RSS feed Get our RSS feed

News by Topic

mitigation

Results 1 - 25 of 125Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : cloud security, scale, data center, ddos
     Akamai Technologies
By: Dassault Systemes     Published Date: Jul 21, 2017
There is a significant gap between how manufacturing companies value specific aspects of their project execution and how they judge their performance. Better education in project management methodologies and standalone software tools alone will limit a company’s ability to perform at its highest level. A study by Engineering.com found that a web-based Product Lifecycle Management (PLM) solution is the best way for a company to fully achieve its best practices. This white paper shares how a PLM solution with embedded project management can uniquely provide: • Full alignment between projects and the product portfolio • Coordination of a project’s schedule, resources and scope • Automatic real-time status updates of project tasks • Mitigation of project risks based upon real-time assessment of product development Benefit from the unique value provided by PLM systems with embedded project management.
Tags : manufacturing, project execution, product management education, software tools, web based, product lifecycle management, product portfolio, project schedule
     Dassault Systemes
By: Mimecast     Published Date: Apr 18, 2017
"Looking to achieve regulatory compliance? Legal risk mitigation? Information governance? Workflow efficiency imperatives? Download this white paper from Enterprise Management Associates (EMA) for a checklist for evaluating email archiving solutions. This white paper also provides insights offered by IT professionals about their experiences with Mimecast and the cost savings experienced."
Tags : email archiving, mimecast, risk mitigation, information governance
     Mimecast
By: Verisign     Published Date: May 31, 2017
Verisign has a unique view into distributed denial of service (DDos) attack trends, including attack statistics, behavioral trends and future outlook. The below data contains observations and insights about attack frequency and size derived from mitigations enacted on behalf of customers of Verisign DDoS Protection Services from January through March 2017.
Tags : 
     Verisign
By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks
     Cisco
By: Dell     Published Date: Feb 04, 2015
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores Windows Server migration options, hardware/software replacements, and support services to help customers tackle a modernization effort. It also evaluates the benefits that customers can enjoy, thanks to a move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : dell, windows, microsoft, modernization, risk, management, modernization, idc
     Dell
By: Schneider Electric     Published Date: Jun 06, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
     Schneider Electric
By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics
     CA Technologies
By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
     Akamai
By: Arbor     Published Date: Mar 13, 2014
IANS reviews the use of on-premise DDoS detection and mitigation tools.
Tags : arbor, ians, arbor networks, ddos protection, custom report, infrastructure, ddos solutions, ddos attacks
     Arbor
By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud
     Arbor
By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : akamai, state of the internet, security, security report, cybersecurity, ddos, analytics
     Akamai Technologies
By: Dyn     Published Date: Oct 04, 2016
Distributed Denial of Service (DDoS) attacks increased by over 100% YoY. With nearly a quarter of the attacks aimed at the DNS layer and close to 80% not identified until they reach the DNS layer, it is no secret you should evaluate your Manage DNS provider critically as your first line defense in DDoS mitigation. Download this eBook to best equip your business against impending DDoS attacks including: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency • How to get the best before, during and after attack protection
Tags : ddos, dns, cdn, attacks
     Dyn
By: IBM     Published Date: Jul 26, 2017
The risk reporting environment for banks has changed. Regulatory imperatives that were largely driven by the financial crisis of 2007— such as Dodd-Frank, Principles for Effective Risk Data Aggregation and Risk Reporting (BCBS 239) by the Basel Committee on Banking Supervision (BCBS), Comprehensive Capital Analysis and Review (CCAR) and others—are impacting banks around the globe. These imperatives are forcing banks to rethink and reinvent how their systems integrate and how data from across the bank flows into the aggregated risk and capital reports required by regulatory agencies. Banks must be able to convey to agencies that the data is complete, correct and consistent in order to establish that the reports are trustworthy
Tags : risk mitigation, risk reporting, banking, data aggregation
     IBM
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : web security, best practices, mitigation services, network management, automotive, security
     Akamai Technologies
By: UPS     Published Date: May 24, 2017
One-fourth of all healthcare products today are temperature-sensitive and that number is growing. For many pharmaceutical or biologic shipments, 2 degrees Celsius is all that separates medicine from becoming spoiled inventory and a costly write-off. Here are four risk mitigation strategies for temperature-sensitive shipments.
Tags : strategies, healthcare, shipments, ups, temperature-sensitive
     UPS
By: Arbor     Published Date: Sep 15, 2014
This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.
Tags : ddos attacks, it security, ddos mitigation, security
     Arbor
By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : financial profit, economic espionage, it security, risk mitigation, security
     Kaspersky Lab
By: Aon Hewitt     Published Date: Aug 06, 2015
Download this white paper to learn why it is so important for public-sector employers to calculate the financial impact of the Excise Tax on their plans and on their employees and retirees, and understand their available options for limiting exposure.
Tags : 2018 excise tax, public sector, retirees, private sector, tax mitigation
     Aon Hewitt
By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : risk, security, security programme, security, security application
     Forcepoint
By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.
Tags : sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation
     SunGard Availability Services
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics