network security

Results 1126 - 1145 of 1145Sort Results By: Published Date | Title | Company Name

Take Back Control: Increase Security, Empower Employees, Protect the Business

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Tags : 
watchguard application control, network app, p2p applications, network security appliance, watchguard xtm, firewall, threat management, application security, firewalls, intrusion detection, intrusion prevention
    
WatchGuard Technologies

A Changing Threat Landscape for the Retail Industry

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks, web applications, pci dss 2.0, spear phishing, application control, drive-by download, malicious activity, network security solutions, business continuity, application security, firewalls, identity management, network security appliance
    
WatchGuard Technologies

Virtual Support Networks: Ten Tips for Delivering Managed Services to On-Site Systems

Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan, firewall, virtual private network, vpn, security, support costs, isdn, wifi, slas, tco, it management, local area networking, customer interaction service
    
WebEx

Survey: Remote Users Expose Companies to Cybercrime

Published By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device, business technology
    
Webroot

Phishing 2.0

Published By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : 
phishing, campaigns, antiphishing, security, social media, malware, block, network, technology, protection, web security, networking, data protection
    
Webroot Inc

Webroot SecureAnywhere Business Endpoint Protection eBook

Published By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : 
endpoint protection, networks, security software, endpoint devices, security
    
Webroot Inc

Why Your Next Generation Firewall Protection Isn't Enough

Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc

Manage Mobile App

Published By: Webroot UK     Published Date: Dec 20, 2013
The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. This whitepaper will show you the growing factors that IT professionals can't afford to ignore.
Tags : 
webroot, mobile apps, mobile workers, mobile devices, accessing networks, workplace technology, security threats, infographic, mmas, mobile malware, webroot security, wireless, access control, application security, mobile device management
    
Webroot UK

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Data at Risk

Published By: Websense     Published Date: Sep 27, 2010
Social media isn't coming to banking institutions-it's here. For banks and their customers, social networks such as Facebook, LinkedIn and Twitter have become an integral part of everyday life.
Tags : 
websense, social network, facebook, linkedin, twitter, data risk, data security, web security, networking, security management, security policies, web service security
    
Websense

Download your copy of the Miercom Security Effectiveness Test Report today.

Published By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : 
miercom, security, effectiveness, report, protect, network, threats, solutions
    
Websense

Security in the Age of Enterprise Technology

Published By: Windstream     Published Date: Mar 19, 2015
The following report will help you gain advantage through proactive use of network security.
Tags : 
windstream communications, network security, risk management, internet security, security management, wireless security, data protection, business technology, mobile device management
    
Windstream

Index Data Security in Microsoft Windows Environments

Published By: x1     Published Date: Aug 21, 2009
This paper explains how X1 Enterprise Edition security integrates seamlessly with an existing Microsoft network installation. It describes how X1 security features are configured and deployed, including web server security. It ends by showing how X1 and Microsoft Windows security layers work together at runtime.
Tags : 
data security, web server security, web service security, windows security, x1 security, enterprise security, security software, windows server, data protection
    
x1

What the New World of Cloud IT Means for the Network

Published By: XO Communications     Published Date: Jul 17, 2014
The cloud has gone mainstream, 75% of businesses are using or plan to use cloud based services. More Enterprises are adopting multi-cloud environments, 50% of IT leaders plan on using four or more cloud-based services.
Tags : 
cloud, network, software, backup, disaster recovery, security, network architecture, tcp/ip protocol, backup and recovery, cloud computing
    
XO Communications

Building a Cloud Enabled Network with MPLS IP-VPN

Published By: XO Communications     Published Date: Apr 13, 2015
One of the leading ways that today’s organizations are providing secure, reliable and scalable answers for their networking needs is through MPLS IP-VPN network usage. However, businesses are also looking to create Intelligent WAN that integrates security, application performance management, and cloud services in order to create more intelligent wide area networks. This paper examines how to use the attributes of MPLS-based VPNs to enable enterprises to create a truly intelligent WAN, discussing key planning, implementation and management considerations to pave the way for a more intelligent and cloud-enabled WAN.
Tags : 
    
XO Communications

Putting the Kibosh on Shadow IT: Best Practices for Hybrid Cloud Management

Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : 
shadow it, hybrid cloud management, visibility, network security, cloud traffic, wan, networking, security, it management
    
XO Communications

7 Key Criteria for Choosing a Managed File Transfer Solution

Published By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, authorization, access, access control
    
YouSendIt

7 Key Criteria for Choosing a Managed File Transfer Solution

Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, authorization, access, access control
    
YouSendIt, Inc.

Rethink your Network Security

Published By: Zscaler     Published Date: Jun 19, 2019
Traditional network security is no longer suitable for the cloud and mobile-first world.
Tags : 
    
Zscaler
Start   Previous    32 33 34 35 36 37 38 39 40 41 42 43 44 45 46     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.