IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Internal Nonhostile Unstructured Threats

RSS Feed    Add to Google    Add to My Yahoo!
Internal Nonhostile Unstructured ThreatsWhite Papers (View All Report Types)
 
Bringing DLP Inside the Organization
sponsored by Clearswift
WHITE PAPER: This white paper delves into the subject of data loss prevention (DLP) inside the organization, examining the way that critical information is shared within a business and discussing the pros and cons of implementing DLP solutions at different points.
Posted: 15 Oct 2014 | Published: 31 Dec 2013

Clearswift

Top Information Leakage Threats Facing Today's Financial Service Industry
sponsored by Vericept Corporation
WHITE PAPER: This white paper shows how content-aware risk management systems combat information leakage through a combination of detection methods including data-matching, database-matching and linguistic analysis.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

Vericept Corporation

Securing WLANs with Two-factor Authentication
sponsored by RSA
WHITE PAPER: This paper discusses the explosion of WLANs and reviews the need to protect information in transit over wireless networks. It also reviews the security protocols available, the limitations of passwords and the importance of two-factor authentic...
Posted: 27 Sep 2007 | Published: 01 Sep 2007

RSA

Effectively manage access to systems and information to help optimize integrity and facilitate compliance
sponsored by IBM Software Group
WHITE PAPER: Consistent access management and identity management protect data integrity and facilitate compliance. IBM identity and access management solutions help you cost-effectively provide authorized users with access while protecting applications and data.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Protection Starts with Security Management Solutions from Novell
sponsored by Novell, Inc.
WHITE PAPER: Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Novell, Inc.

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Practical Guide to Database Security & Compliance
sponsored by Sentrigo Inc.
WHITE PAPER: This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance.
Posted: 05 Nov 2007 | Published: 01 Nov 2007

Sentrigo Inc.

Strengthening Data Privacy in PeopleSoft
sponsored by Approva Corporation
WHITE PAPER: Understanding the vulnerabilities of ERPs such as Peoplesoft can help your company mitigate the risk of data breaches. This white paper discusses how automated CPM solutions can help to fight the threat of data loss.
Posted: 09 May 2008 | Published: 01 Mar 2008

Approva Corporation

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola, Inc.
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement