RSS feed Get our RSS feed

News by Topic

security center

Results 176 - 200 of 228Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 06, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : ibm, cloud, analytics, mobile, social, security, infrastructure, data center
     IBM
By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : networks, ibm, redefining networks, cloud, analytics, mobile, social, security
     IBM
By: IBM     Published Date: Oct 13, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : ibm, soc optimization, it threat, soc, security operations center, security vulnerabilities, gartner, security
     IBM
By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : ibm, network, cloud, analytics, mobile, social, big data, it security
     IBM
By: Arbor Networks     Published Date: Sep 29, 2012
Botnets and DDoS attacks are perceived as being malevolent and unstoppable. Fortunately there are companies like Arbor Networks, who are dedicated to analyzing and stopping botnets and DDoS attacks on a global basis.
Tags : ddos attacks, distribution denial of service, botnet, network infrastructure, database security, data center, security threats
     Arbor Networks
By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
     IBM
By: Cisco     Published Date: Nov 17, 2014
Traditional static approaches can’t provide the security you need. They often miss the insight and automation necessary to fully protect your infrastructure.
Tags : sourcefire, firesight, management center, context aware, adaptive security, monitoring, automation, critical security
     Cisco
By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : endpoint proliferation, ids, ips, externalization, cisco, security
     Cisco
By: F5     Published Date: Jan 31, 2013
Organizations are increasingly adopting a hybrid cloud computing strategy to realize the benefits without compromising on security and control. Learn of the 3 categories of solutions focused on integrating data centers with cloud.
Tags : cloud, integration, bridges, brokers, gateways, hybrid cloud, cloud security, security
     F5
By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : security, data center, performance, virtualization, application, internet, functionality
     Cisco
By: Internap     Published Date: Mar 30, 2015
How do you determine the right colocation provider for your business? Colocation can offer many cost-efficient benefits, including scalability, improved business continuity, security and compliance.
Tags : business continuity, security, scalability, data center, connectivity
     Internap
By: Cisco     Published Date: Aug 24, 2015
Download this infographic to learn how data center security challenges are more than a technology issue - they're a human problem.
Tags : data center security, human error, security controls, data center segmentation, data security solution, security
     Cisco
By: Lenovo     Published Date: Aug 31, 2018
? Security threats are growing at an astronomical pace–theft, hacking, malware, ransomware... and the list goes on. That's why Lenovo integrates security at every level including built-in hardware, advanced software, a secure supply-chain, complete component validation and integrated services. In addition to Lenovo's own security features built into each device, Windows 10 Pro delivers comprehensive, built-in and ongoing security protections you can trust – including Windows Hello, Windows Defender Antivirus, firewall, and more. Read more in this comprehensive product guide, from personal device to data center, we'll show you how we're hard at work securing your devices from the threats.
Tags : 
     Lenovo
By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
     VMware
By: Juniper Networks     Published Date: Feb 18, 2015
Learn all about the new dynamically intelligent solutions that are taking security to the next level in this expert Webinar.
Tags : cloud, cybercrime, security intelligence, security, security tool, data center
     Juniper Networks
By: Logicalis     Published Date: Mar 27, 2014
Learn the top trends and concerns for choosing the right service desk provider.
Tags : logicallis, iaas, security, compliance, cloud, cloud security alliance board, data center, customer experience
     Logicalis
By: Cisco     Published Date: Aug 18, 2014
IT can be one of the biggest concerns for businesses today. Security, compliance, enablement, cost control and scalability must all be considered. Additionally, with insurgent trends such as mobility changing the face of business, choosing a partner who is able to consultatively deliver multiple services and solutions is increasingly important. We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Fill in your details to the right to download your free white paper and learn how we have become the key supplier of converged technology and services in this space.
Tags : ucs, scope, cisco, security, compliance, servers, data, innovative
     Cisco
By: Staminus Communications     Published Date: May 06, 2014
In this installment of a series of white papers about the true cost of DDoS attacks, StamSOC (Staminus Security Operation Center) will discuss the history of the attacks, the wide reaching impacts, and the true costs associated with DDoS attacks.
Tags : staminus communications, staminus, ddos, ddos attacks, hosting security, security
     Staminus Communications
By: AlienVault     Published Date: Jul 16, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : alienvault, alienvault usm, security operations center, smb, javvad malik, the 451 group, siem, security-savvy smb
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable "AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of 451 Research, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : security, operations, affordability, av labs, open threat, exchange, analyst, report
     AlienVault
By: AlienVault     Published Date: Aug 13, 2015
Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Tags : alienvault, security, soc, hacking, threat detection
     AlienVault
By: VMware     Published Date: Feb 24, 2017
Cloud datacenter security is becoming imperative in the new age of malware attacks. To stay competitive and secure, organizations are turning to smart networking in an effort to close the datacenter security gap. The combination of VMware NSX, AirWatch Tunnel and Horizon View helps close this gap and simplifies security management for IT professionals. With the upcoming prevalence of authentication and identity management in an organization’s infrastructure, the need to delegate and define network access continues to highlight the important role of hybrid cloud security that addresses all end-user devices.
Tags : 
     VMware
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Read this paper to learn how NetScaler is meeting modern demands for more robust datacenter security.
Tags : citrix, netscaler, security, data center, cloud
     Citrix Systems, Inc.
By: GeoTrust     Published Date: Oct 06, 2014
"The business and security benefits of GeoTrust Enterprise Security Center IT departments face a range of issues—some obvious, some more subtle—when dealing with SSL certificates. These issues can have serious business and security consequences. GeoTrust Enterprise Security Center was designed with customer input to address these problems."
Tags : security center, it departments, ssl certificates, security consequences, customer input, manage
     GeoTrust
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics