RSS feed Get our RSS feed

News by Topic

cloud era

Results 876 - 900 of 1471Sort Results By: Published Date | Title | Company Name
By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
     MalwareBytes EMEA
By: McAfee     Published Date: Feb 06, 2013
By building in comprehensive security measures at the design and architectural phase of data center build-outs, organizations can optimize business-critical service availability and minimize potential downtime.
Tags : data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center
     McAfee
By: McAfee     Published Date: Feb 06, 2013
The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively, and require a new generation of flexible security architectures.
Tags : 
     McAfee
By: McAfee     Published Date: Feb 06, 2013
High performance for modern data center network fabrics, scalable deployment, and integrated inspection for physical and virtual environments. Next generation network security for your next generation data center.
Tags : data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center
     McAfee
By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : cloud security, cloud, private cloud, security technology
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, itdiscusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : cloud security, cloud, private cloud, security technology
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : cloud security, cloud, private cloud, security technology
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers and  enterprises
Tags : virtualization, public cloud, infrastructure as a service, iaas, cloud security, devops, devsecops 
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility
     McAfee
By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: McAfee     Published Date: Apr 04, 2017
Engaging a cloud service provider (CSP) for Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) or Software-as-a-Service (SaaS) is now common practice for enterprise IT. It is essential to make the right choice of providers and services, particularly as it relates to security practices, data privacy, and operational capabilities. Be sure to put potential Cloud Service Provider (CSP) partners under the microscope by asking them the right questions about how they will secure your most essential information.
Tags : saas, iaas, cloud service provider, cloud
     McAfee
By: McAfee EMEA     Published Date: Nov 15, 2017
To ensure fast, efficient, and comprehensive remediation of breaches, IT security decision makers have acknowledged the need to reduce the complexity of their endpoint security environments. Today’s enterprises value integrated endpoint security solutions that can effectively handle the whole process of endpoint security, including attack prevention, detection, and remediation. Single-vendor suite solutions and cloud technologies are on the rise due to their perceived benefits, including simplicity, lower costs, and better integrated coverage across platforms.
Tags : endpoint, efficiency, security, prevention, technology, decision makers
     McAfee EMEA
By: McAfee EMEA     Published Date: Nov 15, 2017
The transition to the SDCC gives IT managers and security professionals the opportunity to build in a security architecture that is designed from the ground up to meet the needs of the cloud era. With the right architectural model, security can be much simpler to deploy, provision, manage, and scale. Organizations can save money, enhance protection, and leverage the agility of private and hybrid cloud infrastructures. IT teams can expand their visibility from the data center into the cloud, uncovering threats wherever they appear and coordinating an appropriate and comprehensive response.
Tags : software, data center, security, managers, professionals, organizations, money
     McAfee EMEA
By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : cloud, optimization, speed, efficiency, costs, applications, data, services
     McAfee EMEA
By: McAfee EMEA     Published Date: Mar 14, 2018
Die Nutzung von Cloud Computing-Services nimmt weiterhin stark zu, da Unternehmen ihre Geschäftsanwendungen und Daten zu Cloud-basierten Software-, Plattformund Infrastrukturdiensten migrieren. Gartner geht davon aus, dass die Ausgaben für öffentliche Cloud-Dienste im Jahr 2017 um 18 % steigen und bis 2020 mehr als 50 % der IT-Ausgaben in Zusammenhang mit der Cloud-Implementierung stehen werden. Deloitte Global sagt voraus, dass bis Ende des Jahres 2022 mehr als die Hälfte aller IT-Ausgaben auf IT-as-a-Service-Anbieter entfallen werden. Bei der Frage nach den größten Herausforderungen bei der Cloud-Absicherung nannten in der 2016er Ausgabe dieser Umfrage 56 % der befragten Sicherheitsexperten den unzureichenden Zugriff auf die erforderlichen Daten für die Reaktion auf Zwischenfälle sowie für forensische Analysen. 62 % gaben an, dass sie über nicht autorisierte Zugriffe von Außenstehenden besorgt sind, und 59 % machten sich Sorgen über andere Cloud-Mandanten. Von den 10 %, die eine Ko
Tags : 
     McAfee EMEA
By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : technology, best practices, data, enterprise
     Microsoft
By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
     Microsoft
By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : technology, best practices, data, enterprise, business analytics, business intelligence, business management
     Microsoft
By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
     Microsoft
By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
     Microsoft
By: Microsoft     Published Date: Jul 20, 2018
Cloud computing has ushered in a golden era for software companies. The cloud’s low barrier to entry allows creativity to flourish, especially for software developers who are creating applications directly on cloud-based infrastructure. Cloud-based infrastructure enables developers to do what they love: solve business problems and bring innovative new ideas to life, using their choice of tools. In a Software as a Service (SaaS) model, applications can easily be deployed to a cloud service, and delivered to clients who appreciate the ease of access and low cost. The cloud model relieves the developer and the enterprise IT professional from the burden of managing or maintaining capital-intense infrastructure. But the cloud’s low barrier to entry also allows competing software providers to enter the market every day, from every sector. Independent software vendors, or ISVs, are pressured by increased competition to deliver their applications faster, with greater functionality and ease of
Tags : 
     Microsoft
Start   Previous    29 30 31 32 33 34 35 36 37 38 39 40 41 42 43    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics