threat protection

Results 51 - 75 of 337Sort Results By: Published Date | Title | Company Name

New SPARC S7 Servers for Cloud & Scale-Out

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"End-to-End Security Increasing risks and cyber threats make IT security a high priority. Oracle’s SPARC S7, T7, and M7 Servers with always-on memory intrusion protection and comprehensive data encryption secure your data with no performance penalty. Security in silicon features and Oracle Solaris protect data in memory form unauthorized access and stop malware before it gets in."
Tags : 
    
Oracle PaaS/IaaS/Hardware

The Hidden Costs Of Microsoft Office 365 Security & Compliance

Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint

The Cost Of Microsoft Office 365 Security And Compliance

Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint

Inline Bypass to Keep Pace with High Speed Networks

Published By: Gigamon     Published Date: Feb 20, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon

A Whale of a Tale: How to Stop the Rising Tide of Impersonation Attacks

Published By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : 
mimecast, data breach, personalized emails, network defenses, cyber threats, fraud protection, email security, security threats, phishing, networking, security, it management, data management, business technology, data center
    
Mimecast

Email Security Uncovered: The Five Faces of IT Preparedness

Published By: Mimecast     Published Date: Apr 21, 2016
Download the new E-book, Email Security Uncovered: The Five Faces of IT Preparedness, to learn the latest trends in email security and tips on how you can boost your security confidence.
Tags : 
email, security, trends, cyber attacks, threats, cyber threats, fraud protection, email security, security threats, phishing, business technology
    
Mimecast

Cyber Resilience for Email Technical Deep Dive E-Book

Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast

Modernizing Data Protection for the Digital Business

Published By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas

5 Security Tips to Help You Work On Your Personal Device (Accounting)

Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile

5 Security Tips to Help You Work On Your Personal Device (Finance)

Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device (Healthcare)

Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, cloud security, data storage, network security, device protection, information protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile

12 Recommendations for Industrial Cybersecurity

Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability, ecostruxure plant, process automation
    
Schneider Electric

How to survive today’s onslaught of PC security threats

Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC

How to prepare for your next security breach

Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide
Tags : 
    
Lenovo - APAC

Inline Bypass to Keep Pace with High Speed Networks

Published By: Gigamon     Published Date: Dec 13, 2018
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon

Inline Bypass to Keep Pace with High Speed Networks

Published By: Gigamon     Published Date: Mar 26, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon

Inline Bypass to Keep Pace with High Speed Networks

Published By: Gigamon     Published Date: Jun 10, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper. 
Tags : 
    
Gigamon

Making the Case for a Cloud Access Security Broker

Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Cloud Access Security Brokers are one of the fastest growing security technologies today because they provide cloud service visibility, data security, threat protection, and compliance. CASBs are an effective and easy way to mitigate the top cloud security threats and security practitioners look to trusted CASB providers as strategic partners to help advise on key cloud security decisions.
Tags : 
    
Oracle Security Solutions

A Manager’s Guide to Unified Threat Management and Next-Gen Firewalls

Published By: Sophos     Published Date: Oct 07, 2015
This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.
Tags : 
unified threat management, firewalls, utm, firewall solutions, security, security technology, protection, utm systems, network security, application security, email security, encryption, internet security
    
Sophos

Webinar: Strengthen Your Email Security

Published By: Mimecast     Published Date: Dec 20, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast

On-Demand Webinar: Threats on the Inside

Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast

Challenge the traditional security approach: why change is inevitable in the cloud era 

Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.