mitigate

Results 1 - 25 of 269Sort Results By: Published Date | Title | Company Name

Attack Spotlight: 363 Gbps DDoS Attack

Published By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : 
akamai, cybersecurity, security, ddos, ddos attack, web security, networking, knowledge management, enterprise applications, business technology
    
Akamai Technologies

Manage, Don’t Mitigate: What You Need to Know About Bots and Scrapers

Published By: Akamai Technologies     Published Date: Sep 27, 2016
In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
Tags : 
akamai, bots, scrapers, bot traffic, security, cybersecurity, networking, knowledge management, enterprise applications, business technology
    
Akamai Technologies

Remote Access Redefined: Managing the Rise of Third-Party Users

Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies

Mitigating DDoS Attacks in Zero Seconds with Proactive Mitigation Controls

Published By: Akamai Technologies     Published Date: Dec 05, 2018
Akamai now mitigates the more than 65% of the 10,000-plus yearly DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. We attribute this growth to our proactive engagement with customers, and the ability to implement and manage proactive mitigation postures based upon their baselined network traffic. Akamai has been detecting and successfully mitigating DDoS attacks in an industry-leading SLA for 15 years. We will illustrate how Akamai continues to lead the industry with new capabilities including advanced customer traffic profiling and proactive mitigation controls to ensure the best possible results during an actual DDoS event.
Tags : 
    
Akamai Technologies

Remote Access Redefined: Managing the Rise of Third-Party Users

Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies

Cyber Security Checklist Part 2

Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic

2014 Gartner Magic Quadrant for SIEM

Published By: AlienVault     Published Date: Oct 21, 2014
AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM. So, you can go from installation to insight in days, not months. Download the 2014 Gartner MQ for SIEM.
Tags : 
mitigate, threats, detect, affordability, solution, deliver, security, visibility, siem, quadrant, it management
    
AlienVault

2015 Gartner Magic Quadrant for SIEM

Published By: AlienVault     Published Date: Aug 13, 2015
AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM.
Tags : 
    
AlienVault

Anatomy of a Botnet

Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet, business technology
    
Arbor

Anatomy of a Botnet

Published By: Arbor Networks     Published Date: Mar 07, 2011
Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Tags : 
ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot, anti virus, ddos, internet security, intrusion prevention, data protection
    
Arbor Networks

Modern DDOS Defense Toolkit: Best Practices, Advice from Arbor Networks and Gartner

Published By: Arbor Networks     Published Date: Mar 13, 2015
Having the right tools and establishing key processes in advance can help prevent or mitigate the impact of a DDoS attack. Learn more by downloading this complimentary toolkit with research and best practices from Gartner and Arbor Networks.
Tags : 
arbor, arbor networks, ddos, denial of service, ddos attack, cloud ddos protection, network security, web service security, database security, cloud computing, business technology, data loss prevention
    
Arbor Networks

Mitigate Risk of Project Failure With This Planning Guide

Published By: AtTask     Published Date: Feb 11, 2012
To protect their investment in a project, an organization needs to engage in a three step process to put a reasonable and viable risk management plan in place. This free guide walks you through the process.
Tags : 
project risk management, risk management tools, it project risk management, enterprise risk management, risk management plan, business risk management, knowledge management, employee performance, itil, productivity, desktop management
    
AtTask

Secure Critical Company Information when a Mobile Device is Lost

Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere

Rising OSHA Penalties and How You Can Ensure Safety at The Workplace

Published By: Avetta     Published Date: Sep 17, 2019
On January 23, 2019, OSHA put into effect its 2019 Annual Adjustment that raised the penalties of violation by approximately 2.5% over the 2015 revised amounts. The consequences of non-compliance with OSHA regulations extend beyond the financial penalties imposed by the regulatory authority, with the biggest risk that an organization runs is that of reputational damage. In this whitepaper you’ll learn: • The most cited occupational hazards over the last year • How to be proactive in preventing occupational hazards in your workplace • The importance of pre-qualifying third party contractors in order to mitigate risk in your organization
Tags : 
    
Avetta

How REI Uses Intelligent Threat Detection and Edge Protection on AWS with Splunk

Published By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS

New Tools For Protecting Cloud Services From Emerging Threats

Published By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS

KuppingerCole Report: Integrating Password and Privilege Management for Unix and Linux Systems

Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust

Utilizing Security Ratings for Enterprise IT Risk Mitigation

Published By: BitSight Technologies     Published Date: Feb 03, 2015
In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.
Tags : 
security ratings, it risk mitigation, cyber risk, performance metrics, network security risk, security, it management, knowledge management, best practices, business activity monitoring
    
BitSight Technologies

How to Drastically Improve Your Third-Party Security Compliance

Published By: BitSight Technologies     Published Date: Feb 20, 2015
Learn how to drastically improve your third-party security compliance and see how your organization should make adjustments to ensure you’re protected from unmitigated risks.
Tags : 
bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
BitSight Technologies

The Rising Face of Cyber Crime: Ransomware

Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security, security, enterprise applications, business technology
    
BitSight Technologies

The Top Four Business Risks of Social Media

Published By: Blue Coat Systems     Published Date: Jul 07, 2011
View this paper now to explore the top four security risks businesses face when using social networks. In addition, discover various ways to protect against and mitigate these risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring, anti spyware, anti virus, application security, hacker detection, internet security, intrusion detection, intrusion prevention
    
Blue Coat Systems

The Top Four Business Risks of Social Media

Published By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring, access control, anti spam, anti spyware, anti virus, application security, authentication, disaster recovery, encryption, firewalls, hacker detection, high availability
    
Blue Coat Systems

The Top Four Business Risks of Social Media

Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, encryption, firewalls, hacker detection, high availability, identity management
    
Blue Coat Systems UK

Why Corporate Compliance and IT Security Must Join Forces

Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : 
brainloop, technology, security, it security, end users, access control, internet security, security management, security policies, vulnerability management
    
Brainloop

How To Build A Business Case For SDDC

Published By: Brocade     Published Date: May 02, 2016
By 2020, the Software-Defined Data Center will be a requirement for 75% of the Global 2000’ according to Gartner. But is the SDDC right for you? The key to success is to plan big but start small. This Gartner report will help you understand the value of SDDC, identify the best use cases, and mitigate deployment risks.
Tags : 
    
Brocade
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.