Export tabulation results to Excel—Update

It’s summer time, which means we have interns working at StataCorp again. Our newest intern, Chris Hassell, was tasked with updating my community-contributed command tab2xl with most of the suggestions that blog readers left in the comments. Chris updated tab2xl and wrote tab2docx, which writes a tabulation table to a Word file using the putdocx command.

To install or update your tab2xl command, type

. net install, replace

To install the new tab2docx command, type

. net install

tab2xl now allows weights, if, in, formatting of the cells, and two-way tabulations. Once installed, you can type

. sysuse auto, clear(1978 Automobile Data) . tab2xl rep78 foreign in 1/50 [fweight=mpg] using testfile, col(1) row(1)file testfile.xlsx saved

to produce

To write the table to a Word document, you must first open a .docx file using the command putdocx begin, type your tab2docx command to append the table to your file, and then save the document using putdocx save filename. For example, typing

. sysuse auto, clear(1978 Automobile Data) . putdocx begin . tab2docx rep78 in 1/50 [fweight=mpg] . putdocx save testfile.docx

will produce

Chris did an excellent job updating tab2xl and coding tab2docx, making it easier for you to create tables for inclusion in a Word file.

Empower Identity-Driven Security by Automating Incident Response

Empower Identity-Driven Security by Automating Incident Response

Security attacks can happen in an instant. Nearly a third of people who receive a phishing email open it, according to Verizon’s Data Breach Investigations Report; and on average, these unsuspecting users click on its malicious link or attachment within a couple of minutes of receiving it. Just like that, in less than five minutes, your network, apps, data, and users can go from safe to compromised.

To stop a breach in progress before intruders get a chance to wreak havoc, security response needs to move more quickly than humans can react. Since four out of five successful breaches—as in the phishing example above—involve stolen or compromised credentials, identity management is now critical for an effective security strategy. Identity-driven security can advance your security posture by providing robust prevention and detection tools as well as enabling real-time response.

The instantaneous incident response required by today’s threat landscape is only possible in a security environment built to support it, this includes:

  • Prevention: secure your credentials by implementing strong authentication and centralized identity.
  • Detection: offer powerful visibility into user activity across environments, to spot suspicious behavior and trigger alerts.
  • Response: provide instantaneous and policy-driven actions to appropriately and effectively resolve the situation.

Okta elevates your security posture across all three areas. It provides strong authorization and centralized identity with Multi-Factor Authentication (MFA) and Single-Sign-On (SSO), to facilitate a zero trust framework. Okta also provides valuable data on suspicious activity, like excessive failed log-ins or denied MFA push notifications, via our Syslog API. Through tight integrations across leadings SIEMs or CASBs, Okta provides rich identity context to detect as well as accelerate, or even automate, your response through step-up authentication, suspension of a user account, or another action.

This real-time response can happen in a couple of ways. It can be an automated response (where possible and appropriate), with the security tool and Okta communicating directly to generate quick corrective action. Alternatively, an alert can be routed to a security analyst to make an informed enforcement decision. Pre-built integrations with analytics engines like Splunk, workflow orchestration tools like ServiceNow, security platforms like Palo Alto Networks, CASBs like Skyhigh Networks, and thousands of other security partners allow Okta to give your security analysts the intel and tools they need to keep your enterprise safe.

Okta’s identity-driven security, fueled by the industry’s broadest and deepest integration network, offers a powerful, complete solution to effectively address security threats. With attacks happening quickly and more frequently, it’s impossible to manually safeguard your environment alone. Only a sophisticated identity solution like Okta, integrated across your security infrastructure, provides the robust prevention, reliable detection, and automated response you need to keep your enterprise safe.

For more, read our whitepaper about automating incident security response, or read our post about how to evaluate your security team’s readiness for cloud-based incident response.

Achieving Data Security through a Managed File Transfer Solution

Organizations rely on the secure storage, transfer, and accessibility of their data. The negative effects of a data breach or lagging, unreliable network can cause a domino effect across every line of business in an organization. When this happens, business comes to a standstill while IT attempts to remedy the problem – which is why organizations seek out managed file transfer (MFT) solutions for a wide range of data management issues.

Data security and productivity measures are far more successful and effective when they are preemptive, which is why MFT solutions are an effective data management tool for many IT managers, especially those in heavily regulated industries such as healthcare and financial services.

Maintaining security and compliance go hand in hand. While not every compliance measure is related to a security standard, there are still many compliance mandates that work well with keeping a network secure. MFT solutions have real-time monitoring and validation security policies and controls to answer to compliance standards for handling sensitive data. Some of the standards mandated by HIPAA, HITECH, SOX and PCI contribute to security with the following standards:

  • Protect data in transit or at rest
  • Track and audit user activity and file movement
  • Meet requirements for data wiping and sanitization
  • Monitor and alert in real-time on potential violations of security standards
  • Capture compensating controls and generate reports on compliance status

Data is the life-blood of your business and ensuring that it moves efficiently and securely (both in and outside of your organization) is critical. Yet, for something so important, many organizations are littered with non-compliant and rogue data exchange solutions, making their network ripe for security breaches and failed data transactions. The use of unsanctioned devices and applications, known as shadow IT, causes a wide range of problems for organizations, including insecure data transmission and lack of visibility and control, putting your business data at risk.

The security capabilities of a MFT solution extend beyond the process of moving or storing data. A MFT solution supports overall network security:

  • Operational visibility s IT managers see problems before they happen
  • Automation improves efficiency and saves time, eliminating the need for manual processes, which indirectly improves security because IT professionals can redirect their efforts
  • Compliance standards bring an additional layer of security by regulating the security policies and practices that ensures that organizations are handling sensitive data securely
  • User-friendly ad hoc capabilities ensure that shadow IT practices aren’t being used to skirt IT policies

If data security and management are a key concern for your organization, contact us to learn more about how Globalscape’s MFT offering can you achieve your data security and management requirements.