web threats

Results 1 - 25 of 192Sort Results By: Published Date | Title | Company Name
Published By: Gigaom     Published Date: Oct 17, 2019
This free 1-hour webinar from GigaOm Research brings together experts in cybersecurity and automated remediation, featuring GigaOm analyst Jon Collins and a special guest from Puppet, Jonathan Stewart. The discussion will focus on how enterprise security and operations teams can significantly enhance their response to security threats via a collaborative, automated approach to resolution. Cybersecurity often feels like an asymmetric battle while on one side, cybercriminals appear to manage their efforts efficiently on the dark web, enterprises often deal with the consequences individually, reliant on manual processes and tools. So, what can we learn from the perpetrators about how to coordinate a response to security threats when, or before, they happen? In this 1-hour webinar, you will learn: How cybercriminals and hackers work together to create and disseminate security threats What current challenges are faced by enterprises as they look to respond What options exist to deal wi
Tags : 
    
Gigaom
Published By: AWS     Published Date: Oct 09, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousnessand scopeof the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Impervas SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions havent caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that dont allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attackssuch as synchronized (SYN) floods and User Datagram Protocol (UDP) floodsand Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Impervas WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Impervas sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web servers IP
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousnessand scopeof the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Impervas SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions havent caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that dont allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: Gigaom     Published Date: Oct 02, 2019
Hyperconvergence is now at the core of many IT infrastructures. No matter the size of your organization, you need to protect infrastructure, applications, and the data necessary to run your business and compete at its best. There are several solutions to protect your data, retrieve and reuse it when necessary. Ease of use, speed, and efficiency are at the base of modern backup tools, but there is now more to take into account if you want to transform a liability into an asset. In this free 1 hour webinar, GigaOm analyst Enrico Signoretti will be joined by Alan Conboy from Scale Computing and Jon McCarrick from Acronis to talk about modern data protection strategies and solutions aimed at simplifying infrastructure while increasing the value of data. In this 1-hour webinar, you will discover: Why data protection should be integrated into your HCI Data protection options: Snapshots, backups, DR and beyond New threats and new solutions Backup as a tool to make more of your data
Tags : 
    
Gigaom
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe its time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a layered defence that will give you the ability to quickly respond to breaches. We will cover: - The evolving threat landscape and why prevention-only strategies eventually fail - How to build a strong first line of defence to reduce exposure to threats - Protect your last line of defence with retrospective security - A quick demo of how Cisco Umbrella and AMP for Endpoints work together to contain, detect and remediate threats in real time - An overview of how Incident Response Services can help you with the skills you need to manage a breach
Tags : 
    
Cisco Umbrella EMEA
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions havent caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that dont allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: Flexera     Published Date: May 30, 2019
"Cloud spend (IaaS, PaaS and SaaS) is growing 7 times faster than IT spend, and the pressure to innovate has never been greater. Todays IT departments have to both sustain existing operations and compete through innovationbut managing the IT tangle can starve investment in your future. How do you manage todays Cloud First movement with one eye on the future? Cloud First: threat or an opportunity?an exclusive webinar from Flexera VP Presales Cynthia Tackettwill discuss what a Cloud First strategy really means for the future of ITAM and how we must adapt to future-proof our careers in the ITAM profession. Youll learn about cloud trends, challenges and threats to your career, opportunities and your career path into the cloud, and how to future-proof your career. Register today! "
Tags : 
    
Flexera
Published By: Flexera     Published Date: May 29, 2019
"Cloud spend (IaaS, PaaS and SaaS) is growing 7 times faster than IT spend, and the pressure to innovate has never been greater. Todays IT departments have to both sustain existing operations and compete through innovationbut managing the IT tangle can starve investment in your future. How do you manage todays Cloud First movement with one eye on the future? Cloud First: threat or an opportunity?an exclusive webinar from Flexera VP Presales Cynthia Tackettwill discuss what a Cloud First strategy really means for the future of ITAM and how we must adapt to future-proof our careers in the ITAM profession. Youll learn about cloud trends, challenges and threats to your career, opportunities and your career path into the cloud, and how to future-proof your career. Register today! "
Tags : 
    
Flexera
Published By: Flexera     Published Date: May 29, 2019
"Cloud spend (IaaS, PaaS and SaaS) is growing 7 times faster than IT spend, and the pressure to innovate has never been greater. Todays IT departments have to both sustain existing operations and compete through innovationbut managing the IT tangle can starve investment in your future. How do you manage todays Cloud First movement with one eye on the future? Cloud First: threat or an opportunity?an exclusive webinar from Flexera VP Presales Cynthia Tackettwill discuss what a Cloud First strategy really means for the future of ITAM and how we must adapt to future-proof our careers in the ITAM profession. Youll learn about cloud trends, challenges and threats to your career, opportunities and your career path into the cloud, and how to future-proof your career. Register today! "
Tags : 
    
Flexera
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity
Published By: Darktrace     Published Date: Apr 02, 2019
The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of new technologies - from cloud services to the Internet of Things - has expanded the attack surface and introduced new entry-points through which attackers can gain a foothold. This, combined with the ready availability of exploit kits on the Dark Web, has led to the vicious circle of the SOC, where incident responders are so busy fire-fighting that they rarely have time to implement the critical patches that would prevent the problem at source. As security teams struggle to keep up with the rising volume of routine attacks, a new generation of cyberthreat has also emerged, characterized in large part by fast-moving threats that make an impact well before humans have time to respond. Thes
Tags : 
    
Darktrace
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customers trust in your brand. The typical business pain points per the above scenario are always like: Latency While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: Challenges that Magic Video faced before implementing Alibaba Clouds solutions How Alibaba Clouds solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Recorded Future     Published Date: Feb 13, 2019
There has been much speculation (not to mention exaggeration) over recent years about the fabled dark web. Weve heard how this shady underworld is the refuge of the cybercriminal elite, and even nation-state threat actors. That this is their Wolfs Lair, where they gather to plot the breaching of businesses, the downfall of governments, and the hacking of celebrities. As with much mainstream reporting of technology, and cyber threats in particular, theres a grain of truth here. This less accessible and more volatile corner of the internet as we know it does offer those with less honourable motive a secret marketplace for their wares. The confusing terminology around what the dark web is or isnt shouldnt be a barrier to defenders realizing the anonymous communities, and how it can be used to produce valuable threat intelligence.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
There has been much speculation (not to mention exaggeration) over recent years about the fabled dark web. Weve heard how this shady underworld is the refuge of the cybercriminal elite, and even nation-state threat actors. That this is their Wolfs Lair, where they gather to plot the breaching of businesses, the downfall of governments, and the hacking of celebrities. As with much mainstream reporting of technology, and cyber threats in particular, theres a grain of truth here. This less accessible and more volatile corner of the internet as we know it does offer those with less honourable motive a secret marketplace for their wares. The confusing terminology around what the dark web is or isnt shouldnt be a barrier to defenders realizing the anonymous communities, and how it can be used to produce valuable threat intelligence.
Tags : 
    
Recorded Future
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecasts Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. Its every-thing and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS
Published By: Lookout     Published Date: Dec 13, 2018
Mobile security is making the role of todays CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organizations overall security posture. Learn how CrowdStrike Falcon Discover enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: Monitoring and searching metadata to improve security posture Reviewing the rate of the Amazon EC2 instances launched over time Gaining additional context surrounding alerts"
Tags : 
    
AWS - ROI DNA
Published By: AWS     Published Date: Oct 30, 2018
How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Abstract: Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
snapper, data, amazon, cwp, storage
    
AWS
Published By: AWS     Published Date: Oct 30, 2018
Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
data, amazon, cwp, storage
    
AWS
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.