network security

Results 901 - 925 of 1144Sort Results By: Published Date | Title | Company Name

Cybersecurity for Dummies eBook

Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
Palo Alto Networks

The Bad Bot Landscape 2014 Annual Report

Published By: distilnetworks     Published Date: Jun 13, 2014
In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.
Tags : 
block bot, block bots, data protection, distil networks, online trust, prevent web scraping, price scraping, web scraping
    
distilnetworks

The Business Cloud Outlook

Published By: Microsoft Office 365     Published Date: Jan 21, 2016
Small to mid-sized businesses today face a tough task; providing helpful collaboration tools that big businesses offer, without the large costs. Microsoft commissioned Spiceworks, a network of IT pros, to survey over 250 IT experts working at small to mid-sized businesses to tell us how to do more with less. The IT pros had this to say, “As a result of using a cloud approach, nearly 80% [of surveyed IT pros] said they’re saving money, seeing more productivity and better security.” Learn more in the free eBook and propel your small business into the cloud: • Costs. Provide better tools to increase availability, productivity, and security while keeping costs down. • Scale. Take advantage of self-servicing and discover the ability to quickly scale your business. • Mobility. Make accessing information on the go easier for your mobile workforce.
Tags : 
it management
    
Microsoft Office 365

EMM Real Benefits in Today's Mobile World

Published By: VMware     Published Date: Feb 24, 2017
The economy isn't standing still. For your business to succeed, your employees shouldn't either. With your network infrastructure as a strong pair of legs, the right combination of a seamless user experience and a secure workspace will give users -- and your organization -- the ability to move forward with mobility. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Tags : 
    
VMware

Transforming Cloud Datacenter Security for Business Mobility

Published By: VMware     Published Date: Feb 24, 2017
Cloud datacenter security is becoming imperative in the new age of malware attacks. To stay competitive and secure, organizations are turning to smart networking in an effort to close the datacenter security gap. The combination of VMware NSX, AirWatch Tunnel and Horizon View helps close this gap and simplifies security management for IT professionals. With the upcoming prevalence of authentication and identity management in an organization’s infrastructure, the need to delegate and define network access continues to highlight the important role of hybrid cloud security that addresses all end-user devices.
Tags : 
    
VMware

"Defense-in-Depth" and the Distributed Gateway Platform

Published By: iboss     Published Date: Jan 22, 2018
While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.
Tags : 
iboss, device security, intrusion, network security, distributed computing, firewalls, intrusion prevention, wireless security
    
iboss

Web application firewall – delivering must-have protection for the modern enterprise

Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn what traditional network security solutions can’t do and why your organization needs a web application firewall as a cornerstone of its IT security strategy
Tags : 
citrix, web application, firewall, security, network security, remote access, firewalls, hacker detection
    
Citrix Systems, Inc.

AT&T and IBM's Private Cloud Partnership:  From Competition to Coopetition

Published By: IBM     Published Date: Feb 27, 2014
Learn about AT&T and IBM's Private Cloud Partnership and see how AT&T excelled their business and performance through this partnership.
Tags : 
at&t, ibm, private cloud, network, security, performance, reliability, best practices
    
IBM

Team uses APM tool to ID Attacker

Published By: Viavi Solutions     Published Date: Apr 01, 2015
With the expanding sophistication of large-scale breaches, the question isn’t whether most organizations will be hacked – it’s when. The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera. It also includes a case study of how one network team used a performance monitoring solution to identify the surprising source of an attack.
Tags : 
apm, security, application performance management, it infrastructure, it security, data loss, intrusion detection, intrusion prevention
    
Viavi Solutions

Packet-Based Security Forensics

Published By: Viavi Solutions     Published Date: Jan 04, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions

NPMD for Network Security Forensics

Published By: Viavi Solutions     Published Date: Jan 04, 2017
The right Network Performance Monitoring and Diagnostics (NPMD) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) defenses.
Tags : 
    
Viavi Solutions

Viavi Special Report: Network Tools Hold Critical Insight in Attack Remediation

Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions

Protecting Your Website with Always on SSL

Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl, security
    
Symantec

Platinum Career Membership is the perfect fit for I.T. pro's

Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification, it career advancement
    
CareerSaver

Bronze Membership - COMP TIA

Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification, it career advancement
    
CareerSaver

Gold Membership - Microsoft Certification

Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification, it career advancement
    
CareerSaver

Security Membership Offer

Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification, it career advancement
    
CareerSaver

Silver Membership - Cisco Certification

Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification, it career advancement
    
CareerSaver

Spoofing Server-Server Communication: How You Can Prevent It

Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

Business Continuity And Breach Protection

Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
    
Symantec

To Increase Downloads Instill Trust First

Published By: Symantec     Published Date: Dec 28, 2015
Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Tags : 
code signing, wireless networks, transferring code, content distribution, security
    
Symantec

City of Lewiston Improves Threat Detection with AlienVault USM

Published By: AlienVault     Published Date: Mar 30, 2016
With AlienVault USM, the IT team for the City of Lewiston has been able to identify critical vulnerabilities, find orphaned services accounts, and detect threats before they became incidents. Learn how this team greatly improved network security on a small budget.
Tags : 
    
AlienVault

CIS Critical Security Controls - Accelerated & Simplified

Published By: AlienVault     Published Date: Mar 30, 2016
The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Tags : 
    
AlienVault

Practical Threat Management for Educational Institutions

Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault

IDS Evaluation Guide

Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Start   Previous    30 31 32 33 34 35 36 37 38 39 40 41 42 43 44    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.