defending

Results 51 - 65 of 65Sort Results By: Published Date | Title | Company Name

Defense Throughout the Vulnerability Life Cycle

Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, vulnerability life cycle, security
    
Alert Logic and Sungard Availability Services

Cybersecurity Buyer's Guide

Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
    
Palo Alto Networks

Six Essential Elements of Web Application Security

Published By: Qualys     Published Date: Aug 08, 2014
An Introduction to Defending Your Business Against Today’s Most Common Cyber Attacks
Tags : 
cyber attacks, defense, web application, business data, application security, anti spyware, anti virus, internet security
    
Qualys

Understanding Web Application Security: Defending the Enterprise's New Porous Perimeter

Published By: Akamai     Published Date: Jul 01, 2011
This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.
Tags : 
akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection
    
Akamai

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks

Published By: IBM     Published Date: Apr 09, 2015
Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.
Tags : 
malware protection, ibm, network security, it security, application security, internet security, intrusion detection, intrusion prevention
    
IBM

Defending against malware: A holistic approach to one of today's biggest IT risks

Published By: IBM     Published Date: Jan 07, 2016
Understand how attacks work- then deploy comprehensive, integrated solutions to fight each step malware takes.
Tags : 
ibm, networks, malware, risk, security, enterprise applications, business technology
    
IBM

Is your network security limited to defending against yesterday's threats?

Published By: IBM     Published Date: Jan 07, 2016
IBM Security Network Protection (XGS) is a next-generation intrusion prevention appliance that uses behavior-based analysis instead of pattern matching to help identify and block unknown threats.
Tags : 
ibm, networks, security, threats, protection, intrusion prevention, enterprise applications, business technology
    
IBM

Safeguard Sensitive Data Against Insider Threats and External Attacks: Top 5 scenarios

Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM

Defending Against Denial of Service Attacks

Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.
Tags : 
denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive
    
F5 Networks Inc

Defending against increasingly sophisticated DDoS attacks

Published By: IBM     Published Date: Oct 14, 2014
Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
IBM

Point of Sale (POS) Security: Defending against POS Malware

Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault

WebPulse Collaborative Defense: Proactively Defending Your Network Against Malware

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
Blue Coat Systems

Testing Password Safety: A Key to Securing a Corporate Network

Published By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : 
passwords, password, password management, security management, good password, bad password, data protection, elcomsoft
    
ElcomSoft

Lead Generation & Marketing Automation: Step-by-Step Guide with Practical Templates & Tools

Published By: Demand Metric     Published Date: Nov 06, 2008
Lead Generation is the top priority for marketing directors in 2009. More importantly, marketers are being charged with defending their budgets and demonstrating real ROI for their marketing programs. Use this How-To Guide to learn how other world-class companies are developing lead generation infrastructures that automate key processes, measure results, and provide a steady flow of qualified leads their sales organizations.
Tags : 
demand metric, lead generation
    
Demand Metric

Defending Against Application Layer DDoS Attacks

Published By: Juniper Networks     Published Date: Sep 10, 2014
Understand the changing threat landscape and how to secure your business against Distributed Denial of Service attacks with our Whitepaper. Read about the latest detection and mitigation strategies to ensure always-on protection.
Tags : 
security, ddos attacks, detection, prevention, mitigation strategy, always on-protection
    
Juniper Networks
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.