「protecting」の検索結果 | 調査のチカラ

分類の限定

登録日の限定

日 以降のデータに限定
日 以前のデータに限定

タグの限定

のタグが付いているデータに限定

会社名の限定

の会社名のデータに限定

  • ソート条件:
  • 表示件数   :
  • 表示項目   :
  • 検索対象   :
  • 注目レベル:
2014年8月19日Thycotic★フィードバック数:0セキュリティ/ネットワーク海外

ハッカーの意識調査です。

What makes today’s hackers tick?

...What makes today’s hackers tick?Understanding why black hat hackers do what they do is the first step toward better protecting your sensitive data from unsanctioned access. What motivates a hacker – is it money, fame, or the thrill of the chase? Do...

2017年3月9日Reputation Instituteフィードバック数:0マーケティング

2017 Global RepTrakR 100

..., focusing specifically on the many opportunities that are rooted in new... CRISIS MANAGEMENT: Protecting Reputations During a Crisis Description:The purpose of this session is to develop an understanding of how crisis communication can be utilized...

2015年2月16日Robert Half Technologyフィードバック数:0セキュリティ/ネットワーク海外

Surge in IT Security Measures Anticipated in 2015

...Surge in IT Security Measures Anticipated in 2015Survey: Employee Training Top Priority for CIOs in Protecting Company InformationFeb 12, 2015 4:12pm,/PRNewswire/ -- Chief information officers (CIOs) are taking a multipronged approach to protecting...

2015年9月15日ソリマチフィードバック数:0大型消費/投資海外

The Most Hackable Cars on the Road

... to the dangers of their cars being hacked, recent high profile hacks have refocused their efforts to be more transparent on security features that protect vehicles from hackers. While digital forensics teams can assist after a security breach occurs, protecting...

2016年4月14日DELLフィードバック数:0セキュリティ/ネットワーク海外

Dell Data Security Survey

... to the worldof tools and opportunities available.Protecting data by limiting employee mobility is a significant concern.The common narrative is that all offices are becoming more mobile,but the truth is that security is halting mobility more than some companies...

2014年4月4日ESETフィードバック数:0セキュリティ/ネットワーク海外

With just days to go, just how many PCs are still running Windows XP?

... time and plan to stay protecting Windows XP computers for a little while longer.And, by the way, if you’re not sure if you are running Windows XP or not, here is a helpful webpage created by Microsoft: × https://www.welivesecurity...

2013年11月25日IBMフィードバック数:0マーケティング海外

IBM Study Finds More Than Half of Midmarket Companies Lack an Integrated Digital Strategy

... emphasis placed on protecting patient information," said Scott Megill, CEO, Coriell Life Sciences. “Our work with IBM is facilitating the doctor-patient exchange of genetic information and providing necessary, easy-to-understand clinical interpretations...

2016年5月28日check-pointフィードバック数:0セキュリティ/ネットワーク

Threat of Mobile Malware Persists as Attacks Targeting iOS Devices Increase

... Software Technologies Ltd.Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types...

2015年9月11日Duo Securityフィードバック数:0セキュリティ/ネットワーク海外

Identifying Bad Apples: Getting to the Core of iOS Vulnerabilities

... here is key - the goal is to update as soon as updates are available on their device.Protecting Against Outdated and Unpatched DevicesHere’s a few practical tips to address these issues in your organization:Educate your users on the importance...

2016年7月4日verizonフィードバック数:0セキュリティ/ネットワーク海外

Verizon 2016 Data Breach Investigations Report

... of time before a large scale breach impacts mobile and IoT devices, which means organizations should continue to be vigilant about protecting smartphones and IoT devices.Also worth noting from the report is that Web application attacks climbed to the #1...

2014年11月14日ガートナーフィードバック数:0製造業/エレクトロニクス海外

Gartner Says 4.9 Billion Connected "Things" Will Be in Use in 2015

... that by the end of 2017, over 20 per cent of organizations will have digital security services devoted to protecting business initiatives using devices and services in IoT.The IoT will bring into the digital security architecture dozens of new platform options...

2017年3月3日check-pointフィードバック数:0セキュリティ/ネットワーク

Ransomware Doubled in Second Half of 2016

.... (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security...

2013年11月27日Canalysフィードバック数:0デジタル家電海外

Tablets to make up 50% of PC market in 2014

... their shipments deteriorate. Apple’s prioritization of protecting gross margins will see its PC market share continue to decline. “Apple’s decline in PC market share is unavoidable when considering its business model. Samsung narrowly took the lead in EMEA...

2015年7月23日HPフィードバック数:0セキュリティ/ネットワーク海外

HP Study Reveals Smartwatches Vulnerable to Attack

... strong authorization is offered. In addition, enabling passcode functionality, ensuring strong passwords and instituting two-factor authentication will help prevent unauthorized access to data. These security measures are not only important to protecting...

2012年12月12日EMCジャパン★フィードバック数:72企業情報システム海外

世界の「データ量」の増加状況がわかります。

New Digital Universe Study Reveals Big Data Gap: Less Than 1% of World’s Data is Analyzed; Less Than 20% is Protected

...New Digital Universe Study Reveals Big Data Gap: Less Than 1% of World’s Data is Analyzed; Less Than 20% is ProtectedOpportunities Abound for Companies Capable of Protecting and Extracting Value from an Expanding Universe of Data; By 2020, Emerging...

2016年1月26日ソフォスフィードバック数:0セキュリティ/ネットワーク

The State of Encryption Today

... businesses are giving a high priority to securing theircustomers’ data, the same can’t always be said when it comes to protecting their employees’data. Despite being highly motivated to secure their employees’ data, the reality doesn’tmatch up...

2017年3月11日Check Pointフィードバック数:0セキュリティ/ネットワーク

2017年サイバー・セキュリティ調査

... IN THE CLOUD?There are a number of technologies enterprises utilize for protecting their data in the cloud, chiefamong them is data encryption. However, encryption itself isn’t a fail-safe solution. Organizationsshould employ comprehensive protections to ensure...

2014年12月21日Pew Researchフィードバック数:0セキュリティ/ネットワーク海外

The Future of Privacy

... innovation and monetization while also offering individuals choices for protecting their personal information in easy-to-use formats?Please elaborate on your answer. (Begin with your name if you are willing to have your comments attributed to you.) Describe...

2013年11月21日Ernst & Young★フィードバック数:0セキュリティ/ネットワーク海外

Ernst & Youngのレポートです。

Global Information Security Survey 2013

... number ofexecutives from organizations that, based on our experience in information security, webelieve are more successfully protecting their organization from cyber risks and threatsby being proactive and focused on the unknown.10 | Insights...

2015年2月8日経済産業研究所フィードバック数:0製造業/エレクトロニクス

Japan's Environmental Policy 日本の環境政策(改訂版)

...資格を持つ公害防止の管理者を置くことを義務づけている。 2. Protecting Environmental Quality of Water水質保全2-1 Regulations on Effluents排水規制In order to regulate effluents discharged by factories and other establishments, the Water Pollution Control Law was legislated in 1970(注8). Also, in order to impose more...

2013年6月7日経済産業省フィードバック数:0製造業/エレクトロニクス海外

平成24年度国際エネルギー使用合理化等対策事業(イラクにおける水ミッション派遣に関する委託調査)Water and Sewage Sectors in Iraq:Sector Report

... section). Similarly, the Department of Protecting and Improving theEnvironment, which answers to the MoE, also must issue a license to anyone seeking to dump ordrain water into Iraq’s waterways.TariffsThe water tariff in Iraq is currently set...

Who Has Your Back? Government Data Requests 2015

... communicate.In this climate, we increasingly look to technology companies themselves to have the strongest possible policies when it comes to protecting user rights. Which companies will stand by users, insisting on transparency and strong legal standards...

キーワード検索

このページをシェア

  • mixiチェック

「調査のチカラ」は無料で閲覧できる、たくさんの調査データのリンク集です。検索機能も備えていますので、調査データが他のどこよりも簡単に探せます。
インターネットの発展によって、多くの企業が貴重なデータをオンラインに公開してくれるようになりました。それらの”調査のチカラ”を皆さんに活用していただくことで、データを公開してくれている企業にももっと光が当たるようになればうれしいです。
※ご紹介しているデータの利用許諾や購入については提供元ごとに対応が異なります。是非とも各リンク先にてご相談ください。
もう少し詳しい自己紹介ページはこちら
RSS Facebook Twitter メルマガ

日付で探す

新着・日付一覧へ
  2017年7月
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          
 

お知らせ