RSS feed Get our RSS feed

News by Topic

security center

Results 126 - 150 of 228Sort Results By: Published Date | Title | Company Name
By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : cloud, security, guide, privacy, architectures, organizations, compliance, protection
     McAfee EMEA
By: McAfee EMEA     Published Date: Nov 15, 2017
The transition to the SDCC gives IT managers and security professionals the opportunity to build in a security architecture that is designed from the ground up to meet the needs of the cloud era. With the right architectural model, security can be much simpler to deploy, provision, manage, and scale. Organizations can save money, enhance protection, and leverage the agility of private and hybrid cloud infrastructures. IT teams can expand their visibility from the data center into the cloud, uncovering threats wherever they appear and coordinating an appropriate and comprehensive response.
Tags : software, data center, security, managers, professionals, organizations, money
     McAfee EMEA
By: McAfee EMEA     Published Date: Nov 15, 2017
The top concern of all of respondents with moving to IaaS is having consistent security controls that provide integrated security with central management across all cloud (private and public) and traditional data center infrastructure. The top concern of all of respondents with moving to IaaS is having consistent security controls that provide integrated security with central management across all cloud (private and public) and traditional data center infrastructure.
Tags : cloud, usage, data, infrastructure, private, public, security, integration
     McAfee EMEA
By: McAfee EMEA     Published Date: Nov 15, 2017
Time has become a critical capability in being able to extract the business value enterprises want from their data and computing infrastructure, as well as to protect the business value that has already been created. In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing an advantage of time can help defenders to reduce their risk, in the fundamental categories of data protection, threat detection and incident response, data center / cloud security, and endpoint security.
Tags : cyber, security, defenders, business value, infrastructure, data, business, protection
     McAfee EMEA
By: EMC Corporation     Published Date: Mar 20, 2014
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : emc, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
     EMC Corporation
By: Shavlik Technologies     Published Date: Dec 15, 2010
Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.
Tags : shavlik, endpoint management, security strategy, it operation, threats, sensitive data, data center, hacker
     Shavlik Technologies
By: CDW Vmware     Published Date: Aug 02, 2012
As Tarkett Inc. continued to enjoy years of growth they realized their data center was in dire need of an update. It was strewn across eight locations with aging equipment and limited backup power. Tarkett turned to CDW to update and optimize their data center without affecting day-to-day business.
Tags : tarkett, case, study, optimizing, data, center, growth, backup
     CDW Vmware
By: IBM     Published Date: Apr 22, 2008
This InformationWeek article delves into the details of some of today’s most innovative data centers. You’ll read about data centers that cool with winter air, run on solar power, provision services without human involvement, and are virtually impenetrable. Any one of the tips – and there are dozens – could be a major breakthrough for your company.
Tags : green, environmental, energy, energy efficient, security, data center, datacenter, best practices
     IBM
By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : remote, remote access, remote network, network management, network security, data center, datacenter, data center management
     Axeda Corporation
By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center
     Tripwire, Inc
By: Intel     Published Date: Aug 10, 2012
Watch this McAfee ePO Deep Command* animation to see security management beyond the operating system, Intel® AMT to optimize security and reduce costs.
Tags : enterprise security, it management, it managers, mcafee, data center, data management, animation, security
     Intel
By: CDW     Published Date: Dec 23, 2014
Learn the hidden costs of retaining aging IT infrastructure and see how you can solve your server issues to lower costs and increase ROI.
Tags : cdw, data, windows, server, infrastructure, technology, operations, compatibility
     CDW
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : cloud security, virtualization security, virtualization, data center, security
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands— while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.
Tags : security, virtualization, cloud computing, trend micro
     CDW-Trend Micro
By: Evident.io     Published Date: Nov 19, 2015
Evident.io has a significant head start in this nascent corner of the cloud security space. Besides addressing a critical portion of the cloud's attack surface that isn't well covered by other vendors yet, Evident.io has built a platform that transcends the niche it currently addresses. The API/SDK consumption capabilities, data analytic and user workflow portions of the company's Evident Security Platform are valuable assets that it can leverage to grow into other areas in the future.
Tags : evident, cloud security, security platforms, datacenter, firewalls, public cloud, api consumption, security
     Evident.io
By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : security, best practices, web services, amazon, workload, aws, data centers, enterprise
     Evident.io
By: LogRhythm     Published Date: Apr 04, 2017
In this webcast, Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today’s Security Operations Center (SOC). The duo also touch on the essential tools needed to make your SOC effective.
Tags : 
     LogRhythm
By: LogRhythm     Published Date: Apr 04, 2017
The LogRhythm Labs™ Team (Labs Team) designed this report to provide actionable intelligence regarding threat actors and the tools, techniques, and procedures (TTPs) they use. Using this information, security operations center (SOC) analysts can better detect and respond to this specific threat.
Tags : 
     LogRhythm
By: LogRhythm     Published Date: Feb 22, 2018
Some organizations have formal security operations centers (SOCs). Formal 24x7 SOCs are tightly secured areas where teams of dedicated analysts carefully monitor for threats around the clock, every day of the year. The analysts are checking their organization’s enterprise security controls to identify possible signs of intrusion and compromise that may require a response by the organization’s incident responders.
Tags : 
     LogRhythm
By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analyst’s findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: • How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster • How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
     CrowdStrike
By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : cloud security, cloud data center, sans survey
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise for enterprise IT. Within the SDDC, the benefits of server virtualization are extended to storage and networking, so the entire infrastructure can be abstracted and centrally managed under a unified platform. IT teams are able to leverage unprecedented levels of virtualization, orchestration, and automation to achieve the services-based delivery model that enables true digital transformation.
Tags : data center, networking
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The relentless march of end user organizations toward cloud services continued during the past 12 months, according to a new SANS survey, despite long-standing fears about information security, the lack of visibility into cloud provider security controls and the shortcomings of controls available to those who utilize cloud services. One big difference since the 2015 SANS cloud security survey:1 Information security professionals appear to have accepted that the cloud is here to stay and are, sometimes unenthusiastically, doing what they can to make the frontier secure.
Tags : cloud security, cloud data center, sans survey
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise forenterprise IT. Within the SDDC, the benefits of server virtualization areextended to storage and networking, so the entire infrastructure can beabstracted and centrally managed under a unified platform. IT teams areable to leverage unprecedented levels of virtualization, orchestration, andautomation to achieve the services-based delivery model that enables truedigital transformation.
Tags : data center, networking
     McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics