RSS feed Get our RSS feed

News by Topic

mitigation

Results 1 - 25 of 121Sort Results By: Published Date | Title | Company Name
By: Schneider Electric     Published Date: Jun 06, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
     Schneider Electric
By: Mimecast     Published Date: Apr 18, 2017
"Looking to achieve regulatory compliance? Legal risk mitigation? Information governance? Workflow efficiency imperatives? Download this white paper from Enterprise Management Associates (EMA) for a checklist for evaluating email archiving solutions. This white paper also provides insights offered by IT professionals about their experiences with Mimecast and the cost savings experienced."
Tags : email archiving, mimecast, risk mitigation, information governance
     Mimecast
By: IBM     Published Date: May 12, 2017
In today’s world, the data is flowing from all directions: social media, phones, weather, location and sensor equipped devices, and more. Competing in this digital age requires the ability to analyze all of this data, and use it to drive decisions that mitigate risk, increase customer satisfaction and grow revenue. Using a combination of proprietary software and open source technology can give your data scientists and statisticians the analytical power they need to find and act on insights quickly. IBM® SPSS® Statistics provides all of the data analysis tools you need, and integrates with thousands of R extensions for maximum power and flexibility. In this next Data Science Central Webinar event, we will show how SPSS Statistics can help you keep up with the influx of new data and make faster, better business decisions without coding.
Tags : ibm, spss, data analysis, statistics, risk mitigation
     IBM
By: Verisign     Published Date: May 31, 2017
Verisign has a unique view into distributed denial of service (DDos) attack trends, including attack statistics, behavioral trends and future outlook. The below data contains observations and insights about attack frequency and size derived from mitigations enacted on behalf of customers of Verisign DDoS Protection Services from January through March 2017.
Tags : 
     Verisign
By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks
     Cisco
By: Dell     Published Date: Feb 04, 2015
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores Windows Server migration options, hardware/software replacements, and support services to help customers tackle a modernization effort. It also evaluates the benefits that customers can enjoy, thanks to a move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : dell, windows, microsoft, modernization, risk, management, modernization, idc
     Dell
By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics
     CA Technologies
By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
     Akamai
By: Arbor     Published Date: Mar 13, 2014
IANS reviews the use of on-premise DDoS detection and mitigation tools.
Tags : arbor, ians, arbor networks, ddos protection, custom report, infrastructure, ddos solutions, ddos attacks
     Arbor
By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud
     Arbor
By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : akamai, state of the internet, security, security report, cybersecurity, ddos, analytics
     Akamai Technologies
By: Dyn     Published Date: Oct 04, 2016
Distributed Denial of Service (DDoS) attacks increased by over 100% YoY. With nearly a quarter of the attacks aimed at the DNS layer and close to 80% not identified until they reach the DNS layer, it is no secret you should evaluate your Manage DNS provider critically as your first line defense in DDoS mitigation. Download this eBook to best equip your business against impending DDoS attacks including: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency • How to get the best before, during and after attack protection
Tags : ddos, dns, cdn, attacks
     Dyn
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : web security, best practices, mitigation services, network management, automotive, security
     Akamai Technologies
By: UPS     Published Date: May 24, 2017
One-fourth of all healthcare products today are temperature-sensitive and that number is growing. For many pharmaceutical or biologic shipments, 2 degrees Celsius is all that separates medicine from becoming spoiled inventory and a costly write-off. Here are four risk mitigation strategies for temperature-sensitive shipments.
Tags : strategies, healthcare, shipments, ups, temperature-sensitive
     UPS
By: Arbor     Published Date: Sep 15, 2014
This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.
Tags : ddos attacks, it security, ddos mitigation, security
     Arbor
By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : financial profit, economic espionage, it security, risk mitigation, security
     Kaspersky Lab
By: Aon Hewitt     Published Date: Aug 06, 2015
Download this white paper to learn why it is so important for public-sector employers to calculate the financial impact of the Excise Tax on their plans and on their employees and retirees, and understand their available options for limiting exposure.
Tags : 2018 excise tax, public sector, retirees, private sector, tax mitigation
     Aon Hewitt
By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : risk, security, security programme, security, security application
     Forcepoint
By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.
Tags : sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation
     SunGard Availability Services
By: Delphix     Published Date: Jun 27, 2014
Making your IT organization more elastic and efficient is hard. Doing it while staying in compliance with regulations is even harder. Download this white paper to learn how your IT organization can accelerate business, introduce new services, and reach new markets, all while staying in compliance.
Tags : mitigation, time to value, regulations, organization, new markets, compliance
     Delphix
By: BitSight Technologies     Published Date: Feb 03, 2015
In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.
Tags : security ratings, it risk mitigation, cyber risk, performance metrics, network security risk, security
     BitSight Technologies
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics