defenses

Results 101 - 125 of 136Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to learn why traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
traditional security, detection, blocking, protection, security model, threat landscape, cybercrime, networking
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Cisco AMP for Endpoints is a cloud-managed endpoint security solution that provides the visibility, context and control to not only prevent cyberattacks, but also rapidly detect, contain, and remediate advanced threats if they evade front-line defenses and get inside—all cost-effectively, without affecting operational efficiency, and before damage can be done.
Tags : 
    
Cisco
Published By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : 
security operations, deployment, service delivery, problem management, security
    
IBM
Published By: Rapid7     Published Date: Oct 09, 2013
Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.
Tags : 
gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection, network security
    
Rapid7
Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
    
Cisco
Published By: Thawte     Published Date: Oct 05, 2015
When it comes to protecting your website and customers from attack, knowledge is your best weapon. But with ever-changing threats and ever-evolving defenses comes ever-growing potential for common misconception. To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : 
website security myths, customer protection, ever-changing threats, website security, security
    
Thawte
Published By: Viavi Solutions     Published Date: Jan 04, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Jan 04, 2017
The right Network Performance Monitoring and Diagnostics (NPMD) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) defenses.
Tags : 
    
Viavi Solutions
Published By: Norse     Published Date: Nov 19, 2013
Learn how your current defenses against cyber-attacks are outdated and how intelligence-based strategies will protect your organization from advanced attacks.
Tags : 
cyber criminal, cyber-attacks, advanced attacks, hackers, network, infrastructure, anti spam, anti spyware
    
Norse
Published By: AlienVault     Published Date: Mar 30, 2016
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
By exploiting popular places on the Internet, such as search engines, social networking and email, malnets have become very adept at infecting many users with little added investment.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
Organizations must be able to extend the boundaries of their corporate network to provide consistent Web security protection, policies and reporting for all users on any device or network.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
This paper talks about the strengths and weaknesses of on-premise and could deployments and which organizations need hybrid solution.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Apr 05, 2012
This Webcast , discusses how hybrid web security can tackle these tough challenges. Hear pros and cons of various deployment options and key considerations for even the most cloud-hesitant security professionals.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Viruses have been on the attack for more than 20 years, and the cost of dealing with them is escalating. Too many malcode (malicious code) attacks by viruses, worms, Trojans and the like are breaking through today's most prevalent system defenses: Antivirus (AV) programs. This whitepaper will discuss the full impact of virus disasters and what historically has been done to combat the problem.
Tags : 
virus, antivirus, anti-virus, anti virus, trojan, trojans, malware, worms
    
Internet Security Systems
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips
    
Third Brigade
Published By: Symantec.cloud     Published Date: Jan 28, 2011
In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
symantec cloud, search engine link spam, messagelabs, viruses, trojans, spyware, phishing, url
    
Symantec.cloud
Published By: SAS     Published Date: Aug 03, 2016
A paradigm shift is underway in the cybersecurity industry. Cybersecurity professionals are moving from a focus on attacker prevention to attacker detection. Preventing the “bad guys” from getting in is still important, but cyber adversaries are increasingly able to bypass even the most sophisticated network defenses. Once inside, it is more important than ever to find these attackers fast, before their activities get buried in the daily volume and pulse of network communications. This is where security analytics holds promise. Security analytics provides the necessary and timely visibility into normal and abnormal network behavior. This visibility enables devices and entities acting suspiciously to be quickly identified and investigated.
Tags : 
cyber security, security, best practices, attacker prevention, paradigm shift, security analytics, technology
    
SAS
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.