security gateway

Results 1 - 25 of 81Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Impact: -Substantially reduced administrative time -Accelerated response and remediation process -Increased performance of cloud applications -Reduced time to investigate"
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
"The way we work has changed. More users are working remotely, satellite offices are connecting directly to the internet, and SaaS app usage is on the rise. How can your security technology keep up with all of these changes? A new category of products is emerging - the secure internet gateway. Built to solve the security challenges of today's mobile, cloud-enabled enterprise, the secure internet gateway is a critical component to securing todays workforce. View the infographic to understand the five primary reasons for the rise of this category. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Zscaler     Published Date: May 15, 2019
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.
Tags : 
    
Zscaler
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data thats gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 09, 2019
Retailers, along with many other vertical industries, seek to take advantage of the benefits of the Internet of Things (IoT) to improve customer experience management. However, quickly analyzing relevant data to inform decision-making and respond e?ectively to rapidly changing customer behaviors is challenging. The CEMOSoft* platform is designed to create opportunities, while addressing shifting demographics and an evolving IoT landscape. It o?ers a mobile customer engagement experience that can be dynamically modified on the ?y, along with the increased security and intelligence of an Intel architecture based IoT gateway and Windows 10 IoT Core. The result is an a?ordable, ?exible, scalable platform that brings ongoing customer insight to many aspects of daily operations
Tags : 
    
Intel
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: Substantially reduced administrative time Accelerated response and remediation process Increased performance of cloud applications Reduced time to investigate
Tags : 
    
Cisco Umbrella EMEA
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesnt have to be a vulnerability.
Tags : 
    
Akamai Technologies
Published By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
    
Cisco
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period. Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Todays security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. Well discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Security in a mobile, cloud- enabled World! The way we work has changed, Security must also change. Built to solve the security challenges of today's mobile, cloud- enabled enterprise, a new category of products is emerging- the secure interest gateway. Download this Infographic today to find out more!
Tags : 
    
Cisco Umbrella EMEA
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesnt have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Amazon Web Services     Published Date: Apr 11, 2018
Connecting your VPC and corporate data helps make the AWS Cloud a valuable extension of your data center. Using IPsec AWS managed VPN connections and secure gateways provides secure access to seamlessly connect to AWS hosted resources just like any other internally facing resource.
Tags : 
    
Amazon Web Services
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because its effective. Thats the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
This white paper explores the challenges associated with protecting data in todays enterprise and starts to detail how a modern data loss prevention (DLP) solution, delivered as part of a cloud-based web security gateway, can provide continuous monitoring and protection of sensitive data on mobile devices, on-premises and in the cloud.
Tags : 
data protection, security, encryption, cloud, web security
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
Published By: Symantec     Published Date: Jul 09, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud applications, swgs, secure web gateway's, saas
    
Symantec
Published By: Intel     Published Date: May 19, 2017
Intel is accelerating Network Functions Virtualization (NFV) with unique capabilities that enable optimal use of data center resources to deliver communications services.
Tags : 
nfv, security, virtualisation, data, network architecture, security management, virtualization, infrastructure
    
Intel
Published By: Mimecast     Published Date: Apr 18, 2017
"To tackle todays cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Todays threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISOs should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : 
email security, cyber threats, it security, phishing
    
Mimecast
Published By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
    
Citrix Systems
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats todays advanced malware attacks using a combination of four techniques: Advanced analytics Collective global security threat intelligence Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats todays advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data, security, data management
    
Cisco
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.