threat

Results 1 - 25 of 2388Sort Results By: Published Date | Title | Company Name
Published By: ConnectWise     Published Date: Apr 01, 2020
The role of a trusted advisor has never been more critical. As more employees are moving to work from home, your clients are looking to you to make sure they do the right things to keep their employees and their data safe and secure. At ConnectWise, we’ve got you covered. Watch our webinar to view all the resources available to help you be the superhero your clients need. We’ve also put together a white-labeled, vendor agnostic Security Awareness Training for your end clients. We’ll cover the most critical things all employees should consider when working from home, and how to stay safe against threat actors who are actively looking for vulnerabilities.
Tags : 
    
ConnectWise
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹ As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: AppDirect     Published Date: Mar 23, 2020
The telecom industry provides the infrastructure that is powering the global digital revolution, but industry profits are in decline. Can today’s communications service providers (CSPs) reverse course? This infographic gives an overview of the major trends that are driving change in the telecom industry, including: The factors driving down telecom industry revenues The new threats of over-the-top (OTT) players and digital disruption Innovations that are creating new revenue opportunities, including a focus on SMBs, the Internet of Things, and improvements in the customer experience Fill out the form to download the infographic.
Tags : 
    
AppDirect
Published By: Fortinet EMEA     Published Date: May 14, 2020
Cloud computing has transformed how we consume and deploy IT solutions. Compute power is rapidly evolving to a utility model, with shared infrastructure at its core. This shared infrastructure underpinning the cloud revolution has also driven a fundamental shift in how we design and deploy technology within the data center. Servers, storage, networks, even the data center itself has moved beyond physical limits to become virtualized services residing on physical hardware. With this new virtual shared infrastructure model, comes new risks. According to IDC, 75% of organizations are implementing or considering the implementation of public cloud. Further, they predict that 50% of enterprise workloads will migrate to public cloud by 2018. At the same time, the threat environment is only expanding, and it is no longer the traditional hacker breaching the network perimeter that drives those who manage network security. Eastwest traffic, traffic between systems inside the network, now dominat
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: May 14, 2020
Most organizations are in the midst of some form of digital innovation (DI) - leveraging technology to achieve specific goals—and ultimately deliver greater value to their customers. But DI also brings disruption. Disruption in the form of an expanded attack surface and the introduction of a more sophisticated threat landscape. Disruption can also lead to increased complexity as organizations try to counter these new threats with a range of new security solutions. Finally, maintaining compliance with relevant industy and regulatory standards such as the General Data Protection Regulation (GDPR) becomes even more of a challenge. However, despite these issues, one key DI has rapidly going mainstream - software-defined wide-area network (SD-WAN). Unfortunately, SD-WAN is a prime example of the paradox of DI: a transformative technology that can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk.
Tags : 
    
Fortinet EMEA
Published By: Intel     Published Date: May 28, 2020
The shift to data-centric business models has not only increased the value derived from data but also vulnerabilities. Intel IT has developed a new cyber analytics platform based on leading Intel® technologies such as Intel® Xeon® Platinum processors, Intel® Optane™ SSD, along with Splunk and Kafka to provide faster insights into threat prevention and detection. Find out how the new Intel Cyber Intelligence Platform (CIP) offers the agility and efficiency to detect incidents with: • Easy implementation and quick ramping of human talent • A common work surface across all of InfoSec • Complete threat categorization • Simple integration of third-party security tools • Connection to open source ML libraries
Tags : 
    
Intel
Published By: Group M_IBM Q2'20     Published Date: Mar 19, 2020
The difference between operating in the best of times and worst of times is choosing the right SIEM. Keeping pace with advanced threats on a legacy SIEM can usher in an age of uncertainty for your corporate security. Operate in an age of wisdom with IBM Security QRadar, an intelligent, next-gen SIEM platform that takes the fight directly to threats.
Tags : 
    
Group M_IBM Q2'20
Published By: Group M_IBM Q2'20     Published Date: Mar 24, 2020
This book gives IT professionals a practical understanding of privileged account management (PAM). It describes what privileged accounts are, where they reside throughout an IT environment, and how they function. Most importantly, this book explains the risks associated with these accounts and how to best protect them from hackers and malicious insider threats.
Tags : 
    
Group M_IBM Q2'20
Published By: Dell EMC     Published Date: Apr 29, 2020
How do you protect and secure data against threats such as intrusions, APTs, and ransomware, creating an approach that is both comprehensive and flexible? IT strategy should take a multi-level approach that protects data against threats such as intrusions, APTs, and ransomware, while also creating a fail-safe repository for mission-critical data backups, in case all else fails. Download this overview from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Cisco Umbrella EMEA     Published Date: Jun 01, 2020
Concerned about the risks that hidden cyber threats present to your organization right now? Cisco Umbrella exposes the full extent of shadow IT with App Discovery and blocking. Gain visibility of cloud services in use and block risky apps to improve network security with three easy steps. Learn more by downloading the 3 Steps to Managing Shadow IT eBook.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Jun 03, 2020
Two IT security coworkers take pride proving to their boss how an easy-to-use, cloud-delivered security solution protected their organization against threats like malware, ransomware, and phishing, and sped up the Internet. See the reports and how it made these staffers legendary.
Tags : 
    
Cisco Umbrella EMEA
Published By: Forcepoint     Published Date: Feb 03, 2020
When your security team is alerted to a threat, investigating and addressing it swiftly makes all the difference. But, when alert volumes are high, how can they distinguish events that need their attention from those that don’t? This eBook explains how shifting from event-centric to people-centric data protection can provide the context needed to make the right call. Download yours to learn how human-centric data protection can help you: • Secure your data while leaving your employees free to work • Reduce false positive alerts • Keep your security team focused where they’re needed most
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Feb 03, 2020
When it comes to data security, the best-case scenario is to prevent data from being compromised entirely. However, as any security team knows, blocking every threat can impede workflows and productivity across a company. But it doesn’t have to be this way. This infographic outlines the nine steps you can take today to guard against data security incidents in the future while giving employees the freedom to get their work done efficiently. Download to learn how to: • Identify and categorize risks to your data security • Proactively define responses before incidents arise • Integrate data loss prevention controls across your business
Tags : 
    
Forcepoint
Published By: McAfee EMEA     Published Date: May 12, 2020
The Federal Employment Agency is a knowledgeable contact for finding employment and training. They provide advice on the topic of work and support millions of citizens with financial compensation such as unemployment and child benefits every day. By implementing an integrated security infrastructure featuring McAfee Endpoint Security, McAfee Threat Intelligence Exchange, and McAfee Advanced Threat Defense, along with the McAfee SIEM solutions, the agency has built a multilayered defense that is shrinking the gap to containment and improving its overall security posture
Tags : 
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: May 12, 2020
Efficient and effective threat detection requires rapidly obtaining insights from collected data. Today, many EDR solutions are focused on providing investigation capabilities to the most sophisticated SOC analysts, a focus that hasn’t proven effective or scalable. EDR products that enable triage by junior analysts through guided investigation open this superior level of detection to many markets that were previously unable to benefit from this technology. In April 2019, McAfee commissioned Forrester Consulting to explore opportunities for guided investigation capabilities in enterprise endpoint detection and response (EDR) products. We found that security decision makers believe guided investigation will improve alert quality, drive efficiency in the security operations center (SOC), and ultimately help enterprises secure their endpoints at scale.
Tags : 
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: May 12, 2020
As a senior consultant on the Foundstone Services incident response and forensic team, I regularly respond to a wide range of security incidents at client sites. I have assisted clients with the containment and eradication of malicious code (for example: ransomware and malware infections) and responding to unauthorized access/network breaches impacting their enterprise environment. During all of the responses, there was the need to identify the nature of the incident, assess the client’s security infrastructure, and work towards the identification of the threat or attack vector(s). The information gathered from the initial assessment and related analysis was then used to isolate and contain the malicious activity impacting devices within the environment. Connect
Tags : 
    
McAfee EMEA
Published By: Citrix     Published Date: Mar 26, 2020
In this eBook, you’ll learn how adopting the right ADC equips you to embrace change—from deploying the latest microservice apps to guarding against emerging security threats. To guide you toward the right ADC for your needs, this eBook will show you: • Digital transformation’s impact on the ADC landscape • Why your ADC should be software-based for better flexibility • How a modern ADC protects against security threats
Tags : 
    
Citrix
Published By: Flexential     Published Date: May 07, 2020
Ransomware Readiness – Prepare your defense against the
Tags : 
    
Flexential
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : 
astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco
    
Astaro
Published By: SAP     Published Date: Feb 03, 2017
Companies across the globe are all facing the same economic headwinds: business change in the form of competitive threats and new opportunities is coming at an unprecedented pace. The watchword for meeting these challenges is innovation – both in terms of business processes as well as the underlying technology that enables those processes. The sum of the experiences discussed in this report showcase how SAP S/4HANA, running on-premise or in the cloud, can form the basis for a broad-based business transformation that does not require a big bang implementation to succeed.
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
Small and midsize retailers around the world are seeing their businesses transform in a variety of ways. These firms, typically with fewer than 1,000 employees, have been transforming themselves as customers seek new types of engagement and as suppliers expect higher levels of efficiency and effectiveness. New business models and new competitors are changing the way retailers do business. Rather than simply react to new threats, successful retailers are leveraging technology in new ways to sharpen business practices, improve agility, and better serve customers while strengthening the role of retailers in the supply chain. Through digital transformation including the effective engagement of the internet of things (IoT) to track inventory, the opportunity to maintain and gain competitive advantage can be significant.
Tags : 
    
SAP
Published By: Cisco EMEA     Published Date: Jun 19, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. We’ve picked out five key stories because we think these threats, or similar ones, could appear again. To find out what these are download this whitepaper today!
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 19, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. We’ve picked out five key stories because we think these threats, or similar ones, could appear again. To find out what these are download this whitepaper today!
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 19, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses.
Tags : 
    
Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.