Home
 > Research and Reports > White Papers > A Layered Security Strategy for Preventing Data Leaka...

A Layered Security Strategy for Preventing Data Leakage, Theft, and Insider Abuse

Source: Tizor
Threats to data content posed by insiders. Compliance regulations entailing stringent data controls. It’s hardly surprising companies need to find more secure methods for keeping confidential data under lock and key. Learn about managing security challenges across three important layers of your IT infrastructure, and how database activity monitoring (DAM) and database auditing and protection (DAP) can help you.


Featured publications:

Fixed Asset Inventory: A Guide to Getting Started
Source: Sage Implementing a fixed asset inventory solution and performing proper accounting of assets can save time and money, reduce theft, improve planning and budgeting, eliminate “ghost assets,” and help an organization recover after a natural disaster. However, the importance of tracking and managing fixed assets such as land, buildings, transportation, and manufacturing equipment is often overlooked. This white paper discusses best practices for fixed asset inventory management and suggests tips for implementing a successful inventory process, including how to create an asset inventory process, implement a label and scanning solution for tracking of assets, establish an accurate baseline of fixed assets, and design a “go-forward” strategy for maintaining an asset inventory. Read More...
ExecBlueprints: Device-Reliant vs. Data-Reliant: How Mobile and Cloud Technologies Influence Workflow
Source: Skillsoft Cloud computing offers an extremely cost-effective alternative to traditional hardware-based infrastructures, but the advantages in flexibility and price must be weighed against issues of security, reliability, and capability. Business unit leaders must partner with IT to determine their needs, understand the impact of new technologies, and chart a path forward together to facilitate stability and efficiency across the entire organization.   Read More...
Oracle Rolls Out Configure, Price, and Quote Enhancements for CPQ Cloud
Written By: Ted Rohm Published On: April 16 2014 Oracle announces new capabilities and features of its Oracle CPQ (configure, price, quote) Cloud solution that significantly enhance customers' sales force performance. Read More...


You may also be interested in these related documents:

Case Study: IT Asset Security Tool Helps Healthcare Provider Track 97% of Laptops
Source: Absolute Software Learn how IT asset tracking tools helped Allina Hospitals and Clinics monitor 2,700 computers on and off their network without having to invest in additional infrastructure. This case study shows how their security system enabled this leading health care provider to go from a 30 percent tracking record to an almost perfect record for its growing inventory of laptops and electronic health records. Read More...
Are Your Company Laptops Truly Secure?
Source: Absolute Software The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and limitations of laptop security, including the technology for accurately tracking IT assets, recovering missing computers, and deleting data remotely. Read More...
Data Leak versus Data Flood: Problems Addressed by Data Leakage and Data Breach Solutions
Source: Tizor Data leakage and data breach are two disparate problems requiring different solutions. Data leakage prevention (DLP) monitors and prevents content from leaving a company via e-mail or Web applications. Database activity monitoring (DAM) is a data center technology that monitors how stored data is accessed. Learn why DAM complements DPL, and how you can benefit by making it part of your overall data security strategy. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.