network security

Results 126 - 150 of 1153Sort Results By: Published Date | Title | Company Name

Application Threat Intelligence

Published By: F5 Networks Inc     Published Date: Aug 25, 2017
Cyber security has been a work in progress for decades. As security pros, we’ve learned a lot about how to defend our networks. We have more tools at our disposal than ever before. And for the first time in history, we are receiving tangible support from upper management for security work. We’ve never had it so good, right? Yet, we feel more helpless than ever. Most of the time, we’re overwhelmed and feel like we’re perpetually playing catch up.
Tags : 
    
F5 Networks Inc

Application, Usage and Threat Report

Published By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : 
palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security, social media security, network security, email security, hacker detection, web service security, data protection
    
Palo Alto Networks

Architecting a Flexible Strategy for Securing Enterprise Bring Your Own Device

Published By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : 
bring your own device, byod, idc survey, it managers, devices on network, networking, knowledge management, data management, business technology, data center
    
ForeScout

Architecting and Maintaining Robust Security in Your AWS Environment

Published By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9

Are Cybercriminals Hiding in Your SSL Traffic?

Published By: Venafi     Published Date: Jul 27, 2015
According to Gartner, by 2017, more than ?50% of network attacks will use encrypted SSL/TLS. Most organizations cannot decrypt and inspect SSL communications to detect these threats, which creates security blind spots.
Tags : 
ssl traffic, venafi, tls, security blind spots, it security, it security solutions, it management, knowledge management, enterprise applications
    
Venafi

Are you getting what you were promised?

Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
People make a lot of claims about network security. We’d rather show you proof. If you're looking for speed, reliability, advanced intelligence, and ease of integration with your existing environment, there's only one secure internet gateway that you can build your entire business on: Cisco Umbrella. Check out our infographic to learn just how quickly and easily you can put Cisco Umbrella to the test in your environment.
Tags : 
    
Cisco Umbrella EMEA

Are Your DNS Servers as Secure and Available as the Rest of Your Network?

Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox

Astaro Replaces Cisco and Barracuda for Better Security Management at Frontier Nursing Service

Published By: Astaro     Published Date: Aug 10, 2009
Frontier Nursing Services (FNS, Inc.) of Hyden, Kentucky provides health care to the underserved population in rural areas of southeast Kentucky and is committed to advancing nursing through education.
Tags : 
frontier nursing, astaro, cisco, barracuda, pix, fns, network, it department, management, reporting, all-in-one security, vpn, firewall, email, antivirus, gateway, report manager, security, anti virus, firewalls
    
Astaro

AT&T and IBM's Private Cloud Partnership:  From Competition to Coopetition

Published By: IBM     Published Date: Feb 27, 2014
Learn about AT&T and IBM's Private Cloud Partnership and see how AT&T excelled their business and performance through this partnership.
Tags : 
at&t, ibm, private cloud, network, security, performance, reliability, best practices, business intelligence, business management
    
IBM

AT&T NetBond for Cloud with Amazon Web Services (AWS)

Published By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
AWS

Attack Surface Manager Solution Brochure

Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, illusive networks
    
Illusive Networks

Automating the Top 20 CIS Critical Security Controls

Published By: Qualys     Published Date: Jan 11, 2017
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys

Automating User Authentication: Simplifying Network Troubleshooting & Security Forensics

Published By: A10 Networks     Published Date: Aug 21, 2009
Troubleshooting network and security problems in a time of crisis is never easy and the need to resolve mysterious machine addresses such as MAC and IP Addresses back to individuals or hosts is often difficult and time consuming. Download this solution sheet and see how A10 Networks' IDentity Proxy Service can automate the task of resolving host addresses back to individuals to speed network and security troubleshooting and forensics.
Tags : 
ip address, identity, network security, identity management, mac address, network management, troubleshoot, a10, a10 networks
    
A10 Networks

Automating Vulnerability Management for PCI DSS Compliance

Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi, security, network security, patch management
    
GFI

Automation in Network Security Management

Published By: Palo Alto Networks     Published Date: Feb 24, 2016
Automation in Network Security Management
Tags : 
palo alto, network security, data, threat, security, business technology
    
Palo Alto Networks

Automation Reduces the Cybersecurity Timeline

Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether it’s speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks

Avi Vantage For Microsoft Azure

Published By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
    
Avi Networks

AWS Security and Networking - Filtering Cloud Network Traffic and Preventing Threats

Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services

Balancing Security Investments - The Challenge of the Modern UK Enterprise

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017

Balancing Social Networking with Network Security Objectives

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring, access control, anti spyware, anti virus, application security, authentication, disaster recovery, email security, encryption, firewalls, hacker detection, high availability
    
Blue Coat Systems

Balancing Social Networking with Network Security Objectives

Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, email security, encryption, firewalls, hacker detection, high availability
    
Blue Coat Systems UK

Banks and Data Leak Prevention

Published By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : 
quocirca, bank, banks, financial services, finserve, finserv, network security, customer data, data protection, intrusion prevention, data security, database security, security
    
Quocirca
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.