network security

Results 101 - 125 of 1103Sort Results By: Published Date | Title | Company Name
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network teams role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this years survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: IBM APAC     Published Date: Aug 22, 2017
For any sized organization, securing data and networks today is a daunting task. New vulnerabilities are discovered almost daily; new malware strains are developed as soon as a detection script is written for the old ones; and cybercriminals can buy prepackaged exploit kits on the Darknet backed by professional support teams. As a security analyst, you need more than a few point solutions designed to defend the networks edge. You need visibility, perspective and an innate sense of when things just dont seem right.
Tags : 
ibm, qradar, cloud, analytics, flexibility, scalability, organization
    
IBM APAC
Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposuresdepending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC
Published By: Savvis UK Limited     Published Date: May 14, 2013
Savvis has been hosting eCommerce platforms for nearly two decades. Internet retailers including easyJet and Hallmark Digital trust us to power their online success. Savvis offers a comprehensive portfolio of infrastructure, network and application management across the eCommerce ecosystem. No matter what you sell or where you are along the eCommerce journey, we can support your commercial goals with the speed of implementation, accessibility, security and affordability of a retail-ready cloud environment, with our Virtual Private Data Centre. Combined with our global data centre footprint and network options ranging from Tier1 public IP access to private, low-latency connectivity, the VPDC offers a resilient, made-to-measure solution for any eCommerce application.
Tags : 
virtual, private, data centre, it foundation, ecommerce, platforms, internet retailers, online, virtual private data centre, security, affordability
    
Savvis UK Limited
Published By: Arbor     Published Date: Mar 13, 2014
In this white paper, well examine how the Pravail portfolio from Arbor Networks can empower your network operations and security teams to more efficiently help protect the integrity and availability of your enterprise network against advanced attacks.
Tags : 
arbor, arbor networks, enterprise network, global attack, connecting workforces, internal operations, growing revenue, retaining customers, increase competitive edge, cyber attackers, pravail portfolio, pravail solutions, attack intelligence, enterprise defense, security, infrastructure, best practices, business intelligence, secure content management
    
Arbor
Published By: Juniper Networks     Published Date: Sep 10, 2014
Download this Ponemon Institute Report on the value of emerging network security technologies. Get the views of 4,500 IT security practitioners and find out which of the rapidly emerging technologies really are effective.
Tags : 
network security, security technology, emerging technology, juniper, best practices
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 28, 2014
To understand why an open, scalable network architecture is essential for enhanced IT security in the cloud era, get our eBook. Read how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
cloud, data protection, security, security breaches, safe virtual environment, risk, network security
    
Juniper Networks
Published By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, networking, 802.11, mobile computing, mobile data systems, mobile workers, wireless communications, wireless hardware, wireless infrastructure
    
Aerohive
Published By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, networking, 802.11, mobile computing, mobile data systems, wifi, wireless application software, wireless communications, wireless hardware, wireless infrastructure
    
Aerohive
Published By: Venafi     Published Date: Jul 27, 2015
According to Gartner, by 2017, more than ?50% of network attacks will use encrypted SSL/TLS. Most organizations cannot decrypt and inspect SSL communications to detect these threats, which creates security blind spots.
Tags : 
ssl traffic, venafi, tls, security blind spots, it security, it security solutions, it management, knowledge management, enterprise applications
    
Venafi
Published By: Vectra Networks     Published Date: Nov 05, 2015
Intrusion Detection Systems have ceased to live up to their name and have lost their ability to spot todays sophisticated intrusions. Consequently, cyber attackers are taking advantage of it by launching more evasive and strategic threats that spread rapidly within networks. And security teams are left without the proper tools or insight to identify intrusions that pose the biggest risk.
Tags : 
intrusion detection systems, cyber attackers, sophisticated intrusions, intrusion detection, security
    
Vectra Networks
Published By: Level 3     Published Date: Mar 04, 2016
Are You Prepared For Complex Attacks On Your Network? Learn how advanced hybrid security solutions meet you where you are and get you to the level of security you need.
Tags : 
level 3 communications, hybrid security, best practices, it security, hybrid security architecture, ddos, networking, security, it management, enterprise applications, data management
    
Level 3
Published By: Level 3     Published Date: Mar 04, 2016
Its time to think differently about your network security. Forget the fragmented and reactive approach youve used in the past with patchwork point solutions under separate IT silos. According to Frost & Sullivans report, you need a holistic approach to network security.
Tags : 
level 3 communications, frost and sullivan, network security, best practices, isp, malware protection, apt protection, networking, security, it management, data management
    
Level 3
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges youll face from the combination of mobile devices and cloud-based apps. In this IDC report, youll examine enterprise mobility management technologyoffered through solutions such as the Microsoft Enterprise Mobility Suiteand how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: Provisioning and configuration devices and usersacross platforms Ensuring only authorized users access data with identity system integration Ensuring only compliant devices access the corporate network through conditional access policies Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology, business intelligence, business management
    
Microsoft
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper Networks works with leading companies around the world to increase the service agility of their networks. With simple, open, and smart networks, financial services firms can bring innovative new services to market faster and at lower costs. They can leverage Junipers expertise, experience, and partner ecosystem to build agile, service-aware networks. Juniper is a leader in high-performance, highly reliable routing, switching, and security, with solutions deployed in some of the most complex networks in the world across banking, capital markets, and insurance providers. A broad ecosystem of solution, services, delivery, and consulting partners can provide businesses with a complete offering that enables innovation.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If youre like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: D-Link     Published Date: Oct 27, 2017
See how to facilitiate faster information sharing and accelerate innovation with a core network built on integration and customer support
Tags : 
networking, switching, switches, infrastructure, core network, surveillance, security, reliability, integration, power over ethernet, poe, smart switches
    
D-Link
Published By: D-Link     Published Date: Oct 27, 2017
See how to handle increased traffic and evolving technologies of your organization by optimizing at the core - your network infrastructure
Tags : 
networking, switching, switches, infrastructure, core network, surveillance, security, reliability, integration
    
D-Link
Published By: D-Link     Published Date: Oct 27, 2017
Identify the top 10 reasons you should use smart PoE switches to improve your network capabilities and seamlessly integrate your infrastructure - from switches to surveillance and access points
Tags : 
networking, swtiching, switches, infrastructure, core network, surveillance, security, reliability, integration
    
D-Link
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.