security technologies

Results 201 - 225 of 235Sort Results By: Published Date | Title | Company Name

Choosing a Superior Cybersecurity Solution

Published By: iboss     Published Date: Jan 22, 2018
Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.
Tags : 
iboss, cybersecurity, intrusion detection, security, cyberattack, network security, hacker detection, intrusion prevention, ssl, wireless security, data protection
    
iboss

Protecting Your Website with Always on SSL

Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl, security
    
Symantec

Web Application Security: The Truth About White Box Testing vs. Black Box Testing

Published By: Cenzic     Published Date: Nov 11, 2008
This paper explores the role of white box vs. black box testing. White box testing technologies have a definite but limited use and value. From a Web application security perspective it must be understood that significant blind spots come with white box testing. Ultimately white box testing is not sufficient to secure your applications: simply put organizations that rely solely on white box technologies will be exposed to vulnerabilities in their applications, thus making it an ineffectual method of testing real-world risks. This paper will demonstrate black box or dynamic testing is ultimately the appropriate solution for “truly” securing Web applications.
Tags : 
cenzic, web application security, white box texting, black box testing, secure web applications, cenzic, security, compliance, web service security, pci compliance
    
Cenzic

KEMP LoadMaster Support for Windows Terminal Services

Published By: KEMP Technologies     Published Date: Aug 04, 2008
KEMP Technologies LoadMaster Application Delivery Controller and Server Load Balancer appliances provide full support for Microsoft Windows Terminal Services (WTS). The LoadMaster WTS capabilities helps organizations maximize the efficiency and effectiveness of their networks. KEMP delivers this at an affordable price.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, servers, application performance management, windows server
    
KEMP Technologies

A Guide to Application Delivery Optimization and Server Load Balancing for the SMB Market

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s small-to-medium sized businesses (SMB) are undergoing the same IT evolution as their enterprise counterparts, only on a smaller scale. For SMBs, website reliability, flexible scalability, performance and ease of management are as essential to SMB website infrastructure as they are to an enterprise. It’s fare to say that these capabilities are an important operational imperative for businesses of all sizes.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, servers, small business networks, application performance management
    
KEMP Technologies

Optimizing Web and Application Infrastructure on a Limited IT Budget

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s web and application infrastructure continues to expand applications for e-commerce, and communications with customers, partners and internal employees. For those responsible for deploying, maintaining and supporting these networked applications, there is an increasing need to get the highest performance out of datacenter equipment, while simplifying the complexity that causes excess overhead and unnecessary costs.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, infrastructure, networking, spend management
    
KEMP Technologies

LoadMaster Application Delivery Controller Security Overview

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, small business networks
    
KEMP Technologies

KEMP Technologies’ LoadMaster Products Reduce Datacenter Power Consumption

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Kemp Technologies’ LoadMaster Application Delivery Controller (ADC) and Server Load Balancer (SLB) appliances are low energy consumers. Reducing energy use at the point of consumption, LoadMaster provides benefits to other areas by reducing load on power and cooling facilities, which in turn reduce their own energy use.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, energy, green, servers, green computing, power and cooling
    
KEMP Technologies

Small-to-Medium Sized Business versus Enterprise Requirements for Application Delivery Optimization

Published By: KEMP Technologies     Published Date: Aug 04, 2008
The Web experience is changing for consumers. While the National Retail Federation reports that over 90 percent of customers research products on the Web before purchasing, a single product photo and description is not enough to close the sale. Through broadband, with Flash and JPEG product images, retailers are providing information to potential customers which will improve the likelihood of closing the sale.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, retail, ecommerce, e-commerce, ebusiness, e-business, small business networks
    
KEMP Technologies

SSL Everything: Protect All of Your Website, Not Just A Few Parts

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Chances are, if you’re utilizing SSL, you’re not utilizing it to its full potential. SSL is a powerful technology that can help organizations protect their data as well as their users. While the technology behind SSL is solid, the most common best practices for its implementation do not take full advantage of the benefits that SSL brings. And this may be inadequate to provide proper security to the modern web application environment.
Tags : 
ssl, load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, web security, secure socket layer, security, web service security
    
KEMP Technologies

The Sky is the Limit for the SkyVantage Network Powered by KEMP’s High-Availability Load Balancer

Published By: KEMP Technologies     Published Date: Aug 04, 2008
SkyVantage, a provider of hosted airline reservation services, provides an industry-leading airline reservation and management system for specialized small-to-medium and start-up airlines, as well as airline charter organizations. In an industry with high operating costs and tight competition, SkyVantage was founded based on the need to deploy a web-based, lower-cost software management solution to the airline industry, without sacrificing features.
Tags : 
software management, skyvantage, load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, high availability
    
KEMP Technologies

REDPLAID Delivers Reliable Infrastructure for Hosting SMB’s Web Applications

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, network performance, network performance management, small business networks, colocation and web hosting
    
KEMP Technologies

The Silent Battlefield: America's Alarming Vulnerability to Cyber Attack

Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military, compliance, hacker detection
    
HP - Enterprise

Best Practices for Implementing a Security Process

Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will look at aligning security processes, the human element of security, with the latest security technologies - creating a secure barrier against today's most insidious threats.
Tags : 
messagelabs symantec hosted services, best practices, security process, security technology, threats, anti-virus, anti spam, anti spyware, anti virus, application security, business continuity, internet security, security management
    
Symantec.cloud

PCI Compliant Data Centers

Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage

Controlled and Secure Access to Public and Private Clouds

Published By: McAfee     Published Date: Oct 28, 2013
Watch this 3 minute video for a unique way of accessing public and private cloud services without losing governance and situational awareness.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, cloud computing
    
McAfee

Combining Modern Authentication Needs with Identity and Access Management

Published By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, it management, data management, virtualization, cloud computing, infrastructure
    
McAfee

Deploy and Maintain Thousands of Security Devices in Seconds

Published By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, security, storage
    
McAfee

Redefining Next Generation Security with Situational and Context Awareness

Published By: McAfee     Published Date: Apr 25, 2012
The best protection against today's network threats are solutions that are adaptable, dynamic, easily managed, contextually-aware and affordable. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, security, storage
    
McAfee

Optimized and Uninterrupted Network Traffic

Published By: McAfee     Published Date: Oct 28, 2013
Eliminate high costs associated with MPLS and BGP with a new approach. This short video will show how secure and resilient connectivity between global sites is possible while increasing network bandwidth and quality of service.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, networking
    
McAfee

Deploy and Maintain Thousands of Security Devices in Seconds

Published By: McAfee     Published Date: Oct 28, 2013
View this demonstration to see how masses of security devices in complex and geographically diverse organizations can be operated from one single point of operations in a way that is cheaper, easier, faster, and safer.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, networking, security
    
McAfee

Unique Security Challenges in the Datacenter Demand Innovative Solutions

Published By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDC’s Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : 
security challenges, data center demand, innovative solutions, security technologies, innovative solutions, networking, data center
    
Juniper Networks

Securing the “Internet of Things” Survey

Published By: Norse     Published Date: Mar 10, 2014
Learn about how the internet has changed over the past year and see how these major changes have affected security protocols and how your organization should respond to keep current in a world that is run by the Internet.
Tags : 
norse, sans, internet of things, cybersecurity, nstac, industrial internet, cyber-physical systems, emerging technologies, survey, malware, networking, security, software development
    
Norse

Cloud Computing: Changing the Role and Relevance of IT Teams

Published By: Cisco     Published Date: Feb 13, 2015
Get CIO perspectives on the changing roles and relevance of IT teams in this report.
Tags : 
cloud computing, security, compliance vulnerabilities, visibility, service level agreements, cloud technologies, data management, data center
    
Cisco

The Secure Cloud

Published By: QTS Data Centers     Published Date: Jun 09, 2015
In this white paper, 451 Research looks into the cloud to see what’s driving the purchase of cloud security technologies.
Tags : 
cloud security technologies, cloud security purchases, bring your own device, mobile device management, security, it management, wireless, migration
    
QTS Data Centers
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.