security services

Results 276 - 300 of 464Sort Results By: Published Date | Title | Company Name

Threat-Centric Security Solutions for Service Providers

Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services, access control, application security, internet security, intrusion prevention, security management
    
Cisco

Four Critical Criteria for Automotive Companies Evaluating DDoS Mitigation Providers

Published By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : 
web security, best practices, mitigation services, network management, automotive, security, web services, web service security, productivity
    
Akamai Technologies

Healthcare Information Security Programs: Why Web Security Matters

Published By: Akamai Technologies     Published Date: Mar 15, 2016
The richness of the data combined with the increasing interconnectedness of healthcare technologies makes the industry ripe for cyberattacks.
Tags : 
healthcare, information security, web security, data management, technology, cloud services, security, network performance, network performance management, network provisioning, network security, best practices
    
Akamai Technologies

Case Study: Gatwick Airport takes flight with Okta

Published By: Okta     Published Date: Mar 10, 2016
To manage and control how the airport's employees make use of these cloud-computing services, Gatwick has turned to the cloud-based identity management service from Okta, which lets the security manager centrally manage, provision and de-provision single sign-on access to cloud services for Gatwick's staff.
Tags : 
    
Okta

Improving Web Application Security: The Akamai Approach to WAF

Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security, risk management
    
Akamai Technologies

Tyco Integrated Security Commercial Solutions

Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Since 1874, Tyco Integrated Security has consistently provided quality products and services to our customers. From loss prevention to operational and risk management, our ultimate goal is to help you better protect your business and meet your security needs.
Tags : 
tyco, security, commercial, loss prevention
    
Tyco Integrated Security

What You Need To Know About Vendor Risk Management In Financial Institutions

Published By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector, it management, knowledge management, enterprise applications
    
BitSight Technologies

Cybersecurity For Financial Services

Published By: Palo Alto Networks     Published Date: Feb 24, 2016
Next generation security for financial services.
Tags : 
palo alto, financial services, cyber security, data security, security
    
Palo Alto Networks

Simplify Your Network

Published By: Cisco     Published Date: Feb 23, 2016
Cisco® Unified Access establishes a framework that securely, reliably, and seamlessly connects anyone, anywhere, anytime, using any device to any resource. This framework empowers all employees with advanced services, taking advantage of an intelligent, enterprise-wide network to increase revenue, productivity, and customer satisfaction while reducing operational inefficiencies across the business. Cisco Unified Access includes services-rich network edge systems and combines a core network infrastructure embedded with integration of productivity-enhancing advanced technologies, including IP communications, mobility, security, video, and collaboration services.
Tags : 
framework, network infrastructure, communications, optimization, network management, best practices, productivity
    
Cisco

Top 6 Security Use Cases for Automated Asset Inventory

Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, it’s critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices, networking, security, it management, knowledge management, enterprise applications
    
Qualys

The State of Application Delivery 2016 Report

Published By: F5 Networks Inc     Published Date: Feb 02, 2016
Let’s face it, your apps are everywhere. You have more to worry about than ever before: diverse services, cloud and datacenter locations, mission critical SaaS applications and new security threats.  In this report you’ll learn which app delivery services your peers have most broadly deployed, how they are approaching the cloud, and how they are addressing the growing sophistication of security attacks.
Tags : 
application delivery, datacenter locations, saas applications, security threats, app delivery service, it management, knowledge management, enterprise applications
    
F5 Networks Inc

TechTarget: 3 Major Challenges to Securing Your Network

Published By: Juniper Networks     Published Date: Feb 01, 2016
This new report from TechTarget identifies three specific challenges to overcome: Deploying an integrated suite of security services Closing the gap between intelligence and enforcement Centralizing visibility and management
Tags : 
    
Juniper Networks

2015 Gartner Group Magic Quadrant on Managed Security Services

Published By: IBM     Published Date: Jan 15, 2016
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, gartner, security, managed security services, magic quadrant, enterprise applications, business technology
    
IBM

Best Practices for Ensuring Security and Trust in the Cloud

Published By: Salesforce     Published Date: Jan 15, 2016
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices, knowledge management, enterprise applications, human resource technology, business technology
    
Salesforce

2015 Cyber Security Intelligence Index for Retail

Published By: IBM     Published Date: Jan 12, 2016
Analysis of cyber attack and incident data for the Retail industry from IBM's worldwide security services operations.
Tags : 
customer experience, transaction processing, omnichannel banking, consumer demands, customer interaction, shopper experience, retail
    
IBM

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps
    
Cisco

The case for security intelligence services, hosted from the cloud

Published By: IBM     Published Date: Jan 07, 2016
This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
ibm, security, intelligence, cloud, data center
    
IBM

2015 Gartner Group Magic Quadrant on Managed Security Services

Published By: IBM     Published Date: Jan 07, 2016
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements.
Tags : 
ibm, gartner, magic quadrant, security, enterprise
    
IBM

The Importance of Cyber Resilience and Incident Response for Financial Institutions

Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack, ffiec, compliance, regulations, security challenges, regulatory compliance, cyber professional services, risk assessment, vulnerability, penetration testing, crimeware, phishing, critical infrastructure
    
BAE Systems

Cloud must-haves for developers

Published By: Cisco     Published Date: Jan 05, 2016
To make the most of the cloud, developers need to have the right foundations in place. If you’re working with enough freedom - and without having to worry about things like cost and data security – then you can concentrate on creating services and innovations that move your organisation forward.
Tags : 
    
Cisco

Best Practices for Ensuring Security and Trust in the Cloud

Published By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices, knowledge management, enterprise applications, data management, human resource technology, business technology
    
Salesforce

Email Insider Threat Prevention

Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems

Hybrid Cloud: The Case for an App-Centric Strategy

Published By: F5 Networks Inc     Published Date: Dec 11, 2015
An app-centric strategy allows you to maintain control over your cloud applications--providing the same availability, performance, and security services across your hybrid environment.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility, it solutions, apps, networking, security, it management, data management, business technology, data center
    
F5 Networks Inc

Establish Your Blueprint for Centralized SSL Certificate Lifecycle Management

Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.
Tags : 
entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services, access control, application security, authentication, identity management, security management, security policies
    
Entrust Datacard
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.