Home
 > Research and Reports > White Papers > Pod Slurping-An Easy Technique for Stealing Data

Pod Slurping-An Easy Technique for Stealing Data

Source: GFI Software
Just when you thought you had all your security measures figured out, along comes the portable storage device to make you question them all over again. With the popularity of portable consumer products—and their ever-increasing storage space—comes a greater risk of losing sensitive corporate data. To secure corporate data, companies must not only focus on perimeter security, but on internal security weaknesses as well.


Featured publications:

iCIMS
iCIMS is a leading provider of Software-as-a-Service (SaaS) business platforms for the mid-market. As an Inc. 500 honoree and 2009 Software Satisfaction Award winner, we are dedicated to solving corporate business issues through the implementation of easy-to-use web-based software solutions. iCIMS' Talent Platform is a web-based HR software platform for organizations of all sizes, in any industry, worldwide. As the second largest provider of talent acquisition solutions, iCIMS provides recruiters and HR professionals with the collaborative tools that enable them to attract, screen, hire and retain the best talent, helping them gain an edge over the competition. With over 800 clients worldwide including Continental Airlines, eHarmony, eSurance, Hershey's, Liz Claiborne, and Whole Foods, iCIMS' premier Talent Platform allows organizations to control their entire talent lifecycle through a single platform. Candidate management features include: Applicant Tracking, Reporting, Form Automation, Hourly & Salary Hiring, Multi-Lingual Online Career Centers, Screening, Searching, Sourcing, CRM, Compliance, Onboarding, and more. Employee management features include: Employee Data Management, Internal Job Transfers, Employee Referral Programs, PTO Notifications, Performance Management, Surveys, Competency Profiles, and more. iCIMS holds the belief that a product is only as strong as the service behind it and, as a result, is committed to the ongoing pursuit of 100% customer satisfaction. This dedication to customer support and satisfaction has helped iCIMS maintain a near-perfect 97% client retention rate since 2003. iCIMS' industry-leading customer support teams serve clients 24 hours a day, 5 days a week. From hosting and migration services to best practices and consulting engagements, iCIMS provides the value-added support that many competing solution providers simply cannot offer.   Read More...
Tableau
Tableau Software, a privately held company in Seattle, Washington (US), builds software that delivers fast analytics and rapid-fire business intelligence to everyday business people. Tableau's products include Tableau Desktop, Tableau Server, Tableau Digital, and the free Tableau Public. People can install Tableau and connect to nearly any data source in minutes, whether it’s an enterprise-wide data warehouse or local files. Once connected, they can analyze data through an easy drag-and-drop interface. Tableau has already attracted over 65,000 licensed users, from one-person businesses to the world’s largest organizations. Tableau began as an extensive R&D project inside Stanford University’s prestigious Department of Computer Science. Professor Pat Hanrahan and Chris Stolte, a Ph.D. student at the time, together combined a structured query language for databases with the communication power of visual graphics, inventing a new database visualization language called VizQL™ (Visual Query Language). Under the technical leadership of Hanrahan and Stolte and the business acumen of CEO Christian Chabot, the VizQL foundation produces a fundamentally new way of interacting with the same relational databases that are the backbone of the global database and business intelligence markets. Read More...
HR Manager to HCM Strategist in Four Easy Steps
Source: Ultimate Software Demand for global workforce visibility and insight is huge; yet many HR teams today are only able to produce data on what is currently happening or what occurred in the past. But HR needs to move beyond “what occurred,” applying full analytical capabilities to understand “why an event happened” so proactive changes can be made to improve overall business performance. This type of complex exploration and examination, where financial implications and cause and effect are studied, helps elevate HR to the most strategic level—transforming the HR manager to HCM strategist. Read this white paper to discover how cohesive business intelligence can proactively impact your organization. Read More...


You may also be interested in these related documents:

The Delphi Technique for Software Estimation
Source: Chemuturi Consultants The Delphi technique—drawing wise counsel from senior and experienced software developers—can help you prepare estimates for software development projects. With this method of software estimation, project specifications are given to a few experts, depending on their availability. Learn about the essential steps involved in this software estimation methodology for more accurate estimates of software development effort. Read More...
How to Prevent Data Leaks and Achieve PCI Compliance
Source: Rapid7 The greatest threat on the Internet involves increased data theft, data leakage, and targeted attacks for the purpose of stealing confidential information. To combat this, the payment card industry (PCI) has created a data security standard (DSS) that holds all merchants—regardless of size—to much higher standards of performance when it comes to protecting customers’ financial and personal information. Read More...
A Roadmap for Achieving Enterprise Mobility Security
Source: BT INS The latest threat plaguing the corporate office is clipped to the belts and purses of your workforce—their mobile devices. And while employees have the ability to keep in touch, in real time, with their clients and the office, it also increases the risk of security breaches. Finding weaknesses and securing your mobile network should be one of your highest priorities—someone may be stealing your sensitive data right now. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.