RSS feed Get our RSS feed

News by Topic

securing

Results 101 - 125 of 458Sort Results By: Published Date | Title | Company Name
By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
     Palo Alto Networks
By: IBM     Published Date: Oct 06, 2016
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months and can cost an organization an average of 11 million USD.
Tags : cyber security, security analysis, integrated data systems, cyber intelligence, malware investigation
     IBM
By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : palo alto, systems, software, security
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Sep 30, 2016
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them.
Tags : palo alto, saas, casb, security
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment.
Tags : palo alto, virtualization, cloud, firewall, security, digital
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Dec 02, 2016
The public cloud has rapidly moved past the novelty, curiosity stage to the business critical initiative stage for nearly every established organization. In a 2016 IDC CloudView survey, 80% of the enterprises contacted were actively engaged in public-cloud projects. The driving forces are a realization that the public cloud is “enterprise ready” and the need to be more agile, more responsive and more competitive. For those organizations that already have an existing physical IT infrastructure, the common starting point is a hybrid approach, which extends the existing data center into Microsoft® Azure™.
Tags : palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
     Palo Alto Networks
By: Juniper Networks     Published Date: May 17, 2017
Securing the road map to your future-ready netowork. Download now to learn more!
Tags : 
     Juniper Networks
By: IBM     Published Date: Jan 19, 2017
Read this article to learn how you can address the modern challenges of securing business information in the cloud.
Tags : ibm, analytics, ecm, box, box for it, content, cloud, content management
     IBM
By: IBM     Published Date: Jul 31, 2017
Read this article to learn how you can address the modern challenges of securing business information in the cloud.
Tags : ibm, cloud, business security
     IBM
By: Comcast Business     Published Date: Apr 13, 2017
The Internet of Things is perhaps one of the most transformative technologies of our time. The ability to connect devices and services to increase efficiencies, streamline operations and reduced manual labor has permeated multiple facets of our lives, enabling us to interact with technology and data in ways previously thought impossible. Download now!
Tags : 
     Comcast Business
By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : ics, scada, cyberx, cyber security, hacking, randomware
     CyberX
By: Oracle     Published Date: Feb 22, 2019
Oracle recently announced a range of self-driving, self-securing, and self-repairing cloud platform autonomous services under the umbrella of its broader PaaS portfolio. Oracle’s autonomous cloud proposition offers the combined benefits of developer productivity, faster time-to-value, and cost savings to its growing cloud services customer base. While Oracle has dedicated substantial investment and resources in developing one of the most extensive PaaS portfolios available in the market, it is the underlying autonomous capabilities that are a key differentiator, making the overall value proposition of Oracle PaaS portfolio more attractive to enterprise users.
Tags : 
     Oracle
By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
     OneLogin
By: IBM     Published Date: Mar 29, 2018
Evaluating cloud providers and looking for a trusted technology partner? Focus on these five vital aspects of cloud security.
Tags : security, cloud platform, cloud security
     IBM
By: IBM     Published Date: Mar 29, 2018
This white paper explores how you can support cloud platform security and DevOps needs by building a hardware-rooted chain of trust.
Tags : container platform, devops, cloud platform
     IBM
By: Group M_IBM Q418     Published Date: Oct 24, 2018
Evaluating cloud providers and looking for a trusted technology partner? Focus on these five vital aspects of cloud security.
Tags : 
     Group M_IBM Q418
By: Menlo Security     Published Date: Jun 01, 2018
"Uncover the Business Impact of Managing Risky Web Content Download this white paper to learn: How to safely manage ""uncategorized"" websites when sites are unknown to the secure web gateway (SWG) policies, which are largely based on website categories, such as news, entertainment, weather, social media, etc. The cost implications of securing web content, including staffing, clean-up and risk mitigation Isolation - a new technique for malware prevention to maintain end user & IT staff productivity Administrators can either be lenient in allowing access to uncategorized sites, increasing malware risk, or deny access and deprive employees of necessary information. There are hidden costs to both approaches. "
Tags : 
     Menlo Security
By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
     Kaseya
By: Alert Logic     Published Date: May 23, 2019
Securing web applications in the AWS cloud environment relies on the cloud service provider and the customer working together in a shared responsibility model. Effective security for web applications on AWS requires full visibility into the environment in which the apps live, while also proactively monitoring for attacks without causing delays in application development and delivery. For some customers this may be a challenge due to limited personnel resources or expertise. This is where Alert Logic can help. We will automatically show you why, where, and how to respond to vulnerability findings and provide you with short- and long-term recommendations to stop active attacks. To help guide the way, following are key considerations for providing sound web application security running on the AWS cloud.
Tags : 
     Alert Logic
By: Centrify     Published Date: May 26, 2016
This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.
Tags : data security, security, cyber attacks, threat and vulnerability management
     Centrify
By: Centrify     Published Date: May 26, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : security, endpoint security, access control, authentication
     Centrify
By: Oracle     Published Date: Jun 04, 2019
This survey report shows that while finance departments take responsibility for ensuring there are data-management strategies in place that include securing their organisation’s data, they struggle to manage the huge volumes of data and gain valuable insights from it. This affects both their confidence in the security of the data and their ability to manage it ethically. The number one priority of finance leaders is to enforce technologies that enable insights instantly, any place, anytime, to enable better forecasting. Read report
Tags : 
     Oracle
By: Blue Lane     Published Date: Apr 03, 2007
Find out how Blue Lane's unique approach can help health care IT pros quickly secure hard to patch servers.
Tags : ips, intrusion, patching, vulnerability, regulations, fda, security, hipaa
     Blue Lane
By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms
     MessageLabs
By: Clearswift     Published Date: Jun 09, 2008
This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.
Tags : clearswift, network security, internet security, web security
     Clearswift
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics