defense

Results 201 - 225 of 444Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Jun 10, 2013
Nothing puts your organization at risk like weak network security. Weve got the people, processes and partners to deploy your first line of defense.
Tags : 
cdw, threat detected, denial of service, viruses, worns, rootkits, sensitive data, network.
    
CDW
Published By: CDW     Published Date: Jun 10, 2013
Defense in depth isn't just a product or a process. Its the constant practice of: protection, detection, and reaction.
Tags : 
cdw, defense in depth, protection, detection, reaction, anti spam, anti spyware, anti virus
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data
    
CDW
Published By: McAfee     Published Date: Jan 23, 2013
A criminal industry develops. This paper explores bot evolution, its global prevalence, whos at risk, a look forward and combating bots using Global Threat Intelligence.
Tags : 
botnets, bots, defense in depth, threat prevention, advanced attacks, malware, access control, anti spam
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.
Tags : 
vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases, anti spam, anti spyware
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Windows 8 includes many new security features, such as secure password storage, secure boot functions, anti-malware defenses, and even enhanced reputation capabilities. Will these features be enough to mitigate risks to users and corporate networks?
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: Plex Systems     Published Date: Feb 26, 2014
Cloud computing has the potential to completely revolutionize the A&D industry, with immediate cost gains from greater supplier collaboration and visibility, more effective demand management, and higher levels of compliance and quality management.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity
    
Plex Systems
Published By: Plex Systems     Published Date: Feb 26, 2014
Aerospace and Defense manufacturers manage complex programs. With cyclical demands and tight time-to-market expectations, manufacturing is both an art and a science. You need an ERP system with close integration between engineering and manufacturing operations while supporting regulatory compliance.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity
    
Plex Systems
Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Groups fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this years report include: Lack of skilled personnel is the greatest inhibitor to IT securitys success 77% of networks were breached last year the first decline in five years! 12% of a typical enterprise IT budget is spent on security 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: LogRhythm     Published Date: Aug 08, 2016
The first two installments of the Cyber-threat defense report began the process of looking beyond major breaches and the never ending evolution of cyber-threats to better understand what IT security teams are doing to defend against them.
Tags : 
security, technology, best practices, information technology, cyber threat, business analytics, business integration, business intelligence
    
LogRhythm
Published By: Infosys     Published Date: May 22, 2018
When one of our client's most strategic web applications was hacked, it was something of a wake-up call. Application security is surprisingly often an afterthought, and serious investment is only sometimes made when security breaches are discovered. Effectively, companies try to close the stable door after the horse has bolted. However, preventive security maintenance of apps is far more cost-effective and less damaging than reactive security. Our client therefore asked us to put in place an app security testing program early in the development life cycle to reduce the chances of similar breaches in the future.
Tags : 
security, technology, data, app, device, web
    
Infosys
Published By: SafeNet     Published Date: Sep 08, 2010
Find out about the most effective defense against MitB attacks.
Tags : 
safenet financial services, secure browser authentication, man-in-the threats, mitb, man-in-the-middle, mitm, security, auditing
    
SafeNet
Published By: SafeNet     Published Date: Sep 08, 2010
This paper will provide insight into the top five threats to the online banking in the financial services industry and SafeNet's recommended solutions for a defense that not only provides a secure transaction environment for customers but also satisfies stringent government and industry compliance regulations.
Tags : 
safenet financial services, online banking threats, cyber attack, compliance, financial services providers, authentication, phising, application security
    
SafeNet
Published By: Micro Focus     Published Date: May 03, 2011
The explosion of data and consumer mobility trends put more pressure than ever on the back office systems across telecommunications companies, defense, transportation, healthcare, financial services and more. Using selected customer scenarios this webcast describes how VisiBroker, the market leading CORBA ORB, is the most cost effective, high performance solution to bring together tens of thousands of end points across distributed applications.
Tags : 
micro focus, visibroker, corba environment, distributed application, infrastructure, internetworking hardware, interoperability, application integration
    
Micro Focus
Published By: Dell SecureWorks     Published Date: Apr 09, 2011
Read this whitepaper to learn how Dell SecureWorks' multi-phase Penetration testing can help you obtain a true understanding of your security and risk posture so that you can strengthen your defenses and prevent a successful attack.
Tags : 
intrusion prevention, dell, secureworks, attacks, network security, cyber risk, cyberrisk, penetration
    
Dell SecureWorks
Published By: Cisco     Published Date: Jul 11, 2016
Transformation doesnt happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Apr 05, 2016
With cybercrime and security breaches sharply on the rise, protecting valuable information from cyberattacks is an ongoing challenge for companies. In this increasingly insecure world, your critical information deserves the best protection, making the database and surrounding infrastructure the best line of defense. Protect your data better through evolving your approach to data security. Learn about three key steps to reinvent the security of your surrounding infrastructure to create an information fortress by protecting your valuable data at its source.
Tags : 
information management, security, best practices, information secuirty
    
Oracle
Published By: McAfee EMEA     Published Date: Nov 15, 2017
When it comes to fighting modern malware, there is no silver bullet that can guard against every threat every time. Thats why McAfee takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, mcafee, cyber threat, technologies, innovation, analytics
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security and risk management leaders should know that while IDPSs are being absorbed by firewall placements at the perimeter, they give the best protection. They're also responding to pressure from uptake of other threat defense solutions, and providing credible internal and cloud placement options.
Tags : 
magic quadrant, intrusion, detection, prevention, systems, cloud, internal
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
McAfee advanced threat defense, McAfee Threat Intelligence Exchange, and McAfee enterprise security manager can cut through the grey to provide a clear understanding of risk.
Tags : 
mcafee, webinar, security, product, technology
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
    
McAfee EMEA
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.