protect

Results 3426 - 3450 of 3627Sort Results By: Published Date | Title | Company Name
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Delphix     Published Date: Mar 24, 2015
You may not be as protected from data loss as you thought you were. Download this infographic to see how you may be compromised.
Tags : 
    
Delphix
Published By: Websense     Published Date: Oct 06, 2014
This paper aims to provide the shortest path to prevention and risk reduction.
Tags : 
data loss protection, protecting ip data loss and theft
    
Websense
Published By: Polycom     Published Date: Nov 09, 2015
In this paper, we consider the different alternatives, and how the inclusion of multiple network abilities in an audio conferencing device can assure both excellent performance and investment protection.
Tags : 
polycom, audio conferencing, investment protection, digital, knowledge management, business technology
    
Polycom
Published By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
malware, implications of malware, protecting from malware
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, networking
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, networking
    
McAfee
Published By: Dell     Published Date: May 03, 2016
Data security presents a series of moving targets that most IT organizations can’t manage.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : 
upgrade, principled technologies, mobility, windows 10
    
Dell
Published By: Tyco Integrated Security     Published Date: May 05, 2015
Now is the time to craft a smart strategy you and your company can rely on. Download this white paper to find out how to assess vulnerabilities across the global supply chain so you can guard against major threats and ensure product integrity.
Tags : 
    
Tyco Integrated Security
Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning, social listening, brand crisis, brand monitoring, brand protection, reputation management, corporate communications, public relations
    
Meltwater
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, security
    
Intel Security
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Success of an effective threat defense strategy.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis, simplifies remediation
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
If your business is still running Windows Server 2003, you must act now to keep your business secure. This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking, security, data management
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Gartner Magic Quadrant for Mobile Data Protection
Tags : 
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking, security, data management, business technology
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : 
server security, virtual server security, cloud server security, data center server security, security, data management
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : 
management of native encryption, mne, data protection, filevault, bitlocker, pat correia
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
data loss prevention, dlp, office 365, security, it management, knowledge management
    
Intel Security
Published By: NetApp     Published Date: Jan 08, 2016
Download this case study to learn how NetApp solutions were able to back up most of King County’s data infrastructure, including 700 VMware virtual machines.
Tags : 
cloud computing, data protection, data infrastructure, purpose built appliances, pbas, cloud solution, netapp, it management, enterprise applications
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
Read this white paper and learn how to achieve the scalability you need to address evolving data protection requirements. Plus, find the right data protection solution for your business, whether in the public, private or hybrid cloud.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Start   Previous    136 137 138 139 140 141 142 143 144 145 146    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.