network defense

Results 26 - 50 of 75Sort Results By: Published Date | Title | Company Name
Published By: WatchGuard     Published Date: Oct 16, 2012
The importance of effective security for businesses can't be understated and effective IT policies must be made. With this overwhelming amount of data in your hands, how do you ensure proper network defense and actionable incident responses?
Tags : 
watchguard, it policy, data management, aup, risk, data security, security
    
WatchGuard
Published By: Infoblox     Published Date: Jun 18, 2015
Download this white paper and find out how you can turn your biggest vulnerability into a key layer of your network security defense.
Tags : 
infoblox, network security, dns based attacks, next generation firewalls, malware attacks, dns servers, dns infrastructure, internal attacks
    
Infoblox
Published By: FICO     Published Date: Mar 14, 2017
In this Executive Brief, we share best practices in how to evaluate and deploy layered controls that will help you develop a holistic approach to controls, investigate and control where risk is introduced, assess your risk appetite and benchmark your cybersecurity posture against others in your industry.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: FICO     Published Date: Mar 14, 2017
Learn how technologies such as AI, self-calibrating models and self-learning analytics are being used to detect cyber attacks before they happen. Download now!
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : 
trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance
    
TriGeo Network Security
Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions
    
Citrix Systems
Published By: CDW     Published Date: Jun 10, 2013
Nothing puts your organization at risk like weak network security. We’ve got the people, processes and partners to deploy your first line of defense.
Tags : 
cdw, threat detected, denial of service, viruses, worns, rootkits, sensitive data, network.
    
CDW
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Cisco     Published Date: Jul 11, 2016
Transformation doesn’t happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
    
Cisco
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
AtNetPlus - As an IT services company on the front lines of network defense, AtNetPlus takes choosing antivirus software very seriously. After rigorous testing of multiple antivirus products, their IT specialist chose VIPRE for its small footprint and reliable malware detections.
Tags : 
threattrack, security, threat, track, information, admins, best, practices
    
ThreatTrack Security
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
McAfee
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : 
custom defense, security threats, enterprise networks, intellectual property, networking, security
    
CDW-Trend Micro
Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security
    
Mimecast
Published By: Mimecast     Published Date: Aug 19, 2015
A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security
    
Mimecast
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges, security
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat, networking, security
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking, security
    
IBM
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.