network security

Results 751 - 775 of 1132Sort Results By: Published Date | Title | Company Name

Entrepreneurs & Managed IT: Putting Big Company Strategies to Work for Small & Mid-Sized Businesses

Published By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services
    
Managed Systems, Inc.

2010 Threat Predictions

Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
McAfee

Advanced Evasion Techniques for Dummies

Published By: McAfee     Published Date: Feb 17, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
McAfee

The Importance of a Next Generation Firewall

Published By: McAfee     Published Date: Feb 17, 2014
Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam
    
McAfee

Learn how to Protect Against Advanced Evasion Techniques

Published By: McAfee     Published Date: Feb 17, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
McAfee

Advanced Evasion Techniques for Dummies - EN

Published By: McAfee     Published Date: Jun 03, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus
    
McAfee

Protect Against Advanced Evasion Techniques

Published By: McAfee     Published Date: Jun 03, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus
    
McAfee

Industry Experts Speak Out: The Network Performance and Security Trade-Off

Published By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : 
network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
McAfee

Des experts en Sécurité Jouent Franc Jeu : le Compromis entre la Sécurité et les Performances du Rés

Published By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : 
network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
McAfee

Branchenexperten klären auf: Der Kompromiss zwischen Netzwerkleistung und -sicherheit

Published By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : 
network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
McAfee

L'Opinione Degli Esperti del Settore: il Compromesso tra Prestazioni e Protezione della Rete

Published By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : 
network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
McAfee

Controlled and Secure Access to Public and Private Clouds

Published By: McAfee     Published Date: Oct 28, 2013
Watch this 3 minute video for a unique way of accessing public and private cloud services without losing governance and situational awareness.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Combining Modern Authentication Needs with Identity and Access Management

Published By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Deploy and Maintain Thousands of Security Devices in Seconds

Published By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Redefining Next Generation Security with Situational and Context Awareness

Published By: McAfee     Published Date: Apr 25, 2012
The best protection against today's network threats are solutions that are adaptable, dynamic, easily managed, contextually-aware and affordable. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Optimized and Uninterrupted Network Traffic

Published By: McAfee     Published Date: Oct 28, 2013
Eliminate high costs associated with MPLS and BGP with a new approach. This short video will show how secure and resilient connectivity between global sites is possible while increasing network bandwidth and quality of service.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Deploy and Maintain Thousands of Security Devices in Seconds

Published By: McAfee     Published Date: Oct 28, 2013
View this demonstration to see how masses of security devices in complex and geographically diverse organizations can be operated from one single point of operations in a way that is cheaper, easier, faster, and safer.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Advanced Evasion Techniques for Dummies

Published By: McAfee     Published Date: Oct 28, 2013
Welcome to Advanced Evasion Techniques For Dummies, your guide to the security evasion techniques that have become a serious preoccupation of the IT industry.
Tags : 
hacking, malware, advanced evasion, aet, stonesoft, network security, next generation firewall, ngfw
    
McAfee

Six Critical Management Capabilities of Next Generation IPS

Published By: McAfee     Published Date: Jan 23, 2013
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats.
Tags : 
network security, intrusion prevention system, ips, anti spam, anti spyware, anti virus, application security, business continuity
    
McAfee

Consolidate Network Security and Reduce Costs

Published By: McAfee     Published Date: Jan 23, 2013
Learn how McAfee Network Security Platform helps you realize greater consolidation benefits while minimizing project costs and disruption to your production environment.
Tags : 
network security, network consolidation, consolidation capabilities, anti spam, anti spyware, anti virus, business continuity, disaster recovery
    
McAfee

Protect Critical Assets with Virtual Patching

Published By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : 
virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence, mcafee risk advisor, mcafee epo, security
    
McAfee

Gartner MarketScope for Vulnerability Assessment

Published By: McAfee     Published Date: Jan 23, 2013
Vulnerability assessment vendors compete on management features, configuration assessment, price and more, with other security products. Buyers must consider how VA will fit into their vulnerability management process when evaluating VA products,
Tags : 
vulnerability management, network scanning, strong positive, mcafee vulnerability manager, mvm, mcafee epolicy orchestrator, epo, nitro siem
    
McAfee

Scale Network Security in your Next Generation Data Center

Published By: McAfee     Published Date: Feb 06, 2013
High performance for modern data center network fabrics, scalable deployment, and integrated inspection for physical and virtual environments. Next generation network security for your next generation data center.
Tags : 
data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center
    
McAfee

Compare solutions from different vendors.

Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organization’s most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring, access control, anti spyware, anti virus, application security, business continuity
    
McAfee

Cost-Effective Database Protection to Meet Your Compliance Requirements

Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware
    
McAfee
Start   Previous    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.