prevention

Results 326 - 350 of 525Sort Results By: Published Date | Title | Company Name

Outcome-Driven Security from Armor Protects AWS Workloads

Published By: AWS     Published Date: Oct 07, 2019
Armor provides a managed Security-as-a-Service (SECaaS) solution that helps strengthen and unify your AWS, on-premises, and hybrid security to enable rapid detection, prevention, and response to cyberthreats in real time—typically with a lower TCO. Armor’s protection can be deployed quickly to help boost application availability. This can also play a role in increasing the visibility and overall security awareness across all your apps, no matter where they reside, because they are always operational. This solution also puts the tools—like a Web Application Firewall—in place to provide appropriate protection while being managed from a single pane of glass. Your organization can also continue using your existing security resources because Armor provides the integration to unify their offerings with the tools you already have in place. In addition, Armor’s Security Operation Center (SOC) is incorporated to reduce high threat dwell times (the amount of time a threat has undetected access t
Tags : 
    
AWS

Unified Endpoint Management: the Next Step in the Evolution of Device Management (German)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Spanish)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (French)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Italian)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Holistic Fraud Prevention: Transforming the Customer's Experience

Published By: IBM     Published Date: Feb 11, 2015
Why strong, effective security can and should both enhance the customer experience and lower operational costs.
Tags : 
customer experience, holistic fraud prevention, operational costs, increased transactions, fraud identification, security, it management, enterprise applications, database security
    
IBM

Battling Financial Fraud at the Root Cause

Published By: IBM     Published Date: Apr 09, 2015
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.
Tags : 
ibm, it security, password security, malware prevention, security infrastructure, anti spyware, anti virus, application security, authentication, firewalls, hacker detection, security management, security policies, vulnerability management
    
IBM

Crimeware Protection: Security Beyond and Below the OS

Published By: HP & Intel     Published Date: Sep 18, 2012
3rd generation Intel Core vPro processors' built-in security technologies deliver and protect business clients where current technologies cannot reach.
Tags : 
intel, security, it threats, threat management, malware, data loss prevention, identity protection, business intelligence, data protection, database security
    
HP & Intel

Making a business case for fraud-prevention technology

Published By: IBM     Published Date: Jan 07, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud, prevention, protection, threat, security
    
IBM

Making a business case for fraud-prevention technology

Published By: IBM     Published Date: Apr 04, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud loss reduction, fraud management, fraud prevention, security, knowledge management, enterprise applications, network security
    
IBM

Fraud Protection Doesn't have to be an uphill battle

Published By: IBM     Published Date: Apr 04, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
ibm, fraud protection, fraud management fraud prevention, security, knowledge management, enterprise applications, network security
    
IBM

Advanced Threat Prevention Test

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance

Ransomware Prevention Is Possible: Fighting Today’s Extortive Threats

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance

The Impact of the Underground Economy, and How Analytics can Fight it ACFE Conclusion Paper

Published By: SAS     Published Date: Mar 06, 2018
“If we had done anything differently in Washington state, we would have done it faster,” said Hammersburg. “The key message is that fraud prevention – dealing with risk and program integrity – is not a cost issue, it’s a saving. When you can truly quantify the positive impact to the bottom line of a company or government agency, you shift the recognition that this is not an expense but that it’s a saving.” Some government organizations may be concerned that a rigorous program to shine a light on the underground economy will shine a brighter light on how much they didn’t know until now. Don’t let that stop you, said Hammersburg. “You have the opportunity to really get ahead of it now. Turn a risk into an opportunity going forward.”
Tags : 
    
SAS

Maintaining AD: An Ounce of Prevention or Pound of Cure?

Published By: Dell Software     Published Date: May 10, 2013
Have you ever had problems replicating Active Directory or recovering AD objects? In this Dell technical brief, learn about three critical tasks administrators often overlook – and why doing them helps automate AD maintenance.
Tags : 
dell quest, maintaining ad, ad objects, dell technical brief, ad maintenance
    
Dell Software

Securing Active Directory: An Ounce of Prevention or a Pound of Cure?

Published By: Dell Software     Published Date: May 10, 2013
Have you ever had problems securing Active Directory? In this Dell technical brief, learn about three critical tasks administrators often overlook – and why doing them helps maximize AD security.
Tags : 
dell software, active directory, ad security, dell technical brief
    
Dell Software

Credit Issuers: Stop Application Fraud at the Source with Device Reputation

Published By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : 
iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies, device print, web device print, pattern matching and risk assessment, identity theft, global fraud database, forensic analysis, credit card industry, application security, identity management, internet security, security management, web service security
    
Iovation

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation

Published By: Iovation     Published Date: Sep 25, 2009
Online casinos generated $22.6 billion in global revenues in 2008, up from $17.6 in 2006. While the online gambling industry grows, so does organized fraud. Cyber criminals are working hard to uncover and sell people's personal information and share techniques on how to defraud online gambling sites. The online gambling industry stands to lose hundreds of millions of dollars annually to fraud exposure if effective anti-fraud strategies aren't put in place.
Tags : 
cyber criminals, online gambling industry, legitimate players, fraudulent deposits, chargebacks, cheating, collusion and money laundering, buy, iovation reputationmanager, device fingerprinting, low false positives, pattern matching, fraud prevention strategies, device print, web device print, pattern matching and risk assessment, device id, device reputation authority, application security, authentication
    
Iovation

WagerWorks Takes Fraudsters Out of the Game using iovation Device Reputation

Published By: Iovation     Published Date: Oct 21, 2009
With device reputation, WagerWorks gained valuable insight into the account activity on its sites, and as a result achieved greater control over fraud and abuse. By easily identifying account-device relationships and providing data for in-depth forensic analysis, iovation ReputationManager proved to be the most important addition to the company's overall fraud prevention process
Tags : 
wagerworks, iovation, fraud prevention, security, identity management, compliance, online gaming abuse, security management
    
Iovation

EMA: Closing the Endpoint Security Gap

Published By: CarbonBlack     Published Date: Mar 16, 2016
Carbon Black has integrated with Microsoft endpoint technologies to provide enhanced prevention, detection, and response capabilities. This paper from EMA provides an overview of these integrations and discusses the key benefits of Carbon Black’s partnership with Microsoft.
Tags : 
endpoint security, carbon black, ema, microsoft, protection, detection, response capabilities, security
    
CarbonBlack

EMA Research Report: Next-Generation Endpoint Security Market Sizing and Forecast 2016–2020

Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention, vendor, detection, response, it management, data management, business technology
    
CarbonBlack

A Smarter Solution to Malware Prevention

Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection, security
    
Webroot Inc

Gartner Building an Adaptive Security Model Report

Published By: Intel Security     Published Date: Apr 06, 2016
Spend less on prevention; invest in detection, response and predictive capabilities.
Tags : 
security architect, information, continuous response, incident, monitoring, remediation, adaptive architecture, protection, advanced threats, prevention, detection
    
Intel Security

Managing Vulnerabilities & Updates for Third Party Software

Published By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software, security
    
Secunia

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Published By: LookingGlass Cyber Solutions     Published Date: Jul 18, 2016
Download this whitepaper to learn more about these four steps to protect your organization from phishing attacks: Prevention: make your organization a tough target Detection: speed is everything Response: communication is key Recovery: have a process in place
Tags : 
    
LookingGlass Cyber Solutions
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.