, inbox, return path, returnpath, whitelist, whitelisting, white list, sender reputation, sender score, senderscore
    
netVigilance
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This white paper from Roaring Penguin Software reviews the most common approaches to spam management and email filtering in an ISP environment and details how a suitable anti spam solution must address particular challenges for ISP administrators.
Tags : 
spam, anti-spam, antispam, blocking, filtering, email security, isp, spam management, roaring penguin, anti spam, anti virus
    
Roaring Penguin
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This paper by Roaring Penguin Software demystifies the enterprise anti-spam market and its various choices and buzzwords to help you cut through the hype and focus on the basics.
Tags : 
spam, antispam, anti-spam, email security, blocking, filtering, roaring penguin, anti spam, anti virus
    
Roaring Penguin
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management, web service security, secure computing, securecomputing, network security
    
Secure Computing
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.