sandbox

Results 1 - 25 of 54Sort Results By: Published Date | Title | Company Name

How Securing Recursive DNS Proactively Protects Your Network

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies

How Securing Recursive DNS Proactively Protects Your Network

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
    
Akamai Technologies

7 Essentials for a Successful Cloud-First Transformation

Published By: AWS     Published Date: Jun 15, 2016
Cloud in the enterprise has grown up. It’s no longer just a sandbox for developers, or a sneaky backdoor way for business units to get more IT resources fast. Now, IT leaders are seeing the big picture: cloud as the de facto model for delivering the whole of IT to the whole of the business. Increasingly, they’re adopting a Cloud-First mindset.
Tags : 
    
AWS

DLP for Tablets

Published By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : 
ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp, tablets, it systems, endpoint device growth, symnatec, integration, cisos, wireless, data management, business technology, data center
    
CDW Symantec

Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall

Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, it management
    
Cisco

ESG WP: Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall

Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security

Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
    
Cisco

Beyond the Sandbox - Strengthen Your Edge-to-Endpoint Security

Published By: Cisco     Published Date: Sep 07, 2016
This white paper explains what's needed for effective malware analysis.
Tags : 
    
Cisco

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security

Published By: Cisco     Published Date: Feb 16, 2016
Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.
Tags : 
technology, security, security management, malware analysis, network management, business intelligence, database security, productivity, service management
    
Cisco

Más allá del sandbox: fortalezca la seguridad desde el perímetro hasta los terminales

Published By: Cisco     Published Date: Apr 11, 2016
A través de los años, todos hemos escuchado hablar de soluciones simples y aparentemente mágicas que permiten resolver problemas de seguridad, incluido el uso exclusivo de la tecnología de sandboxing para combatir el malware avanzado y las amenazas dirigidas.
Tags : 
    
Cisco

5 Tips for Choosing a Next-Generation Endpoint Security Solution

Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco

White paper: Why a DNS layer matters - 30 minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More effective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Umbrella is a proven service provider whose security services are completely nondisruptive. Download this whitepaper to find out more.
Tags : 
    
Cisco Umbrella EMEA

30 Minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More efective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, frewalls, and sandboxing alone. A mere 30 minutes from now, any business can be more secure than it was before. That’s the simple reality of DNS-layer security.
Tags : 
    
Cisco Umbrella EMEA

Learn the Shortfalls of Security Sandboxing and Virtual Execution to Detect Advanced Threats

Published By: Damballa     Published Date: Apr 14, 2014
Learn the 6 shortcomings of security sandboxing and see what solutions your organization should be utilizing to detect and protect against advanced threats.
Tags : 
malware, threats, security, network based intelligence, detection, security sandboxing, virtual execution, network vulnerabilty
    
Damballa

Frost & Sullivan Report – The Forgotten Barometer: Bot Detection as an Integral Security Technology

Published By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : 
damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
    
Damballa

Resource Provisioning--Hardware Virtualization, Your Way

Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP resource provisioning combines the best features of each virtualization model by enabling BIG-IP LTM modules to run sandboxed without sharing resources, while giving them the ability to dynamical scale if/when needed. Resource provisioning is a new model in hardware virtualization, one that will change the face of application delivery and Application Delivery Controllers moving forward.
Tags : 
big-ip, resource, feature, virtualization, ltm, modules, application, delivery, controller, functionality, solution, control, data, security, wide area networks, access control
    
F5 Networks Inc

State of Threat Detection

Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Cybercriminals have been upping their game this year; the use of file-less attacks with macros and PowerShell scripts to evade preventive defenses and sandboxes mean that they are getting better than ever at using phishing, social engineering and drive-by techniques to gain initial footholds in private domains – and once they arrive, they are often avoiding detection for extended periods of time. Between April and July 2018, Fidelis interviewed over 580 security professionals from around the globe to understand how they are shifting their detection strategies and how confident organizations are in their ability to not only prevent targeted attacks – but root out threats that have by-passed traditional preventive defenses.
Tags : 
    
Fidelis Cybersecurity

Advanced Attacks Require Federal Agencies to Reimangine IT Security

Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management, network security, business intelligence, data protection
    
FireEye

A New Security Approach for Today's Advanced Attacks

Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses, information security, security threats, fireeye platform, protecting data, cyber targets, cybercriminals, prime target, midsize businesses, security, it management, best practices, business activity monitoring
    
FireEye

Bluemix Mobile Quality Assurance: Continuous Quality for Mobile Apps - Reduce Your Time-to-Feedback

Published By: IBM     Published Date: Nov 12, 2014
Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild". This loop of continuous delivery and continuous feedback is how the best mobile apps keep their users engaged and also produce the most compelling apps in the market. Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development. Featured Speaker: Leigh Williamson - IBM Distinguished Engineer You don't have to wait to get started...Start your free trial on Bluemix today! Or build something else in the Bluemix sandbox today!
Tags : 
mobile quality, mobile solutions, mobile apps, mobile development, it management, knowledge management, enterprise applications, business technology
    
IBM

A Well-Connected Sandbox

Published By: Intel Security     Published Date: Oct 21, 2015
In this brief, we’ll take a look at common use cases that show how integration between McAfee Advanced Threat Defense and other security controls from McAfee, a part of Intel Security, create a multipronged strategy designed to make enterprise defenses both more effective in detecting previously unknown malware and globally responsive when a new attack occurs.
Tags : 
mcafee, intel, security, threat, strategy, enterprise applications
    
Intel Security

Driving Innovation With Legacy Systems In FSI

Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab is a centre of innovation provided by Juniper, for business leaders who want to build network-integrated software applications and solutions quickly and securely. This is done by offering hands-on and cloud-based access to Juniper and third-party solutions including SDN sandboxes and NFV interoperability testing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout

Stand Up to Malware with an Arsenal of Layered Defenses that Identifies, Protects, and Remediates

Published By: McAfee     Published Date: Apr 25, 2014
Smart and malicious advanced malware is targeted stealthy, evasive, and adaptive. Sandboxing and other stand-alone products can't do the job on their own. This editorial brief explains why you need an arsenal of layered, integrated defenses to protect against these sophisticated threats.
Tags : 
advanced malware, targeted malware, stealthy attacks, layered malware defense, static analysis, dynamic analysis, sandboxing, emulation, heuristics, stealthy attacks, rootkits, security, it management
    
McAfee
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.