sans

Results 1 - 25 of 168Sort Results By: Published Date | Title | Company Name

"A Closer Look at Isolation: Hype or Next Gen Security"

Published By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Here’s a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of today’s reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
    
Menlo Security

(Sans) Understanding the (True) Cost of Endpoint Management Survey

Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
IT endpoint management used to be an easier game: Managers deployed user systems with custom images when employees were hired, and employees returned them on their last day at work. Even during deployment, users had minimal abilities to impact systems and devices that were centrally managed. Servers resided in physical data centers where they could be identified and accessed. Those were the days!
Tags : 
    
Group M_IBM Q418

2015 State of Application Security: Closing the Gap

Published By: Qualys     Published Date: Jun 02, 2015
This paper discusses these challenges and how they are made more complicated by the rapidly accelerating pace of development and lack of control over applications hosted in the cloud.
Tags : 
application security, sans, developers and protectors gap, builders, defenders, security
    
Qualys

2019 SANS Automation & Integration Survey

Published By: McAfee APAC     Published Date: Jun 25, 2019
i. How automation and integration can work together to unify people, process, and technology. The security community has begun to embrace automation as a solution to handling tedious, repetitive tasks, allowing skilled staff to focus on more strategic and advanced endeavors. As destructive threats continue to increase, automation balances machine-based analysis with human-based domain knowledge to help organizations achieve optimal workflows in the face of staff shortages and alert fatigue. This SANS survey explores some of the misconceptions and facts around automation and how it can become a natural extension of individuals and teams trying to do their day jobs more effectively.
Tags : 
    
McAfee APAC

5 Steps to 11ac Migration

Published By: Aruba Networks     Published Date: Nov 15, 2013
Le standard de transmission 802.11ac est en passe de devenir la norme du Wifi nouvelle génération. La vitesse gigabit et l’amélioration des capacités et de la fiabilité offertes par le standard 802.11ac aux réseaux LAN sans fil (WLAN) se révèlent être d’inestimables atouts face à la croissance rapide du nombre d’utilisateurs, d’appareils et d’applications mobiles. Que vous soyez un adepte précoce ayant déjà commencé à tout planifier ou, comme bon nombre d’entreprises, encore hésitant concernant la marche à suivre, n’hésitez pas à télécharger ce guide en cinq étapes qui vous aidera à préparer et à planifier une migration réussie vers un réseau WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
    
Aruba Networks

5 questions essentielles à se poser pour choisir un fournisseur de solutions de communication profes

Published By: Mitel     Published Date: Apr 07, 2017
Une solution hyperconnectée. Disponible 24 heures sur 24, 7 jours sur 7. Activée en permanence. Tous les acteurs économiques ont des opinions très différentes au sujet de l'environnement commercial actuel. Cependant, quelle que soit leur perception, la rapidité du monde des affaires actuel exerce une pression sans précédent sur les entreprises. La réussite ou l'échec de votre entreprise dépend de votre capacité à identifier les bonnes personnes, à communiquer, à accéder aux données et à échanger des informations rapidement.
Tags : 
    
Mitel

A Non-Geek's Guide to the Internet of Things 

Published By: SAS     Published Date: Jun 06, 2018
This A-to-Z guide includes 101 common terms related to the Internet of Things. It’s not an exhaustive list, given that the IoT and big data are evolving so quickly, but rather a quick go-to resource for the technically savvy data professional who wants to get a handle on this vast IoT and big data ecosystem. This guide for the “non-geek” does include some technical terms, but they are explained sans technical “geek speak.” We also provide context to how a term may be connected to a larger discussion by grouping terms by category.
Tags : 
    
SAS

A Non-Geeks A-to-Z Guide to the Internet of Things

Published By: SAS     Published Date: Oct 18, 2017
This A-to-Z guide includes 101 common terms related to the Internet of Things. It’s not an exhaustive list, given that the IoT and big data are evolving so quickly, but rather a quick go-to resource for the technically savvy data professional who wants to get a handle on this vast IoT and big data ecosystem. This guide for the “non-geek” does include some technical terms, but they are explained sans technical “geek speak.” We also provide context to how a term may be connected to a larger discussion by grouping terms by category.
Tags : 
    
SAS

A SANS Product Review: See the results of the SANS evaluation of the CrowdStrike Falcon® platform

Published By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike

A SANS Product Review: The results of the SANS evaluation of the CrowdStrike Falcon® platform

Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike

A SANS White Paper: SIEM Integration with Endpoint Data for Accuracy and Speed

Published By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus, application security, disaster recovery, hacker detection, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
McAfee

A SANS White Paper: SIEM Integration with Endpoint Data for Accuracy and Speed

Published By: McAfee     Published Date: Oct 14, 2013
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, network security, email security, hacker detection
    
McAfee

Aborder le dilemme de la mobilité

Published By: Lenovo UK     Published Date: Nov 09, 2018
L'augmentation de la mobilité provoque partout dans les équipes informatiques un mal de tête, avec un potentiel d'augmentation des coûts et des risques. Mais avec les ThinkPad équipés de processeurs Intel® Core™ i7 vPro™, vous bénéficiez d'une sécurité à 360 degrés, d'une durabilité fiable et d'une productivité sans compromis pour chaque périphérique. En savoir plus dans notre livre blanc. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, workforce mobility
    
Lenovo UK

Aborder le dilemme de la mobilité

Published By: Lenovo UK     Published Date: May 15, 2019
L'augmentation de la mobilité provoque partout dans les équipes informatiques un mal de tête, avec un potentiel d'augmentation des coûts et des risques. Mais avec les ThinkPad équipés de processeurs Intel® Core™ i7 vPro™, vous bénéficiez d'une sécurité à 360 degrés, d'une durabilité fiable et d'une productivité sans compromis pour chaque périphérique. En savoir plus dans notre livre blanc. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
    
Lenovo UK

Adieu Les Repreises Apres Sinistre

Published By: Pure Storage     Published Date: Sep 27, 2019
ENTREZ DANS UNE NOUVELLE ÈRE : CELLE DE LA VÉRITABLE CONTINUITÉ OPÉRATIONNELLE Merci pour tous les services rendus, chères reprises après sinistre. Sans vous à nos côtés toutes ces années, rien n'aurait été pareil. Oubliez la logique de sinistre/reprise des années 70. Adoptez un modèle de continuité opérationnelle adapté au monde d'aujourd'hui, en constante activité, un modèle : - Agile - Efficace - Simple SON NOM ? PURITY ACTIVECLUSTER
Tags : 
    
Pure Storage

Adieu Les Reprises Apres Sinistre

Published By: Pure Storage     Published Date: Oct 09, 2018
Merci pour tous les services rendus, chères reprises après sinistre. Sans vous à nos côtés toutes ces années, rien n'aurait été pareil. Oubliez la logique de sinistre/reprise des années 70. Adoptez un modèle de continuité opérationnelle adapté au monde d'aujourd'hui, en constante activité, un modèle :
Tags : 
    
Pure Storage

Architecture sans fil et sans contrôleur Aerohive

Published By: Aerohive     Published Date: Oct 23, 2014
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : 
wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity, 802.11, mobile computing, mobile data systems, mobile workers, wifi, wireless application software, wireless communications, wireless hardware, wireless infrastructure
    
Aerohive

Assessing Application Security: A Buyer’s Guide

Published By: Veracode     Published Date: Oct 26, 2016
Web application attacks are now the most frequent pattern in confirmed breaches, and organizations know that application security is key to protecting their data. But many organizations lack the resources to develop a comprehensive AppSec program, and need to look to external services. Download this guide for a straightforward, four-step method for acquiring the services you need to support a comprehensive AppSec program.
Tags : 
veracode, application security, sans, security, enterprise applications, business technology
    
Veracode

Automated Disaster Recovery with VMware SRM and Dell EqualLogic iSCSI SANs

Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualized IT infrastructures can simplify management and facilitate business continuity while helping minimize power consumption and procurement costs. Virtualization also helps organizations automate disaster recovery plans. Dell EqualLogic PS Series arrays and VMware® Site Recovery Manager (SRM) software provide integrated, cost-effective, automated site recovery and testing for enterprise data centers.
Tags : 
vmware, dell, iscsi, equallogic, site recovery manager, navicure, disaster recovery, infrastructure, business continuity, server virtualization
    
VMware Dell

Automating the SANS 20 Critical Security Controls with QualysGuard

Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard, internet security, intrusion detection, intrusion prevention, policy based management, security management, vulnerability management
    
Qualys

Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring

Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire

Building a Highly Reliable SAN

Published By: Dell Storage     Published Date: Jan 16, 2009
System reliability is a vital component in Storage Area Network (SAN) design that keeps your production environment operating and avoids data loss and downtime. But since SANs are built using both mechanical and electronic parts, component failures due to usage, environmental factors, or manufacturing defects are not uncommon. Even in completely redundant systems, controllers can fail, fans can stop operating, power supplies can burn out, and disk drives can degrade or fail.
Tags : 
dell, san, storage area networks, component failures, data loss, reliable san, building san, raid, storage, iscsi, storage management
    
Dell Storage

Building a Small Office Network

Published By: Cisco     Published Date: Jan 28, 2009
Building a small office network means starting with a foundation of switches and routers. The following guide will help you understand the difference between switches and routers and develop a clear vision for what your network foundation needs. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;}
Tags : 
small office network, cisco, switches, routers, multiple devices, multiple networks, integrated messaging, voip, networking, enterprise applications, voice over ip
    
Cisco

Building High Performance iSCSI SAN Configurations

Published By: Alacritech     Published Date: Aug 21, 2009
IP storage using Internet SCSI (iSCSI) provides opportunity for many organizations looking to extend existing Fibre Channel SANs to stranded servers, or looking to deploy Ethernet-based SANs. It can reduce costs by allowing IT managers to take advantage of existing, familiar Ethernet networks. Often the biggest complaint white new technology like iSCSI is its ability to provide more than simple functionality and connectivity.
Tags : 
internet scsi, ip storage, ip networks, fiber channel, fibre channel, san, storage area networks, iscsi, alacritech, storage, it spending, performance testing
    
Alacritech

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen, business analytics, business intelligence, business management
    
IBM
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.