network security

Results 801 - 825 of 1123Sort Results By: Published Date | Title | Company Name

The Future of Threat Detection: UEBA and SIEM Together?

Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : 
webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
    
Group M_IBM Q1'18

The Business Data Ecosystem: Exploring the Five Elements of Digital Storage

Published By: Seagate Technology     Published Date: Apr 14, 2015
Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.
Tags : 
cloud, security, network attached storage system, customization, affordability, network security, network attached storage, storage management, internet security, data protection, data loss prevention
    
Seagate Technology

Data Leakage Landscape: Where Data Leaks & How Next Generation Tools Apply

Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, security, best practices, pci compliance
    
Utimaco

Securing Your Microsoft IIS Web Server with a thawte Digital Certificate

Published By: thawte     Published Date: Nov 06, 2006
Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
Tags : 
security, security policies, network security, servers, windows server, microsoft web server, security certificate, networking best practices, digital certificate, web security, internet security, web server security, thawte, web server
    
thawte

Mitigating DDoS Attacks with F5 Technology

Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks, business logic attacks, security, protections, data loss prevention, attack tools, network reconnaissance, low-bandwith asymmetric attacks, anti-attack technology, network security, application security, security management
    
F5 Networks Inc

The Ultimate Network Security Toolkit

Published By: Focus     Published Date: Nov 15, 2011
Learn the 9 most critical factors all small to medium-size businesses should know about data network security.
Tags : 
network, security, network security, attacks, intrusion, intrusion prevention, security, data network, smb, application security, auditing, authentication, disaster recovery, identity management, intrusion detection, password management, business intelligence, configuration management, vulnerability management, infrastructure
    
Focus

The Hunted Becomes the Hunter

Published By: Arbor Networks     Published Date: Mar 13, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention, network security, anti virus, hacker detection, intrusion detection, phishing, data protection, vulnerability management
    
Arbor Networks

The New DDoS Defense: Denying Denial-of-Service Attacks

Published By: Arbor Networks     Published Date: Mar 23, 2015
After a discussion of the costs of DDoS attacks and current mitigation solutions, this paper examines Arbor Cloud, a DDoS service from Arbor Networks. This Technology Spotlight also provides advice for organizations evaluating DDoS mitigation solutions.
Tags : 
arbor networks, arbor, ddos, denial of service, denial of service attacks, network security, network overload, internet security, web service security, data protection, customer experience management, business technology
    
Arbor Networks

Next Generation Security Buyer’s Guide

Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, security, software development, it management, business technology
    
Cisco

Your Network is the New Battlefield

Published By: IBM     Published Date: May 09, 2013
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
Tags : 
network, security, cybersecurity, endpoint manager, solution, eliminate vulnerabilities, technology
    
IBM

Advanced Evasion Techniques for Dummies

Published By: McAfee     Published Date: Oct 28, 2013
Welcome to Advanced Evasion Techniques For Dummies, your guide to the security evasion techniques that have become a serious preoccupation of the IT industry.
Tags : 
hacking, malware, advanced evasion, aet, stonesoft, network security, next generation firewall, ngfw, evasion technique for dummies, mcafee, firewall, software development, it management
    
McAfee

Fortune 500 Security on a Budget

Published By: SilverSky     Published Date: May 09, 2014
This white paper explores the problems with traditional network setups and ways to address these issues in a budget friendly manner.
Tags : 
silversky, fortune 500, business security, network security, it management, security products, security systems, log data, detects threats, protects network, it budgets, software-as-a-service, saas, log management, security, cloud computing
    
SilverSky

TEI of SilverSky Network Security Solutions

Published By: SilverSky     Published Date: May 09, 2014
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SilverSky security services for their organizations.
Tags : 
silversky, economic impact, network security, security solutions, forrester research, security threats, risk-adjusted, productivity, security infrastructure, compliance, business requirements, information security, networking, security, it management
    
SilverSky

The Business Value of Managed Security Services

Published By: SilverSky     Published Date: May 09, 2014
This paper provides an overview of the benefits of outsourced security solutions such as managed security services. The managed security services option saves money, improves the network security posture, and maximizes the efficiency of existing corporate resources.
Tags : 
silversky, business value, security services, the cloud, security conundrum, decrease threats, service providers, managed solutions, security solutions, security, it management
    
SilverSky

To Outsource or Not to Outsource: That is the Network Security Question

Published By: SilverSky     Published Date: May 09, 2014
This paper discusses how to cost-effectively turn the tables and ultimately win the battle for securing the network. It discusses different options and the methodology for making critical decisions about how to tackle your network security challenges.
Tags : 
silversky, outsource, network security, the cloud, value proposition, network security solutions, security options, security challenges, insource vs outsource, internal situation, leverage compliance experience, networking, security, it management
    
SilverSky

The Holistic Approach to Preventing Targeted Attacks

Published By: SilverSky     Published Date: Aug 27, 2014
Learn how your company can increase their security by adopting this holistic approach.
Tags : 
silversky, security, targeted attacks, retail security, security infrastructure, detection, zoning, network security, security system, security technology
    
SilverSky

Preparing your network for the mobile onslaught - How networks can overcome the security, delivery c

Published By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : 
mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations, architectural approach, mobile onslaught, networking, wireless
    
IBM

AccelOps Enables Efficient Data Center Monitoring

Published By: AccelOps     Published Date: Jan 08, 2014
Use real-time analytics and correlation for efficient root-cause analysis in your data center. Learn more about how AccelOps can help your company in our latest white paper.
Tags : 
accelops, application performance, network, data, data center, network monitoring, cloud, infrastructure, open source, security management, virtualization, wireless, server, networking, security, data management, application performance management, business technology
    
AccelOps

Next Gen buyer's Guide

Published By: Cisco     Published Date: Apr 08, 2015
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at nextgeneration security solutions. It also offers: • An analysis of the capabilities you should look for (and demand) in your network security solutions • Arms you with the information you need to be an educated buyer • Helps you get what you need, and not a set of future capabilities packaged in a “marketecture” that you can’t deploy
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco

ESG WP: Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall

Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco

Requirements When Considering a Next-Generation Firewall (WP)

Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco

Cisco Intelligent WAN Design Guide Summary

Published By: Cisco     Published Date: Apr 10, 2015
The Cisco Intelligent WAN (IWAN) solution provides design and implementation guidance for organizations looking to deploy wide area network (WAN) transport with a transport-independent design (TID), intelligent path control, application optimization, and secure encrypted communications between branch locations while reducing the operating cost of the WAN. IWAN takes full advantage of cost-effective transport services in order to increase bandwidth capacity without compromising performance, reliability, or security of collaboration or cloud-based applications.
Tags : 
cisco, wan, iwan, network transport, path control, cloud computing, infrastructure, network architecture, network management, network performance, network performance management, wireless application software, wireless hardware, wireless infrastructure, wlan
    
Cisco

Campus Switching Network Security

Published By: Cisco     Published Date: Sep 15, 2015
TechWiseTV: Put the Network Back in Network Security
Tags : 
network, security
    
Cisco

Ovum: Connected Analytics for the Enterprise

Published By: Cisco     Published Date: Sep 16, 2015
Increasingly, clues to what is happening with critical enterprise business processes will be found in data supplied by underlying infrastructure; indeed, the network can tell a story of how quickly and reliably customers are being served, operations are being run, or fraud or security threats are being repelled.
Tags : 
unified computing system, virtualization, networking, storage, enterprise resource planning, enterprise software
    
Cisco

Security Everywhere: A Growth Engine for the Digital Economy

Published By: Cisco     Published Date: Oct 14, 2015
Read more to learn how to seize new business opportunities by embedding security into the intelligent network infrastructure and across the extended network.
Tags : 
cisco, cisco security, digital economy, network infrastructures, network security, internet of everything, ioe, networking, security, it management
    
Cisco
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.