threats

Results 1276 - 1300 of 1338Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, networking
    
McAfee
Published By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : 
upgrade, principled technologies, mobility, windows 10
    
Dell
Published By: Tyco Integrated Security     Published Date: May 05, 2015
Now is the time to craft a smart strategy you and your company can rely on. Download this white paper to find out how to assess vulnerabilities across the global supply chain so you can guard against major threats and ensure product integrity.
Tags : 
    
Tyco Integrated Security
Published By: Tyco Integrated Security     Published Date: May 05, 2015
Download this white paper to discover why many pharmaceutical companies are turning to proactive strategies to assess and respond to threats.
Tags : 
global supply chain, medication, security threats, product tampering, security goals, security, data management
    
Tyco Integrated Security
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, security
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and prevent data exfiltration.
Tags : 
data exfiltration, data loss prevention, dlp, data management
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
data loss prevention, dlp, office 365, security, it management, knowledge management
    
Intel Security
Published By: Great Bay Software     Published Date: Jan 04, 2018
IoT device capabilities are constantly evolving and enterprise adoption is increasing at a rapid pace. As adoption grows, these connected devices provide additional entry points for external threats, thus broadening the organizations' attack surface. The enterprise must now look for solutions to address an increasingly complex problem: how to detect, monitor and control unmanaged devices that are connecting to the network and may lack consistent security protocols, putting critical business data at risk.
Tags : 
iot, iot security, iot endpoint security
    
Great Bay Software
Published By: IBM     Published Date: Jul 31, 2015
Against today's threats.
Tags : 
    
IBM
Published By: Intralinks     Published Date: Nov 23, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015
Tags : 
intralinks, security, data, threat, business technology
    
Intralinks
Published By: VMware AirWatch     Published Date: May 19, 2016
The economy isn’t standing still. For your business to succeed, your employees shouldn’t either. That’s why companies of all types are moving to empower their mobile workforce and engage with customers in innovative ways. To realize their potential, enterprises need to find ways to make a mobile workforce as productive when they’re away from the office and on their mobile devices as they are in the office. This means mobility systems must give users a seamless experience across the ever-expanding types of mobile devices employees use, for easy access to business-critical applications. At the same time, it must deliver a secure workspace that complies with security regulations, protects devices, plus guards business and customer data, from expanding security threats.
Tags : 
innovation, best practices, mobile device, security, mobile workforce
    
VMware AirWatch
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data, security, business technology
    
ArborNetworks
Published By: IBM     Published Date: Jan 07, 2016
This paper outlines the challenge of insider threats - who they are, the damage and financial loss they can cause, and what organizations can do to protect themselves.
Tags : 
ibm, security, threat, insider threat
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This white paper discusses why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, credentials, threat, data, analysis, security
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, overview, threats, security, enterprise applications, business technology
    
IBM
Published By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : 
black duck, science logic, open source, visibility, secutiry, software, security, enterprise applications, business technology
    
Black Duck Software
Published By: Flexera     Published Date: May 29, 2019
"Cloud spend (IaaS, PaaS and SaaS) is growing 7 times faster than IT spend, and the pressure to innovate has never been greater. Today’s IT departments have to both sustain existing operations and compete through innovation—but managing the IT tangle can starve investment in your future. How do you manage today’s Cloud First movement with one eye on the future? “Cloud First: threat or an opportunity?”—an exclusive webinar from Flexera VP Presales Cynthia Tackett—will discuss what a Cloud First strategy really means for the future of ITAM and how we must adapt to future-proof our careers in the ITAM profession. You’ll learn about cloud trends, challenges and threats to your career, opportunities and your career path into the cloud, and how to future-proof your career. Register today! "
Tags : 
    
Flexera
Published By: Flexera     Published Date: May 29, 2019
"Cloud spend (IaaS, PaaS and SaaS) is growing 7 times faster than IT spend, and the pressure to innovate has never been greater. Today’s IT departments have to both sustain existing operations and compete through innovation—but managing the IT tangle can starve investment in your future. How do you manage today’s Cloud First movement with one eye on the future? “Cloud First: threat or an opportunity?”—an exclusive webinar from Flexera VP Presales Cynthia Tackett—will discuss what a Cloud First strategy really means for the future of ITAM and how we must adapt to future-proof our careers in the ITAM profession. You’ll learn about cloud trends, challenges and threats to your career, opportunities and your career path into the cloud, and how to future-proof your career. Register today! "
Tags : 
    
Flexera
Published By: Lenovo and Intel     Published Date: Oct 17, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat
    
Lenovo and Intel
Published By: Lenovo and Intel     Published Date: Oct 17, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo and Intel
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 13, 2018
The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is because security services and the vital tools they encompass can be empowered through the adoption of a carrier cloud model. This, in turn, better positions CSPs to meet the demands of their customers, including those in the small to medium-size business (SMB) market segment. The timing of this migration is optimal, since many SMBs now recognize the threats they face and realize that given their limited IT budgets and lack of security expertise, CSPs are well positioned to protect them from cyberattacks. While the opportunity for CSPs is significant, many are hesitant to make a move in this area because they want to ensure they can address SMBs’ needs and maintain control of the service in a car
Tags : 
    
Akamai Technologies
Published By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management
    
IBM
Start   Previous    40 41 42 43 44 45 46 47 48 49 50 51 52 53 54    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee