emedia

Results 101 - 125 of 194Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you can’t leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : 
software updates, security, patch, network security, patch management, remediation solutions
    
Lumension
Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event, infrastructure, threat, threat detection, threat remediation, compliance
    
NetIQ
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT processors fight sophisticated crimeware with built-in security technologies that work below and beyond the OS
Tags : 
it security, intel, monitoring, reporting, remediation, automatic monitoring, contagions, built-in-security, virtual realms, hardware-based security, intel ipt, software based convenience, anti-virus, security software, memory, network, display, disk
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview covering threat management, identity and access, data protection, and monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview animation covering threat management, identity and access, data protection, monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, animation
    
Intel
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense"
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
Smart and malicious advanced malware is targeted stealthy, evasive, and adaptive. Sandboxing and other stand-alone products can't do the job on their own. This editorial brief explains why you need an arsenal of layered, integrated defenses to protect against these sophisticated threats.
Tags : 
advanced malware, targeted malware, stealthy attacks, layered malware defense, static analysis, dynamic analysis, sandboxing, emulation, heuristics, stealthy attacks, rootkits
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis, simplifies remediation
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what measures are being taken to defend against it.
Tags : 
advanced malware, protection, network breaches, intrusion provention systems (ips), web and email gateway protection, tracking malware, malware analysis and detection, blocking and remediating malware, sandbox technology, network protection, integrating security systems
    
McAfee
Published By: New Relic     Published Date: Mar 17, 2015
Application performance management (APM) focuses on monitoring, maintaining, and optimizing the performance and health of business applications across development, test, datacenter, and network environments. As mission-critical enterprise application environments become more complex because of the increased use of cloud, big data, and mobility, APM is becoming a top priority for IT teams that need to quickly and cost effectively track end-to-end application performance, identify and remediate the root cause of performance problems, and maintain service levels required by end users and business stakeholders. SaaS-delivered APM solutions offer rapid time to value for IT organizations that need to implement APM quickly with minimal disruption to the business.
Tags : 
apm, application performance management, big data, application performance, mobility, data center, data management
    
New Relic
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: AWS     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
AWS
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
Fragmented and siloed security infrastructure is not sustainable against today’s threats. Adopt an optimized approach that encourages collaboration and visibility across the enterprise.
Tags : 
secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Infographic to accompany the "Sustainable Security Operations" white paper. It demonstrates how sustainable security operations overcomes major inhibitors.
Tags : 
secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation, process integrations, behavioral analysis
    
McAfee
Published By: McAfee     Published Date: Apr 06, 2017
Kirk Davis, Information Security Director, Vidant Health, says that the integration of McAfee threat management products allows his business to protect and remediate against threats while focusing on the business.
Tags : 
siem, secops, security operations, advanced threats, threat intelligence
    
McAfee
Published By: Rapid7     Published Date: Nov 27, 2012
What's your security protection factor (SPF)? In this on demand webcast for IT and security professionals, Rapid7's CSO and Chief Architect of Metasploit, HD Moore, shows how you can reduce your remediation workload by testing which vulnerabilities really matter.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
Published By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : 
qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system, patching vulnerabilities, remediation, cloud platform, patching, patch report, it infastructure
    
Qualys
Published By: Qualys     Published Date: Sep 29, 2016
One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work.
Tags : 
protection, vulnerability, assetview, malware, web application
    
Qualys
Published By: Qualys     Published Date: Sep 29, 2016
With ThreatPROTECT, you get a holistic, contextual and continually updated “at a glance” view of your threat exposure. The latest addition to the Qualys Cloud Platform, ThreatPROTECT eliminates guesswork and flags for you which vulnerabilities you must tackle now
Tags : 
protection, threats, data, vulnerabilities
    
Qualys
Published By: Kaseya     Published Date: Feb 11, 2014
Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.
Tags : 
kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies, management data, itam lifecycles, manage environment, automate maintenance, automate remediation, troubleshoot solution, service levels, it service levels, tangible results, distributed systems, automation streamlines
    
Kaseya
Published By: SolveMediaInc     Published Date: Sep 04, 2013
A Deep Dive into Native Advertising: Advertising That Gives Back to the Consumer
Tags : 
    
SolveMediaInc
Published By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : 
lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite, automated patch solution, lemss, agent communication, test groups, best practices, business intelligence, managing patches, vulnerability monitoring, remediation techniques
    
Lumension
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.