network security

Results 876 - 900 of 1132Sort Results By: Published Date | Title | Company Name

Cybersecurity for Dummies

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Palo Alto Networks is leading a new era in cybersecurity by securing thousands of enterprise, government, and service provider network from cyber threats and protecting our digital way of life.
Tags : 
palo alto, firewall, cyber security, automation, cybersecurity for dummies
    
Palo Alto Networks

First Principles for Network Defenders: A Unified Theory for Security Practiioners

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Great thinkers like Aristotle, Descartes and Elon Musk have said that, in order to solve really hard problems, you have to get back to first principles. First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them. They are atomic. Experts use them like building blocks to derive everything else that is worth knowing in the problem domain. In this paper, I propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.
Tags : 
palo alto, network defenders, security practitioners, security
    
Palo Alto Networks

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks

Firewall Buyer's Guide

Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks

Next-Generation Firewalls: The Cornerstone of Next-Generation Security

Published By: Palo Alto Networks     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : 
firewall, optimization, network, environments, applications, infrastructure, security, palo alto
    
Palo Alto Networks

Combating Malware: Leveraging the Power of a Planet

Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security, security, anti spam, anti spyware, anti virus
    
Panda Security

Optimize Colocation Infrastructure Strategies

Published By: Panduit     Published Date: Aug 28, 2018
Interested in learning how the right physical and network infrastructure approach in your colocation data center facility can help you stabilize costs, provide better security, and help promote growth for you and your tenants? Download the Panduit white paper Optimizing Colocation Infrastructure Strategies to learn how to overcome the challenges of aging colocation data center infrastructure and onboard new tenants quickly.
Tags : 
panduit, colocation, data center, data center management, infrastructure, colocation provider, migration, network architecture, backup and recovery, best practices, cloud computing, colocation and web hosting
    
Panduit

ICAC: Cyber Security Threat Assessment

Published By: PassGo     Published Date: Oct 23, 2007
Looking at IT security history, the bad guys were always far more sophisticated than the people who tried to stop them. Even if companies or the government could conceive of IT security it was almost impossible to achieve it because of the lack of knowledgeable security professionals out there and the lack of security protection tools in the marketplace.
Tags : 
risk assessment, hacker, hackers, hacker detection, cyber crime, cybercrime, cybercrimes, intrusion, intrusion prevention, intrusion detection, network security, azoogle, azoogle ads
    
PassGo

New Workspace Experience: Borderless Network Access

Published By: PC Mall     Published Date: Jul 08, 2010
Download this Cisco white paper to learn how to deliver a new workspace experience, connecting anyone, anywhere to any resource: securely, reliably and smoothly.
Tags : 
pcmall, internet security, networking, wireless networking, network security, network hardware, network protection, network connection, network reliability, seamless network, routers, switches, server hardware, network security appliance, wireless application software
    
PC Mall

Cisco EnergyWise: Power Management Without Borders

Published By: PC Mall     Published Date: Jul 09, 2010
Learn how to actively manage and reduce power consumption by using your network intelligently to realize significant cost savings.
Tags : 
pc mall, internet security, networking, wireless networking, network security, network hardware, network protection, network connection, network reliability, seamless network, routers, switches, reduce power, reduce energy, green it, energy efficiency, cost reduction, server hardware, wireless infrastructure, green computing
    
PC Mall

The Economics of the Cloud

Published By: PC Mall     Published Date: Jun 22, 2011
This white paper from Microsoft discusses the underlying economics driving the transition from mainframe to client/servers. The economics of the cloud, by using in-depth modeling, is also reviewed to better understand the long-term IT landscape.
Tags : 
cloud computing, virtualized datacenter, network security, private cloud, public cloud, application security, internet security, intrusion prevention, security management, virtualization, infrastructure
    
PC Mall

Webinar: Eliminating Borders for Anytime, Anyplace Access

Published By: PC Mall     Published Date: Jun 22, 2011
This PC Mall webinar discusses the components of a borderless architecture and how technology is impacting network security as well as the benefits and how to of adopting a borderless network.
Tags : 
borderless networks, cisco, webinar, security, email, firewall, pc mall, eliminating borders, firewalls, internet security, intrusion prevention, security management, cloud computing, vulnerability management, infrastructure
    
PC Mall

Guide to Malware and Attack Methods

Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips, mission critical systems, system av, patch management, policy management, layered security, end user security awareness training, strong policies, audited procedures
    
Perimeter E-Security

The Mobile Workforce: The Weakest Link

Published By: Pointsec     Published Date: Aug 21, 2009
The use of handheld computers is estimated to grow by more than 50 percent in the next few years. This surge in use of mobile devices means that companies need to make sure their growing mobile workforce use devices that are secure so that handhelds do not become the weakest link in their security system.
Tags : 
secure mobile, secure laptop, laptop security, secure handheld, wireless security, network security, pointsec, wireless, mobile computing, mobile workers, pda, sales & marketing software
    
Pointsec

Enterprise Security for Mobile Computing Devices

Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management, pointsec, security management
    
Pointsec

Guide for Securing Federal Telework

Published By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : 
network security, security policy, government, security policies, policy based security, information security, data security, telecom, secure communications, pointsec, remote access, remote network management
    
Pointsec

The Ultimate Guide to Video Conferencing

Published By: Polycom     Published Date: Oct 17, 2016
With demand for video conferencing growing rapidly, solutions need to provide a robust, resilient, scalable, and manageable infrastructure that delivers unparalleled quality of experience. The Polycom RealPresence Platform is the software infrastructure that underlies Polycom’s video conferencing, and binds it together by integrating with core networking and security infrastructure. This enables secure collaboration for any number of users across heterogeneous networks, with up to 50% less bandwidth consumption than other competitor solutions. By delivering an architecture based upon open standards, Polycom has created a flexible, state of-the-art video conferencing platform that provides superior investment protection, at the lowest total cost of ownership. Download to learn more!
Tags : 
    
Polycom

Preempt launches access control platform that bridges identity, behavior and risk

Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt

Business-Driven Information Security: The Key to Effective Executive Communication

Published By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : 
network security, intrusion prevention, security management, business management, information management, data security, preventsys, security, authentication
    
Preventsys

Gartner Magic Quadrant for Secure Email Gateways, 2011

Published By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : 
secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence, dlp, saas, virus filtering, spam filtering, archiving, antivirus, email encryption, transport layer security, tls, network intrusion prevention system, gartner email security magic quadrant, 2011
    
Proofpoint

How to Achieve a Better Bring Your Own Device Policy for Your Organization

Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : 
byod, pulse secure, vpn, mobile device management, network security, productivity, networking, security, it management, wireless
    
PulseSecure

Craft Enterprise Plans for Your Organization’s Mobile Security

Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions, it management, enterprise applications, business technology
    
PulseSecure

Security Management 2.0: Time to Replace Your SIEM?

Published By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
Start   Previous    29 30 31 32 33 34 35 36 37 38 39 40 41 42 43    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.