system

Results 176 - 200 of 6293Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: Alacritech     Published Date: Aug 21, 2009
Today's systems and servers need an efficient way to move the ever-increasing amounts of data over networks. Many companies have introduced solutions such as TCP/IP Offload Engines (TOE) Network Interface Cards (TNICs), Network Interface Cards (NICs), and iSCSI Host Bus Adapters (HBAs) to solve efficiency and throughout challenges. However, the functionality of these solutions is quite varied, and in some cases, rapidly becoming obsolete.
Tags : 
data transfer, tcp/ip, tnic, nic, hba, iscsi, alacritech, networking
    
Alacritech
Published By: Alacritech     Published Date: Aug 21, 2009
Customers are increasingly constrained by large transfers of data backup, long backup times to storage devices, and less efficient use of server resources as a result. System and database availability is heavily impacted during backup periods, and with the rapid growth of storage and the need to archive customer data, IT managers are actively seeking solutions for their backup problems.
Tags : 
data backup, backup and recovery, storage, database availability, backup, recovery, servers, backup server, backup servers, data transfer, alacritech
    
Alacritech
Published By: Alacritech     Published Date: Aug 21, 2009
As IT costs grow, budgets shrink, and demand soars, there is an immediate need to extend and/or consolidate existing server assets. Many IT departments are currently faced with reduced capital budgets as well as decreased staffing levels for NAS Systems.
Tags : 
configuration, windows, change management, it spending, alacritech
    
Alacritech
Published By: Aladdin     Published Date: Aug 21, 2009
The Spyware Neutralizer is a clientless add-on tool for the eSafe content security solution from Aladdin Knowledge Systems. Client-side software installation and without the need to implement, manage, or update any client-side software or agents.
Tags : 
phishing, security management, anti spyware, malware, security software, network management, remote access, remote network management, aladdin
    
Aladdin
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Everyone expects wireless mobility that provides a high quality experience – but delivering that from arrival to departure in your transportation system is highly complex. Customers want the mobile services that make their life easier such as personalized promotions and navigation guides. Operators want to be able to handle more people, making the customer journey as secure and comfortable as possible, while reducing cost and risk. And all of this depends on the network.
Tags : 
wayfinding, retail promotion, customer identification, analytics, data, automation, business streams
    
Alcatel Lucent Enterprise
Published By: Alcatel-Lucent     Published Date: Sep 29, 2015
Read more to learn about the essential role of network functions virtualization in cable service migration.
Tags : 
network functions virtualization, nfv, broadband, broadband infrastructure, cable industry, mso, multi system operators
    
Alcatel-Lucent
Published By: Alcatel-Lucent     Published Date: Sep 29, 2015
Read more to learn about the essential role of network functions virtualization in cable service migration.
Tags : 
network functions virtualization, nfv, broadband, broadband infrastructure, cable industry, mso, multi system operators
    
Alcatel-Lucent
Published By: Alcatel-Lucent     Published Date: Oct 22, 2015
A business rationale paper for multiple system operators (MSOs)
Tags : 
alcatel lucent, vrgw, broadband, broadband access network, service delivery, service delivery architecture, residential gateway
    
Alcatel-Lucent
Published By: ALE     Published Date: Dec 05, 2018
A highly resilient data and communications network that supports easy accessibility and cost efficiency is a requirement for hospitals and medical facilities that seek to leverage technology to digitally transform their processes. Alcatel-Lucent Enterprise (ALE) provides a broad range of robust and secure networking, infrastructure and communication products and services to connect patients, caregivers, staff and the entire healthcare ecosystem. ALE specialized data and communications networks for healthcare providers optimize the care pathway through improved communications and more efficient processes to provide more timely, safe and effective care. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: ALE     Published Date: Dec 05, 2018
A hospital’s network is the foundation for the critical applications that run on it, where most of those applications are related to the hospitals core businesses. The return on the investments made in EMR (electronic medical records), PACS (picture archiving and communication system), clinical imaging systems and workstations on wheels, can only be truly realized if those assets are always available to the people in need in a reliable, secure and highly optimized way, at a fixed location, or while mobile. Find out how to simplify network management and enhance application and service visibility with Smart Analytics and PALM by downloading this whitepaper today.
Tags : 
    
ALE
Published By: ALE     Published Date: Jan 10, 2019
Departments of roads and highways around the world have begun to implement technology solutions to improve the safety of their highways, lessen congestion and manage traffic more efficiently. Intelligent Transport Systems (ITS), as these systems are known, require reliable, secure and scalable networks to link cameras, sensors, signage, signaling and vehicles to remote data centers and operation centers. These networks will be deployed in harsh environments and will pose their own unique challenges to operate, maintain and manage. In this application note, we will present the unique requirements of ITS networks and discuss how AlcatelLucent Enterprise products and technologies not only meet today’s ITS requirements, but are designed to grow and scale to meet tomorrow’s as well.
Tags : 
    
ALE
Published By: ALE     Published Date: Jan 10, 2019
The purpose of this design guide is to present the requirements and considerations relevant to the transportation vertical along with design options, best practices and configuration guidelines. While this design guide is focused on Shortest Path Bridging (SPB-M) based networks, it also addresses data networking solutions applicable for this transportation vertical. Although several modes of transport exist, this document focuses on rail (metro, heavy, light) and road transport. More specifically, this document focuses on the fixed network infrastructure underpinning the multiple systems that enable the safe and reliable operation of rail and intelligent transport systems. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: Alert Logic     Published Date: May 23, 2019
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: AlienVault     Published Date: Oct 21, 2014
Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.
Tags : 
alienvault, sql injection, web security, cyber attacks, siem solutions, xss, cross site scripting attacks, siem, threat protection
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall, anti-virus, network intrusion detection, vulnerability management
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee