security protection

Results 251 - 275 of 806Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 11, 2017
Download this white paper to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats. - Why security infrastructure protection alone is not enough to thwart cyber criminals, and how you can fortify your existing security strategy. - How the use of both machine led analytics with human led analysis can help you mitigate threats.
Tags : 
ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: May 09, 2017
This eBook takes you on a journey to outthink content chaos and discover how your industry can gain real value from your business content. Read how industry leaders are reflecting on the important challenges they face, and how they are finding innovative ways to collaborate and extract value from all forms of content to outpace those obstacles. Learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it, improving business performance and ROI.
Tags : 
enterprise management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 09, 2017
Increasing shareholder value is a top priority for all businesses. However, financial results don't improve by themselves. Companies must first delight their most important stakeholder: customers. This document outlines how Best-in-Class firms use efficient content processes to achieve higher levels of customer centricity.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
IBM
Published By: IBM     Published Date: May 22, 2017
Financial institutions should consider rapidly transforming business models in ways that are cognitive and digital. These transformations should include: Developing alternative revenue sources and streamlining costs.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
IBM
Published By: CrowdStrike     Published Date: Aug 01, 2017
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider,to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.Before initiating a change from your current AV solution read this guide to learn:?How to plan an AV replacement project and the critical elements to consider ?How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions?What prevalent technologies are available and what are the pros and cons of each??How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results?Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
    
CrowdStrike
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This paper discusses the need for and details of a Zero Trust approach to network security. It also itemizes the essential criteria and capabilities required of a Zero Trust solution, explains how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust design.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, it management
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
The Modern Malware Review presents an analysis of 3 months of malware data derived from more than 1,000 live customer networks using WildFire™ (Palo Alto Networks™ feature for detecting and blocking new and unknown malware). The review focuses on malware samples that were initially undetected by industry-leading antivirus products.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, it management
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, it management
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, firewall, it management
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, firewall, it management
    
Palo Alto Networks
Published By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : 
botnet, bot, messagelabs, email security, malware, virus, security
    
MessageLabs
Published By: NetIQ     Published Date: Nov 01, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security, business technology
    
NetIQ
Published By: ESET     Published Date: Sep 07, 2011
Selecting an antivirus for your small or medium business that won't slow you down.
Tags : 
eset, antivirus, security, smb, protection, cybercrime, precautions, safety
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
Learn valuable tips and techniques to fully protect your smartphone against security threats.
Tags : 
eset, gemini trojan, android phone, apps, security, threats, smartphone, applications, information protection
    
ESET
Published By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : 
eset, security solutions for business, malware, antivirus, protection, cybercrime
    
ESET
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. This guide will help you understand the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, identity theft, security, technology, it protection, identify protection, authentication, fraud
    
LifeLock
Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Splunk     Published Date: Sep 17, 2012
Read this white paper to understand the evolving security landscape and how advanced persistent threats and sophisticated malware have fundamentally changed the way security teams must think about threats and the tools used for detective controls.
Tags : 
security threats, it security infrastructure, data protection, data loss prevention, data management, security intelligence, security, business technology
    
Splunk
Published By: WatchGuard     Published Date: Oct 16, 2012
Network security may be old-school, but it is not passé; the right perimeter protection means more threats stay outside & more data stays inside. Learn more about capabilities that are available in a modern network perimeter UTM solution.
Tags : 
utm, watchguard, unified threat management, market research, report, security, infrastructure, data management, business technology
    
WatchGuard
Published By: Symantec     Published Date: Oct 25, 2012
PassMark Software conducted objective performance testing on five publicly available Enterprise Endpoint Protection products. This report presents our results from these performance tests.
Tags : 
endpoint security, endpoint protection products, symantec, technology security, data security, security, business technology
    
Symantec
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee