exchange threat

Results 1 - 8 of 8Sort Results By: Published Date | Title | Company Name

The Need for an Integrated Security Strategy

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA

McAfee Threat Intelligence Exchange and Endpoint Protection

Published By: McAfee     Published Date: Feb 25, 2015
This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.
Tags : 
mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection, anti spam, anti spyware, anti virus, application security, intrusion prevention, security management, infrastructure, data loss prevention
    
McAfee

McAfee Threat Intelligence Exchange, un Atout pour la Protection des Terminaux

Published By: McAfee     Published Date: Feb 25, 2015
This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.
Tags : 
mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection, anti spam, anti spyware, anti virus, application security, intrusion prevention, security management, infrastructure, data loss prevention
    
McAfee

Adaptive Intelligence and Real-Time Communications Orchestrate Protection in the McAfee Security Con

Published By: McAfee     Published Date: Apr 25, 2014
McAfee® Threat Intelligence Exchange and the McAfee Security Connected Platform can help integrate workflows and data to overcome siloed operations and shift the security model to agile, intelligent threat prevention. This paper describes three use cases to illustrate the benefits.
Tags : 
advanced malware, security, suspicious files, dynamic sandboxing, static analytics, threat prevention, mcafee network security, mcafee web gateway, mcafee email gateway, it management
    
McAfee

OpenDXL Idea Book: Fifteen Easy Ways to Integrate, Orchestrate, and Expedite Security Op

Published By: McAfee     Published Date: Mar 31, 2017
The OpenDXL initiative puts the power of integration and automation in the hands of security analysts by providing open source tools, expertise, and a supportive community.
Tags : 
opendxl, data exchange, open source, threat feed, threat intelligence, ioc, advanced threats, sandbox, honeypot, siem, stix
    
McAfee

Could your Business Survive a Cryptor?

Published By: Kaspersky     Published Date: Feb 06, 2017
As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.
Tags : 
ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones, wireless security, data protection, database security
    
Kaspersky

Best Practices for Leveraging Security Threat Intelligence

Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault

Top 10 Microsoft Exchange Storage and Protection Tips for SMBs

Published By: EMC     Published Date: Nov 06, 2006
The following tips can help you keep Exchange running smoothly and let you bounce back quickly from hardware failures that could threaten your Exchange server.
Tags : 
exchange server, top 10, exchange threat, exchange security, network security, microsoft exchange, microsoft exchange server, emc, emc insignia, storage, small business networks, backup and recovery, business continuity, disaster recovery, data protection, email archiving
    
EMC
Search      

Add Research

Get your company's research in the hands of targeted business professionals.