security analysis

Results 126 - 150 of 165Sort Results By: Published Date | Title | Company Name

Next-Generation Network Security: A Buyers’ Guide

Published By: Cisco     Published Date: Aug 24, 2015
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at next-generation security solutions. It also offers: -An analysis of the capabilities you should look for (and demand) in your network security solutions -Arms you with the information you need to be an educated buyer -Helps you get what you need, and not a set of future capabilities packaged in a “marketecture” that you can’t deploy
Tags : 
network security, buyer's guide, next-generation security solutions, security solutions, networking, security, it management
    
Cisco

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security

Published By: Cisco     Published Date: Feb 16, 2016
Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.
Tags : 
technology, security, security management, malware analysis, network management, business intelligence, database security, productivity
    
Cisco

5 Tips for Choosing a Next-Generation Endpoint Security Solution

Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco

Assessing the Business Value of Endpoint Specialized Threat Analysis and Protection Solutions

Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco

Cylance® vs. Traditional Security Approaches

Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance

Endpoint Security Solutions: Comparative Testing Analysis

Published By: Trend Micro     Published Date: Oct 12, 2012
See which security solution is the fastest and most efficient in this FREE analysis
Tags : 
ation security, information technology, trend micro, security, auditing, security management, business technology
    
Trend Micro

Mastering New Challenges in Text Analytics.

Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS

Mastering New Challenges in Text Analytics

Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS, Inc.

How to Integrate Big Data Intelligence For Enterprise Companies to Enable Breach Prevention

Published By: Damballa     Published Date: Apr 14, 2014
Learn about the new ways to detect advanced threats and see how you can integrate big data intelligence to enable breach prevention.
Tags : 
malware, threats, security, network based intelligence, detection, big data, breach prevention, malware analysis
    
Damballa

Symantec Internet Security Threat Report

Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
    
Symantec

Packet-Based Security Forensics

Published By: Viavi Solutions     Published Date: Jan 04, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions

Leveraging Threat Intelligence in Security Monitoring

Published By: Norse     Published Date: Apr 10, 2014
Learn the benefits of leveraging threat intelligence in security monitoring and see the protection it can give you against advance threats and malware.
Tags : 
norse, threat intelligence, malware, security, threats, malware analysis, protection, big data
    
Norse

IDS Evaluation Guide

Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault

451 Research Report: AlienVault USM Anywhere

Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault

Meeting Regulatory Log Requirements

Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Discover how NetIQ Security Manager can help your organization comply with the log collection and analysis requirements within recent regulations and standards.
Tags : 
security management, monitoring, compliance, log management, logging, event management, hipaa, hipaa compliance
    
NetIQ Corporation

The Digital Signature Paradox

Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace

How to Learn to Love a Security Audit

Published By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : 
compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis
    
Intellitactics

PCI Compliance: The New Reality for European Retail Companies

Published By: Easynet     Published Date: Mar 26, 2008
Compliance with the payment card industry (PCI) data security standard is now a reality for every retailer: compliance should be high on every retailer's list of priorities for enterprise security. With this reality comes the need for retailers to fully understand their PCI compliance status through a thorough gap analysis and associated risk assessment.
Tags : 
compliance, vpn, retail, managed networks, easynet, network management, pci compliance
    
Easynet

maXecurity: The Next Generation of Web Access Management

Published By: P2 Security     Published Date: May 13, 2008
A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.
Tags : 
maxecurity, tco, roi, web access management, internet security, web security, web service security, return on investment
    
P2 Security

LogRhythm Compliance Support for FISMA

Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis
    
LogRhythm

LogRhythm for Gramm-Leach-Bliley Act (GLBA)

Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security
    
LogRhythm

LogRhythm for Health Insurance Portability and Accountability Act (HIPAA)

Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology
    
LogRhythm

LogRhythm for PCI-DSS Compliance

Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology
    
LogRhythm

LogRhythm for Sarbanes Oxley (SOX)

Published By: LogRhythm     Published Date: Sep 26, 2008
Do you need to simplify your financial reporting process to ensure that you are meeting the Sarbanes Oxley requirements? Read this whitepaper to learn more…
Tags : 
sox, sarbanes oxley, sox compliance, sarbanes oxley compliance, compliance, comply, information technology, security
    
LogRhythm

NERC CIP Compliance

Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
    
LogRhythm
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.