security trends

Results 51 - 75 of 140Sort Results By: Published Date | Title | Company Name

MX WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

JD WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

PL WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

NL WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

Too Much of a Good thing? Enterprise Cybersecurity Adoption Trends across Asia Pacific

Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks

What Does the Cloud Mean to Enterprise Security?

Published By: Zscaler     Published Date: May 15, 2019
Enterprise security has undergone a complete transformation as a result of rapid and sweeping changes that are remaking the way public sector organizations do business. New technologies and trends are changing the very definition of an enterprise, how and where we work, and the tools we use to do our jobs. These trends include:
Tags : 
    
Zscaler

Learn about Mobile Data Protection from an Expert

Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.

Answers to Your Mobile Device Data Protection Questions

Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.

ES WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

2018 Ponemon Institute Artificial Intelligence in Cybersecurity Study

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Ponemon Institute is pleased to present The Value of Artificial Intelligence in Cybersecurity sponsored by IBM Security. The purpose of this research is to understand trends in the use of artificial intelligence and how to overcome barriers to full adoption.
Tags : 
    
Group M_IBM Q119

Cisco Cybersecurity Series 2019: Threat Report

Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Building on the popular Threat of the Month series, Cisco researchers looked at notable 2018 cybersecurity incidents with a fresh perspective: what do they reveal about future adversary tactics? With this lens, they chose threats that best embody what defenders should expect in the year ahead. The report contains in-depth analysis, best practices, and trends to watch.
Tags : 
    
Cisco Umbrella EMEA

Security Readout: 2019 Trends for Remote and Roaming User Security

Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.
Tags : 
    
Cisco Umbrella EMEA

Next-Generation Firewalls: The Cornerstone of Next-Generation Security

Published By: Palo Alto Networks     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : 
firewall, optimization, network, environments, applications, infrastructure, security, palo alto
    
Palo Alto Networks

Virtual Roundtable: Mobile Security and Management

Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobility—but they’re also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation

Using Managed Print Services to Improve Document Security

Published By: Staples     Published Date: May 24, 2016
Today, many enterprises are struggling to manage their printing environments to ensure efficiency, security, and control. This problem has created one of the fastest-growing trends in printing today: managed print services (MPS). While keeping data safe is a growing concern for all companies, MPS software has no access to the content being printed, faxed, or scanned. Read this white paper to learn how MPS helps to protect and control printed assets and can play a big role in ensuring sensitive documents don't end up in the wrong hands.
Tags : 
it security, managed print services, outsourced print services, print management, print costs, business technology
    
Staples

Enterprise Cloud: The Changing Nature of Data Center Networking

Published By: Juniper Networks     Published Date: Feb 05, 2018
The role of IT is fundamentally changing from a cost-efficient enablement technology to a more strategic element of the enterprise. For companies born before the digital era, IT is a key player on their path to digital transformation; for more recent businesses designed with technology at their core, IT represents a foundational pillar on top of which everything else is built. With this shifting role, IT’s decades-long emphasis on TCO is being eclipsed by a new-found focus on security and automation. Whether it’s the continuous risks posed by a dynamic threat landscape, the threat of digital disruption, or an inability to keep pace with the latest trends, virtually every enterprise needs to be more agile. And, with the continued evolution of compute, storage, and applications, networks have been exposed as a bottleneck to change.
Tags : 
enterprise, cloud, data, center, networking, juniper
    
Juniper Networks

Cisco 2014 Annual Security Report

Published By: Cisco     Published Date: Apr 03, 2014
The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.
Tags : 
cisco, security, firewall, global threat, trends, applications, cloud
    
Cisco

Cisco 2014 Annual Security Report

Published By: Cisco     Published Date: Apr 03, 2014
The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.
Tags : 
cisco, security, firewall, global threat, trends, applications, cloud
    
Cisco

New demands for security and compliance in online collaboration

Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
    
Brainloop

EN WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 28, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

Report: Sponsored Report: 2018 Insider Threats Report

Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA

Gartner Reprint - Market Guide for Vulnerability Assessment

Published By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable

Vulnerability Intelligence Report 2018

Published By: Tenable     Published Date: Jan 25, 2019
"The latest report from Tenable Research analyzes vulnerability prevalence in the wild, highlighting the cyber threats that security practitioners are dealing with in practice – not just in theory. Our research shows that enterprises must triage more than 100 critical vulnerabilities a day. To better understand where to focus remediation efforts, you need to find out how cyber defenders are actually acting. Download the report now to: -See why CVSS is an inadequate prioritization metric – and why you must prioritize vulnerabilities based on actual risk -Discover vulnerability trends in the ever-expanding attack surface -Learn whether your organization has one of the most common vulnerabilities (some are more than a decade old!)"
Tags : 
    
Tenable

Internet Security Threat Report

Published By: Symantec     Published Date: Nov 19, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts.
Tags : 
internet security, istr, cybercrime, internet security trends, anti spam, anti spyware, anti virus, application security, email security, firewalls, hacker detection, high availability, security management, security policies, business technology
    
Symantec

Endpoint Security: Proactive Solutions for Networkwide Platforms

Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture, anti spam, anti virus, application security, hacker detection, network security appliance
    
ESET
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.