RSS feed Get our RSS feed

News by Topic

security as service

Results 226 - 250 of 297Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Aug 30, 2019
Attacks on financial services institutions are growing in both quantity and sophistication. Our new State of the Internet/Security report studies criminal behavior across this advanced and expansive financial services attack economy: from a popular authentication mechanism for staging credential stuffing attacks to the use of stolen identities to cash out ill-gotten gains. The report identifies leading DDoS and application-layer attack vectors, lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets. Attacks that prove successful in financial services often move on to other industries. Download the report, and see what petabytes of data tell us.
Tags : 
     Akamai Technologies
By: Cisco EMEA     Published Date: Mar 05, 2018
The Cisco® Incident Response team is led by elite security specialists who can uncover the source of threats by analyzing and synthesizing intelligence from multiple sources. These sought-after specialists consistently deliver resolution in a shorter timeframe, returning businesses like yours to normal. Fast. To find out more about Cisco Incident Response Services download this whitepaper today.
Tags : security, research, analyze, investments, cisco
     Cisco EMEA
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
     Centrify Corporation
By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. To find out more on how Cisco can help with these challenges download this white paper today.
Tags : 
     Cisco Umbrella EMEA
By: Oracle     Published Date: Jul 05, 2017
Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Best-of-breed managed DNS service providers have the global DNS infrastructure and deep DNS network operations expertise to ensure your success. Adding a secondary DNS service can help you deliver consistent, high-quality user experiences across the world and mitigate outage risk. To learn more read our white paper: High Availability DNS Reduces Downtime Risk and Improves End-User Experience
Tags : dns, service, serve traffic, corporate firewall, service features, api daemon
     Oracle
By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: • How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure • The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations • The best use cases for implementing a supplemental or secondary DNS service Learn more! "
Tags : 
     Oracle + Dyn
By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations The best use cases for implementing a supplemental or secondary DNS service
Tags : 
     Oracle + Dyn
By: Zingbox     Published Date: Nov 08, 2017
The Internet of Things (IoT) is a rapidly expanding part of the global information economy, yet security exploits show that more attention needs to be paid to making the IoT safe. Companies deploying IoT infrastructure, whether for their own use or to provide IoT services, as well as the manufacturers of IoT devices, should look to build in security from day one. This report describes the challenges inherent in securing the IoT. And explains how IoT security differs from conventional IT security.
Tags : 
     Zingbox
By: Mimecast     Published Date: Aug 22, 2017
An Email Security Risk Assessment conducted this year by Mimecast re-examined more than 40 million emails that had been OK’d by various security solutions, including Office 365. Of those, more than 19,000 were found to be “dangerous file types,” infected with malicious malware attachments or cleverly disguised impersonation attacks. This expert white paper explores how you can close Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Tags : office 365, email security, risk assessment, security services, malware, security solutions
     Mimecast
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
     CloudHealth by VMware
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
     F5 Networks Singapore Pte Ltd
By: SilverSky     Published Date: May 09, 2014
This paper provides an overview of the benefits of outsourced security solutions such as managed security services. The managed security services option saves money, improves the network security posture, and maximizes the efficiency of existing corporate resources.
Tags : silversky, business value, security services, the cloud, security conundrum, decrease threats, service providers, managed solutions
     SilverSky
By: Amazon Web Services     Published Date: Nov 28, 2017
You keep close control of the security you need to manage. You can stop being concerned about the security of the foundational services your IT infrastructure is built on. You get the benefits of a robust cloud infrastructure with a reliably secure service that’s scalable, responsive, and efficient. More control, more compliance, less time, less effort.
Tags : security, cost, compliance, disruption, mitigation, management, maintenance
     Amazon Web Services
By: IBM     Published Date: Sep 30, 2016
Address budget shortages and skills gaps with cloud-based Security Intelligence & Analytics. Use a Software-as-a-Service solution to replace aging security technologies and deploy a market leading solution in only weeks. Read how you can focus on monitoring the environment rather than updating software, and replace up-front capital costs with a monthly operational fee.
Tags : security
     IBM
By: EMC Corporation     Published Date: May 27, 2014
RSA White Paper: As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key. This white paper discusses how organizations can assess and improve their incident response maturity. It also introduces RSA products and services, including RSA Security Analytics, that can help accelerate the maturity journey.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
     EMC Corporation
By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
     Druva
By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
     ProofSpace
By: Intel     Published Date: Aug 26, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
     Intel
By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
     Intel
By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
     Intel
By: Norse     Published Date: Mar 10, 2014
Learn how to properly select the right real-time security options for your organization and see how the right actionable security intelligence will allow for safer and more secure data and security operations.
Tags : norse, esg, security intelligence, commercial threat intelligence, security data, open source security intelligence, product based security intelligence, real-time security
     Norse
By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, we’ve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organization’s incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : mimecast, email. esra, email security, cloud security
     Mimecast
By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
     Fortinet EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics