file changes

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesnt have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach arent found in the contents of the files that are traversing your network. Instead, theyre found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached files entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM APAC
Published By: Solidcore     Published Date: Aug 21, 2007
Learn how change control technology helps organizations comply with PCI DSS by tracking changes to critical files, determining if changes are authorized, and selectively preventing unauthorized change.  Read this white paper on how you can relieve the burden of out-of-process and other unauthorized changes by using real-time monitoring and selective enforcement software. 
Tags : 
pci data, credit card, payment card, pci, compliance, privacy, customer information, data security, database security, solidcore, solid core, security, security management, data protection, pci compliance
    
Solidcore
Published By: Pure Storage     Published Date: Feb 25, 2014
This is a white paper that assumes familiarity with Oracle database administration as well as basic Linux system and storage administration tasks as required for a typical database installation, such as creating partitions and file systems. The Pure Storage Flash Array is ready to run your Oracle database with no changes to your existing configuration. You can realize significant improvements in performance and ease of manageability
Tags : 
pure storage, oracle, database, flash for oracle, flash for database, it management
    
Pure Storage
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Patton Harris and Rust and Associates has 13 branches.  Management and IT needed a way to help these offices work on projects together to optimize company resources.  Using GlobalSCAPE WAFS gave PHR+A fast file access across branches using minimal system resources. No management is required as it operates in the background and real time byte level differencing not only reduces bandwidth usage and spikes but also the changes are sent as they happen – not when they are needed.
Tags : 
wafs, wan, wans, wide area networks, file transfer, file transmission, secure file transfer, mft, eft, managed file transfer, enhanced file transfer, globalscape, file access, bandwidth management, collaboration, information management
    
GlobalSCAPE
Published By: ZoomInfo     Published Date: Sep 07, 2010
Generate highly-qualified candidate lists effortlessly and instantly connect with direct contact information. The ZoomInfoT Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation candidate sourcing tool, ZoomInfoT Pro, featuring robust search criteria, in-depth candidate profiles, and automated alerts on profile updates and changes. Start your free trial today.
Tags : 
zoominfo, candidate, search, database, sourcing, pipeline, conversion rates
    
ZoomInfo
Published By: EventTracker     Published Date: Nov 22, 2010
Ten conditions in Windows to monitor to make your organization more secure, and suffer less operational impact due to unplanned outages.
Tags : 
windows, log management, siem, file changes, registry changes, compliance, software compliance, sarbanes oxley compliance, desktop management
    
EventTracker
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.