Pod Slurping-An Easy Technique for Stealing Data

Just when you thought you had all your security measures figured out, along comes the portable storage device to make you question them all over again. With the popularity of portable consumer products—and their ever-increasing storage space—comes a greater risk of losing sensitive corporate data. To secure corporate data, companies must not only focus on perimeter security, but on internal security weaknesses as well.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

IBM Cognos Express Workspaces

Equip everyone in your company with the tools to outperform—including reports, analysis, statistics, dashboards, what-if analysis, plans, budgets, and more. This short demo shows how easy it is to make smarter decisions confidently and minimize decision latency.
  • Written By:
  • Published On: June 2013

Deploy Tactical, Affordable, Scalable Analytics

Self-service solutions empower business users to drive decision making. IBM analytics solutions are easy to install, configure, manage, and secure, and they scale to a broad set of users. Leaders have access to data across the business. These solutions deliver a unified experience across Web, mobile, and desktop, including solutions for reporting, analysis, predictive analytics, planning, forecasting, and regulatory reporting.
  • Written By:
  • Published On: December 2013

7 Signs You Need Advanced Analytics for Salesforce.com (or Any CRM)

Customer relationship management (CRM) applications provide reports and dashboards, but if you rely on the built-in analytic capabilities of CRM, you’re not extracting the true value of the information in your CRM system. You need robust, easy-to-access analytics embedded right in your CRM solution. Download this white paper for seven signs that you are not operating efficiently.
  • Written By:
  • Published On:

You may also be interested in these related documents:

How to Prevent Data Leaks and Achieve PCI Compliance

The greatest threat on the Internet involves increased data theft, data leakage, and targeted attacks for the purpose of stealing confidential information. To combat this, the payment card industry (PCI) has created a data security standard (DSS) that holds all merchants—regardless of size—to much higher standards of performance when it comes to protecting customers’ financial and personal information.
  • Written By:
  • Published On:

A Roadmap for Achieving Enterprise Mobility Security

The latest threat plaguing the corporate office is clipped to the belts and purses of your workforce—their mobile devices. And while employees have the ability to keep in touch, in real time, with their clients and the office, it also increases the risk of security breaches. Finding weaknesses and securing your mobile network should be one of your highest priorities—someone may be stealing your sensitive data right now.
  • Written By:
  • Published On:

Types of Prefabricated Modular Data Centers

Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
  • Written By:
  • Published On: