network security

Results 176 - 200 of 1145Sort Results By: Published Date | Title | Company Name

Building Trust in a Cloud Sky

Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services, sensitive data
    
McAfee EMEA

Business Continuity And Breach Protection

Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
    
Symantec

Business-Driven Information Security: The Key to Effective Executive Communication

Published By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : 
network security, intrusion prevention, security management, business management, information management, data security, preventsys, security, authentication
    
Preventsys

Buyer's Checklist: What to consider when refreshing your enterprise network (Brocade agnostic)

Published By: Juniper Networks     Published Date: Aug 08, 2017
Staying one step ahead of competitors requires a secure, reliable network that has everything it needs to remain agile and resilient in the years to come. When refreshing your enterprise network, keep the following considerations top of mind: 1) How do you manage your network? 2) Is security integrated throughout your network? 3) Does your current network vendor really have a plan for your network? 4) What are your options when supporting your network in the future?
Tags : 
    
Juniper Networks

Buyer's Criteria for Advanced Malware Protection

Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data, security, data management
    
Cisco

Buyer's Criteria for Advanced Malware Protection

Published By: Cisco     Published Date: Jun 02, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution.
Tags : 
malware protection, network security, it security, application security, anti spyware, anti virus
    
Cisco

Buying Criteria for Next-Generation Network Security

Published By: Cisco     Published Date: Sep 08, 2016
This white paper will help you decide on what network security items you need to purchase.
Tags : 
    
Cisco

BYOD und mehr: Der produktive Nutzen von BYOD

Published By: Aerohive     Published Date: Aug 03, 2015
Dieses Whitepaper dient als Leitfaden und erläutert die nötigen Anforderungen an Konnektivität und Produktivität, um Ihr Netzwerk auf die Mobilitätswelle vorzubereiten.
Tags : 
mobility, mobility technology, wireless. connectivity, network, security, byod, network architecture, network management, mobile computing, mobile data systems, mobile workers, smart phones, wireless infrastructure, wireless phones, wireless security
    
Aerohive

Calm in the Center of the Storm

Published By: Juniper Networks     Published Date: Aug 10, 2017
A Scalable Data Center Network for the Data Tsunami Digital Transformation and other changes drive vast and innumerable new data flows through the business, and increase pressure on IT to continually, quickly, and efficiently address a broad array of new demands. IT needs a network that empowers the business but is too often hampered by it instead. Network management as most practice it now is too complex and inefficient. The solution is automation.
Tags : 
digital transformation, virtual infrastructure, network, data, automation, security, nemertes
    
Juniper Networks

Campus Network Design Guide

Published By: Juniper Networks     Published Date: Jul 29, 2019
Get the Secrets to Designing a Resilient, Secure Campus Network. Download our 2019 buyer's guide to learn more. It’s challenging to design, deploy, and manage a campus network. Adding to this, aging equipment can slow your network down and hinder your ability to advance IT innovations that help keep your business competitive. What's more, the proliferation of devices and IoT sensors can expose your network to cyberattacks and other security threats. Our 2019 Buyer’s Guide can help you modernize your campus network, reducing OpEx while delivering a richer, more reliable user experience. Learn about the key trends and challenges that shape your campus network design and the essential considerations that should influence your selection process.
Tags : 
multiprotocol label switching (mpls), switching, ethernet network services, data center design, data center management
    
Juniper Networks

Campus Networking Requirements

Published By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA

Campus Switching Network Security

Published By: Cisco     Published Date: Sep 15, 2015
TechWiseTV: Put the Network Back in Network Security
Tags : 
network, security
    
Cisco

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM

Can Your Security Keep Up With 70,000 New Malware Strains a Day?

Published By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, networking, security, wide area networks, wide area networking, enterprise, protocals, mpl
    
CenturyLink

Case Study - OEM's Increased Global Network Performance

Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Faced with degrading network performance and the need to drive global expansion, Measurement Specialties partnered with Virtela to design, implement and manage a high-performance, multi-carrier MPLS network across all twelve of their global sites.
Tags : 
virtela, network performance, multi-carrier mpls network, original equipment manufacturers, point-to-point connections, network and security solutions, network management, network performance management, test and measurement, network security appliance
    
Virtela Communications, Inc.

Case Study: Aligning Technology with Business Process

Published By: Cisco     Published Date: Jun 12, 2014
U.K. energy contractor reduces total cost of ownership while improving customer service and adopting new ways of working.
Tags : 
cisco, unified communications solutions, borderless network infrastructure, cisco ironport security, case study, access control, anti spam, anti spyware, anti virus, application security, email security, internet security, telecom
    
Cisco

Case Study: Building Supplies Distributor Shifts Web Security to Cloud MacArthur

Published By: Cisco     Published Date: Jun 12, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security, internet security, network security appliance, web service security, cloud computing, infrastructure, design and facilities
    
Cisco

Case Study: Building Supplies Distributor Shifts Web Security to Cloud MacArthur

Published By: Cisco     Published Date: Jun 16, 2014
A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth
Tags : 
cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, business continuity, email security, network security appliance, security management, web service security, cloud computing, infrastructure, design and facilities
    
Cisco

Case Study: Red Team Exercise

Published By: illusive networks     Published Date: May 18, 2016
This case study serves as a summary of illusive networks’ Red Team exercise with a global tech leader. The fact that a system employing illusive networks' Deceptions Everywhere® technology can stand up to a highly-trained Red Team, with the odds stacked against it, demonstrates how you can protect your systems against sophisticated attackers. Learn why a threat deception approach to cybersecurity, focused on the humans behind the attacks, is the most effective way to combat modern cyber threats.
Tags : 
    
illusive networks

CDW- Threat Detected

Published By: CDW     Published Date: Jun 10, 2013
Nothing puts your organization at risk like weak network security. We’ve got the people, processes and partners to deploy your first line of defense.
Tags : 
cdw, threat detected, denial of service, viruses, worns, rootkits, sensitive data, network., security
    
CDW

CEO Disconnect is Weakening Cybersecurity

Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation

Certificate Management: The Ultimate Guide

Published By: DigiCert     Published Date: Jul 16, 2017
Best practices for SSL/TLS admins managing 100s or 1000s of certs
Tags : 
digicert, certificate management, public key infrastructure, ssl, network security, certificate lifestyle
    
DigiCert
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.