online security

Results 26 - 50 of 175Sort Results By: Published Date | Title | Company Name

How to Defend Your Perimeter from Today's Outsized Threats

Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai

Protecting Your Online Channels and Web Applications

Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai

Virtual Private Data Centres: The IT foundation that redefines eCommerce

Published By: Savvis UK Limited     Published Date: May 14, 2013
Savvis has been hosting eCommerce platforms for nearly two decades. Internet retailers including easyJet and Hallmark Digital trust us to power their online success. Savvis offers a comprehensive portfolio of infrastructure, network and application management across the eCommerce ecosystem. No matter what you sell or where you are along the eCommerce journey, we can support your commercial goals with the speed of implementation, accessibility, security and affordability of a retail-ready cloud environment, with our Virtual Private Data Centre. Combined with our global data centre footprint and network options ranging from Tier1 public IP access to private, low-latency connectivity, the VPDC offers a resilient, made-to-measure solution for any eCommerce application.
Tags : 
virtual, private, data centre, it foundation, ecommerce, platforms, internet retailers, online, virtual private data centre, security, affordability
    
Savvis UK Limited

Milestones in Entrust PKI Technology

Published By: Entrust Datacard     Published Date: Dec 08, 2015
This infographic illustrates how Entrust PKI Technology is still a key player and global leader in online security.
Tags : 
security, internet security, online security, pki, entrust pki technology, application security, authentication, security management, security policies
    
Entrust Datacard

2019 Experian Identity and Fraud report

Published By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
    
Experian

INSIDER THREAT 2018 REPORT

Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies

Threat prevention with visibility - 50% gain in security team’s productivity

Published By: Gigamon     Published Date: Jun 21, 2019
An online threat prevention strategy should be more than a collection of security tools. It needs to be an integrated and intelligent approach. A complete threat prevention solution not only enhances the performance of prevention tools, but it also increases the efficiency of operations teams by enabling them to quickly deploy patches and implement new technology without impacting network performance or relying on maintenance windows. Read this solution brief in local language to learn how you can gain 50% in team productivity.
Tags : 
    
Gigamon

Challenger migrates to AWS with Rackspace to provide cloud and local market expertise

Published By: Rackspace     Published Date: Mar 20, 2019
Running an IT backend that is secure, scalable and well-managed is resource draining for any enterprise. Challenger, Singapore’s largest IT retailer, took a more pragmatic route by transforming on a Online to Offline (O2O) model. For the journey, it partnered with Rackspace to accelerate the value of its AWS cloud migration, by tapping its proven AWS expertise, strong managed services portfolio, and familiarity with local regulatory compliance and cloud security demands
Tags : 
    
Rackspace

eBook: Managed DNS Evaluation Guide: Understanding What Matters Most When Selecting Managed DNS

Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS has recently been dubbed by Gartner Research as “mission-critical” infrastructure and as such, who you select for a DNS provider can have a significant impact on the functionality and performance of your online assets. To help with your research, download this DNS evaluation guide. You will learn the most important functions of a robust DNS provider including: • Advanced traffic steering from failover to GSLB capabilities • Rapid record propagation time • Secondary DNS support • Security expertise Keep your brand safe and your user-experience top notch by choosing the best provider for your business. Learn more now! "
Tags : 
    
Oracle + Dyn

Remove the Language Barriers that Stifle Global Corporate Collaboration Securely eBook

Published By: SDL     Published Date: Nov 12, 2019
Communication is Easy - or is it? Collaboration across global teams is essential to the success of multinational organizations, but ensuring everyone understands each other can be challenging. Online translation sites can pose security risks, especially for sensitive internal information, so how can corporations make it easier for teams to understand each other? Learn how overcoming the barriers to corporate collaboration produces valuable dividends: Communication in a person's native language minimizes misunderstandings and improves employee satisfaction. Protection from exposing sensitive company information through the use of unsecure, instant self-service translation portals. Bring a global perspective to your organization's decision making despite the language barrier.
Tags : 
    
SDL

eBook: Managed DNS Evaluation Guide: Understanding What Matters Most When Selecting Managed DNS

Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS has recently been dubbed by Gartner Research as “mission-critical” infrastructure and as such, who you select for a DNS provider can have a significant impact on the functionality and performance of your online assets. To help with your research, download this DNS evaluation guide. You will learn the most important functions of a robust DNS provider including: Advanced traffic steering from failover to GSLB capabilities Rapid record propagation time Secondary DNS support Security expertise Keep your brand safe and your user-experience top notch by choosing the best provider for your business. Learn more now!
Tags : 
    
Oracle + Dyn

Security vs. convenience in the payment experience

Published By: GoCardless     Published Date: Oct 08, 2019
With Strong Customer Authentication (SCA) coming into force on 14 September 2019 as the final part of PSD2, many online businesses are required to add additional security measures to large parts of their online payment experience. Key goals of SCA include reducing payment fraud and creating a safer payment experience for the customer.
Tags : 
    
GoCardless

Seven Technology Considerations for Today’s Web-enabled Meetings

Published By: Plantronics     Published Date: May 20, 2016
This white paper reveals seven necessary technologies to help ensure end users can take full advantage of web conferencing, from wherever they happen to be.
Tags : 
web conference, technology, web meetings, web conferencing, online conference, mobility, video conference, security, byod, bring your own device, application security, mobile computing, video conferencing, virtualization
    
Plantronics

Effectively Securing Small Businesses from Online Threats

Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist, anti spam, anti spyware, anti virus, email security, internet security, security management
    
MessageLabs

New Security Challenges for State and Local Governments

Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

Taking a Lead-Forward Approach to Combat Today's Cyber Attacks

Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

2018 Voice Intelligence Report

Published By: Pindrop Security     Published Date: Sep 24, 2018
With physical and online information security always growing stronger and harder to crack, fraudsters gravitate toward the weakest link in your security—your contact center and voice channels. For many years, our annual fraud reports have shown that fraudsters increasingly exploit the phone channel. Fraud rates continue to increase every year, and this year is no different. Between 2016 (1 in 937 calls) and 2017 (1 in 638 calls), the overall voice channel fraud rate increased by 47%, continuing on the upward trend from last year 113% increase.1 From 2013 through 2017 we have seen the fraud rate climb over 350%, with no signs of slowing down. It is important to note, that some verticals (i.e. Retail) experience even higher fraud rates than shown here.
Tags : 
    
Pindrop Security

New demands for security and compliance in online collaboration

Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
    
Brainloop

Managing Information Risk: Why Compliance and Security Must Join Forces

Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop

How Europe's largest e-commerce business secures its applications

Published By: HP - Enterprise     Published Date: Nov 19, 2008
Adrian Asher, Chief Security Officer at Betfair, an online UK betting exchange explains how he manages a “culture of security” and protects the Betfair brand in this 20-minute candid interview.
Tags : 
betfair, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, brand, auditing, hacker detection, security management
    
HP - Enterprise

How to Protect Your Business from the Coming Malware Storm

Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security, anti spyware, anti virus, application security, internet security, network security appliance
    
Webroot

Report: Sponsored Report: 2018 Insider Threats Report

Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA

Safer Online Payments: Small business Payment Survival Guide.

Published By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : 
ecommerce, payments, online payments, small business, fraud, security, card payments, card data, pci dss, e-retail, data breach, hacking, sql injection, malicious web shells, cyber security, sme, anti spam, anti spyware, anti virus, security management
    
Worldpay

Entrust IdentityGuard Cloud Services SSL: Centralized Management of Digital Certificates

Published By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud, networking, it management
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.