RSS feed Get our RSS feed

News by Topic

network security

Results 76 - 100 of 1104Sort Results By: Published Date | Title | Company Name
By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : virtualization, security, consolidation, data, infrastructure, network, technology
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : security, data, users, infrastructure, bluecoat
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : data, non-malicious, malicious, ponemon, solera network
     Blue Coat Systems
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters
     Red Hat
By: Avaya     Published Date: Feb 06, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
     Avaya
By: Venafi     Published Date: Mar 26, 2015
Gartner expects that by 2017, more than 50% of network attacks will use SSL/TLS. Yet most organizations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative. Download this Solution Brief: Eliminate Blind Spots in SSL Encrypted Traffic to learn how.
Tags : blind spots, ssl encrypted traffic, network attacks, tls, decryption, security threats
     Venafi
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : utilization, challenges, dpi, benefits, airport, public, wifi, qoe
     Rohde & Schwarz Cybersecurity
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
     MalwareBytes EMEA
By: Entrust Datacard     Published Date: Jul 23, 2019
Advanced key and certificate management enables the use of digital credentials even in the most demanding of security environments. Such solutions enable users, regardless of whether they are internal or external to their network, to benefit from both basic and enhanced capabilities in a consistent and secure manner. This document was created to assist organizations in the selection of the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed. This is not intended to be an exhaustive list. It is meant as a starting place to assist you in your review process. Introduction
Tags : 
     Entrust Datacard
By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security
     ForeScout
By: Riverbed     Published Date: Jul 17, 2013
As a network manager, application manager or security manager, you need systems in place that can collect data across your WAN, continuously analyze the data to discover problems, and allow you to troubleshoot issues as soon as they occur. A packet capture and analysis solution is an essential part of your toolset, since it provides the most granular level of information and can help troubleshoot the toughest problems. Riverbed Cascade has fundamentally changed the economics of network performance management. Learn more..
Tags : network, troubleshooting, wan, network manager, network performance management
     Riverbed
By: Avaya     Published Date: Jan 20, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
     Avaya
By: Avaya     Published Date: Jan 23, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
     Avaya
By: Avaya     Published Date: Jan 28, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
     Avaya
By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     CA Technologies
By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
     Tenable
By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
     Limelight
By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
     Limelight
By: Red Hat     Published Date: Feb 25, 2019
Red Hat is a trusted partner to enterprise customers; cloud, software, and hardware suppliers; and the global open source community. A Red Hat® Enterprise Linux® subscription provides customers with direct access to innovation and advocacy—within the open source community and within a certified and trusted network of partners. Red Hat Enterprise Linux provides you with an innovative platform that serves as the foundation for your business. It is hardened, certified, and supported by the Red Hat Product Security team, support teams, and certified engineers. Red Hat supports your timelines and advocates for your requirements so you can focus on the work of your business rather than being your own operating system vendor. We use our leadership in the open source community to do the work that brings you the best of open source. Get direct access to: Technology-driven solutions Emerging technology Experience and support Continuous security Timeline support Download the whitepaper to lea
Tags : 
     Red Hat
By: Juniper Networks     Published Date: Oct 19, 2015
In today’s rapidly evolving world, the modern enterprise has the benefit of many technologies that were unheard of just 10 years ago – the cloud, for instance. However, with every new technology – cloud included – there are new security challenges. With huge numbers of users, devices and data deployed to take advantage of the latest technologies, the enterprise is becoming increasingly vulnerable to data loss, malicious attacks and network instability.
Tags : juniper, security, network, enterprise, cloud, device
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
New Juniper Networks-sponsored research, by the RAND Corporation, “The Defender’s Dilemma: Charting a Course Toward Cybersecurity,” introduces a first-of-its-kind heuristic model that helps companies map the economic drivers and challenges of defense.
Tags : juniper, rand, cybercrime, cybersecurity, threat, malware, security
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
Datacenters are the factories of the Internet age, just like warehouses, assembly lines, and machine shops were for the industrial age. Over the course of the past several years, riding the wave of modernization, datacenters have become the heart and soul of the financial industry, which each year invests over $480 billion in datacenter infrastructure of hardware, software, networks, and security and services.
Tags : juniper, datacenter, threat, ciso, enterprise, data, customer
     Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics