RSS feed Get our RSS feed

News by Topic

defense

Results 351 - 375 of 458Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : security operations, deployment, service delivery, problem management, security
     IBM
By: Rapid7     Published Date: Oct 09, 2013
Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.
Tags : gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection
     Rapid7
By: Juniper Networks     Published Date: Feb 18, 2015
Discover how a dynamic, intelligent firewall can improve your security. This Webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.
Tags : firewall, network, business assets, security, management
     Juniper Networks
By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
     Absolute Software
By: Arbor Networks     Published Date: Feb 04, 2011
Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.
Tags : ddos protection, arbor networks, dns, domain name system, distributed denial of service, botnet, ddos defense solution, roi calculation
     Arbor Networks
By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Together with our partner Cornerstone, HCMG has benchmarked the last five years of progress in human capital management for government. This research is designed to aid leaders across Federal, Defense, State, and Local sectors in benchmarking their own performance and in developing America’s present and future leaders.
Tags : capital, management, government, cornerstone
     Cornerstone OnDemand
By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting
     Riverbed
By: Damballa     Published Date: Oct 03, 2014
In this paper, the SANS Institute reviews how Damballa Failsafe can be the last line of defense to alert you when devices have been compromised. • Eight detection engines produce fidelity in True Positives • Risk engines priorities response to infections that matter most
Tags : damballa, advanced threats, failsafe, true positives, risk engines, infections, security
     Damballa
By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, security
     Arbor Networks
By: Citrix     Published Date: Apr 16, 2014
This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.
Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
     Citrix
By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network
     Cisco
By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation
     Cisco
By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
     Cisco
By: iboss     Published Date: Jan 22, 2018
While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.
Tags : iboss, device security, intrusion, network security
     iboss
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : citrix, cyberthreat, report, defense
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : citrix, cyberthreat defense, report, 2015
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : citrix, cyberthreat, infographic, 2015 report
     Citrix Systems, Inc.
By: Thawte     Published Date: Oct 05, 2015
When it comes to protecting your website and customers from attack, knowledge is your best weapon. But with ever-changing threats and ever-evolving defenses comes ever-growing potential for common misconception. To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : website security myths, customer protection, ever-changing threats, website security, security
     Thawte
By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration
     IBM
By: IBM     Published Date: Apr 15, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : ibm, product development, systems development, it engineering, business objectives, traceability, collaboration
     IBM
By: Unitrends     Published Date: Feb 10, 2017
Businesses are producing exponentially more data and using more technology, and it all needs to be backed up and stored. While IT manages the explosive growth on the digital front, there’s pressure on departments to stabilize or even cut spending. Learn how to protect your business at a time when your data is growing 33 times faster than your IT staff. Download now!
Tags : unitrends, backup, continuity defense, digital front, disaster recovery, digital assets
     Unitrends
By: Viavi Solutions     Published Date: Jan 04, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
     Viavi Solutions
By: Viavi Solutions     Published Date: Jan 04, 2017
The right Network Performance Monitoring and Diagnostics (NPMD) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) defenses.
Tags : 
     Viavi Solutions
By: Symantec Corporation     Published Date: Jun 24, 2014
The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : security, malware, code signing, software, downloads
     Symantec Corporation
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics