sans

Results 76 - 100 of 164Sort Results By: Published Date | Title | Company Name

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Securing DNS to Thwart Advanced Targeted Attacks and Reduce Data Breaches

Published By: Infoblox     Published Date: Jun 18, 2015
This in-depth white paper from the SANS institute will bring you up to speed on today’s most dangerous vulnerability. In it, you will learn about: • How DNS works, and why, if unprotected, it can put your network at risk • The different kinds of DNS attacks—and who’s been hit by them • Major compliance frameworks that address the problem • Effective governance and best practices
Tags : 
infoblox, dns, attacks, effective governance, sans institute, compliance frameworks
    
Infoblox

SANS Report -- Advanced Network Protection with McAfee Next Generation Firewall

Published By: Intel Security     Published Date: Jan 20, 2015
It's important to identify the right features for your enterprise when evaluating next generation firewalls. Key points include ease of use, centralized management, integrated VPN, high availability, and the ability to stop advanced, sophisticated attacks. Read this latest SANS report as they look in depth at the McAfee Next Generation Firewall as see how it stacks up against demanding enterprise requirements.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security
    
Intel Security

SANS Report: Maturing and Specializing - Incident Response Capabilities Needed

Published By: Intel Security     Published Date: Apr 06, 2016
The SANS 2015 Incident Response survey results reveal an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Tags : 
siem, incident response, sans, continuous monitoring
    
Intel Security

Lead Life Cycle Optimization: 2008 Analysis

Published By: LeadLife Solutions     Published Date: Oct 20, 2008
80% of all leads produced by marketing are not followed up on by sales. A recent industry analyst report by CSO Insights reveals that many organizations could be at risk. Could your company be at serious risk of wasting valuable marketing dollars? Download the Lead Life Cycle Optimization: 2008 Analysis study today, and gain valuable insight on how you can more effectively optimize your organization's lead generation objectives specific to your business needs... Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}
Tags : 
leadlife solutions, lead scoring, lead nurturing, lead generation, roi, crm
    
LeadLife Solutions

The Fundamentals of a Well Built SAN

Published By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Carefully protecting and managing the storage that holds a company’s data has become one of the most important missions of today’s Information Technology (IT) organizations. With data being a company’s most valuable asset, many are turning to Storage Area Networks (SANs) as a way to meet a number of challenges.  This White Paper looks at how a well built SAN can provide real benefits to your organization and improve overall efficiency within you network.
Tags : 
lefthand networks, san, storage area networks, simplification of storage, central data storage, international computing
    
LeftHand Networks, Inc.

Aborder le dilemme de la mobilité

Published By: Lenovo UK     Published Date: Nov 09, 2018
L'augmentation de la mobilité provoque partout dans les équipes informatiques un mal de tête, avec un potentiel d'augmentation des coûts et des risques. Mais avec les ThinkPad équipés de processeurs Intel® Core™ i7 vPro™, vous bénéficiez d'une sécurité à 360 degrés, d'une durabilité fiable et d'une productivité sans compromis pour chaque périphérique. En savoir plus dans notre livre blanc. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, workforce mobility
    
Lenovo UK

Aborder le dilemme de la mobilité

Published By: Lenovo UK     Published Date: May 15, 2019
L'augmentation de la mobilité provoque partout dans les équipes informatiques un mal de tête, avec un potentiel d'augmentation des coûts et des risques. Mais avec les ThinkPad équipés de processeurs Intel® Core™ i7 vPro™, vous bénéficiez d'une sécurité à 360 degrés, d'une durabilité fiable et d'une productivité sans compromis pour chaque périphérique. En savoir plus dans notre livre blanc. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
    
Lenovo UK

LogRhythm for Gramm-Leach-Bliley Act (GLBA)

Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory
    
LogRhythm

SANS - Keys to the Kingdom: Monitoring Privileged User Actions for Security and Compliance

Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor, monitoring, attack, security, privileged users, damage, infrastructure, backup and recovery, access control, application security, auditing, authentication, disaster recovery, email security, encryption, high availability
    
LogRhythm

Security Intelligence: A Review of LogRhythm's SIEM 2.0 Big Data Security Analytics Platform

Published By: LogRhythm     Published Date: Jan 24, 2013
A SANS functional product review of LogRhythm version 6.1, conducted by senior SANS Analyst Dave Shackleford. It shows LogRhythm's SIEM toolset capable of analyzing and reporting on security data in many differed ways with easy-to-use features.
Tags : 
security intelligence, review of log rhythm, big data security, analytics platform, sans, logrhythm, siem toolset, security, it management, business technology
    
LogRhythm

SANS LogRhythm Review - Speed and Scalability Matter

Published By: LogRhythm     Published Date: Jun 19, 2018
In today’s fast-paced threat environment, speed to detect and respond is critical. Yet, according to multiple SANS surveys,1 analysts are finding it difficult to keep up with the speed in which hackers attack their systems.
Tags : 
logrhythm, scalability, hackers, systems, scripts
    
LogRhythm

SANS Reviews LogRhythm CloudAI for UEBA

Published By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : 
logrhythm, sans, cloudai, ueba
    
LogRhythm

Die Lookout Security Cloud

Published By: Lookout     Published Date: Sep 25, 2017
Cloudoptimierte, gerätegestützte Abwehr mobiler Bedrohungen Bei der Lookout Security Cloud handelt es sich um eine cloudbasierte Plattform, die sowohl breit angelegte als auch hochentwickelte mobile Bedrohungen erkennt und stoppt. Sie schützt mobile Endgeräte und Infrastrukturen vor Bedrohungen aus dem Spektrum mobiler Risiken, ermöglicht eine detaillierte Untersuchung der Bedrohungen und unterstützt eine große Anzahl an Lookout-Produkten:Was macht die Lookout Security Cloud so besonders? Die Lookout-Plattform unterscheidet sich in vier wesentlichen Punkten von anderen Herstellern aus dem Bereich „Abwehr mobiler Bedrohungen“ (Mobile Threat Defense): 1. Einzigartig umfangreiches globales Gerätenetzwerk 2. Branchenführender Mobildatensatz & Maschinelle Intelligenz 3. Umfangreiche Sicherheitsfunktionen 4. Cloudoptimierter, gerätegestützter Sicherheitsansatz
Tags : 
    
Lookout

SANS review focuses on SIEM features business demands for security and threat intelligence

Published By: McAfee     Published Date: Jul 24, 2013
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis, security, data management, business technology
    
McAfee

A SANS White Paper: SIEM Integration with Endpoint Data for Accuracy and Speed

Published By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus, application security, disaster recovery, hacker detection, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
McAfee

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager

Published By: McAfee     Published Date: Apr 16, 2014
SANS Institute's analysis team took a peek into McAfee's latest ESM software with a particular bent towards SIEM applications, and found an "easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment."
Tags : 
siem, data storage, event analysis, attacks, forensic analysis, security
    
McAfee

Need for Speed: Streamlining Response and Reaction to Attacks

Published By: McAfee     Published Date: Apr 16, 2014
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting.
Tags : 
sans, siem, information and event correlation, critical security controls, reporting, security
    
McAfee

SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation

Published By: McAfee     Published Date: Apr 16, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, security
    
McAfee

See what SANS says about McAfee Next Generation Firewall. Download the free report.

Published By: McAfee     Published Date: Aug 14, 2014
Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
McAfee

SANS Institute: Correlación de datos de eventos para la detección y corrección de vulnerabilidades

Published By: McAfee     Published Date: Sep 04, 2014
SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.
Tags : 
siem, sans, endpoint, red, correlación, integración, seguridad
    
McAfee

Inteligencia de seguridad en acción: Revisión del McAfee Enterprise Security Manager por SANS

Published By: McAfee     Published Date: Sep 04, 2014
El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.
Tags : 
siem, almacenamiento de datos, análisis de datos, ataques, análisis forense, seguridad
    
McAfee

SANS Survey: Incident Response - How to Fight Back

Published By: McAfee     Published Date: Oct 28, 2014
SANS recently surveyed incident response (IR) teams to get a clearer picture of what they're up against today. The results are in; most organizations lack formalized IR plans, they expressed a need to collect and correlate threat intelligence and SIEM tools are their focus for improving IR capabilities.
Tags : 
siem, incident response, ir capabilities, ir obstacles, threat intelligence, detection and remediation, data breach, security
    
McAfee
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.