RSS feed Get our RSS feed

News by Topic

endpoint

Results 1 - 25 of 529Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Dell PC Lifecycle     Published Date: May 18, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of frontline detection and are shifting priorities to close gaps that place their organizations at risk.
Tags : 
     Dell PC Lifecycle
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECTョ was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : cyber, threat, protection, av-test, cylance
     Cylance
By: Cylance     Published Date: Jul 02, 2018
During NSS Labs 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECTョ and CylanceOPTICS v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylanceョ position on the Security Value Map (SVM). After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : endpoint protection, cylance, security
     Cylance
By: Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECTョ in an offline environment against major threats that subsequently appeared in the wild. The test explores the product痴 ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an 殿rtificial intelligence (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This 撤redictive Advantage (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : malware, predictive, test, response
     Cylance
By: Cylance     Published Date: Jul 02, 2018
When selecting a new cybersecurity vendor, Cylanceョ recommends that you review your options carefully. Here are 4 things to consider before making a selection: Effectiveness, Simplicity, Performance, Vendor Viability. See the infographic for more details.
Tags : security, endpoint, data, simplicity, effectiveness
     Cylance
By: Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were 登ffering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while. Daniel also stated that Volition had little time to determine which vendors are 都elling the truth and which ones are selling the dreams. Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECTョ, Cylance痴 artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : volitionrx, cyber, security, data
     Cylance
By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite痴 Vice President of Information Technology, is responsible for overseeing all aspects of the company痴 IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, 鄭 lot of malware and email viruses were making it through the environment, all bypassing our email security and AV. Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage.Matthew knew Safelite needed to make a change, and fast. Having worked with Cylanceョ at two previous companies, he was confident CylancePROTECTョ could significantly improve Safelite痴 endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : safe, lite, cybersecurity, data
     Cylance
By: Cylance     Published Date: Jul 02, 2018
Phoenix Children痴 CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team痴 existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : hospital, cyber, security, data
     Cylance
By: Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECTョ, and its deployment and configuration services, ThreatZero. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees productivity were boosted. Read more in the full TEI report.
Tags : economic, cylance, roi, enterprises
     Cylance
By: Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today痴 cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : ransomware, threats, cyber, security, data
     Cylance
By: Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it痴 occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning what they are and how they work has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : cylance, endpoint, protection, cyber, security
     Cylance
By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It痴 often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company痴 most valuable data even while it痴 potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
     Commvault
By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization痴 data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
     Commvault
By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today痴 advanced malware attacks using a combination of four techniques: Advanced analytics Collective global security threat intelligence Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) Continuous analysis and retrospective security
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we致e all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: Where sandboxing technology stands today Why it fails to meet the needs of organizations What痴 needed for effective malware analysis
Tags : 
     Cisco
By: CrowdStrike     Published Date: Oct 23, 2017
The endpoint security market continues to expand with vendors old and new marketing their solutions as 渡ext generation game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging how does the buyer find the true next-generation protection today痴 targeted, advanced threats demand? A new white paper, 典he Five Essential Elements of Next -Generation Endpoint Protection, offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: Details on the five essential capabilities that define true next-generation EPP and why they are so important A matrix that evaluates and compares the potential impact of different solutions A list of top questions to ask ve
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy choosing the best solution can be challenging. This white paper, 摘ndpoint Detection and Response: Automatic Protection Against Advanced Threats, explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the 摘DR maturity model can help you accurately evaluate vendor claims and choose the solution that best fits your organization痴 needs How the CrowdStrikeョ EDR solution empowers organ
Tags : 
     CrowdStrike
By: Carbonite     Published Date: Jul 18, 2018
ゥ 2018 Carbonite, Inc. All rights reserved. Case study Diamond Foods Diamond of Californiaョ nuts are household staples for shoppers across the U.S. But constantly filling grocery store shelves with snacks requires intricate supply chain management that relies on critical business data, including complex spreadsheets and enterprise resource planning files, to keep production and deliveries on schedule. 的f our critical servers go down or we lose important data on employee laptops, it has a direct impact on our bottom line, says Kentrell Davis, Senior Client Support Services Analyst at Diamond Foods.
Tags : 
     Carbonite
By: Gigamon     Published Date: Oct 25, 2017
You know that visibility is critical to security. You simply can稚 secure what you can稚 see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization痴 cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
     Gigamon
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics