layered security

Results 26 - 44 of 44Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
Traditional antivirus or intrusion prevention systems are no match for the new breed of attacks; enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
security connected, stealthy attacks, rootkits, os level protection, hardware assisted security, endpoint security
    
McAfee
Published By: McAfee     Published Date: Jul 24, 2013
The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organizations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
stealthy attacks, malware, intrusion prevention system, siem, layered security controls
    
McAfee
Published By: Workforce Software     Published Date: May 26, 2015
In this white paper, we share 10 critical questions every employer should ask their SaaS provider before moving their workforce management systems—such as time and attendance, scheduling, and leave management—to the cloud. Packed with detailed information about industry standards and tips for protecting your employee data, you’ll learn: • 10 questions to ask your SaaS provider before you share employee data • WorkForce Software’s multi-layered approach to cloud security • What you need to know about disaster recovery and redundancy measures • What certifications to look for when evaluating cloud providers
Tags : 
saas, security, cloud provider, workforce management, employee data, cloud security, redundancy
    
Workforce Software
Published By: LogicNow     Published Date: Mar 10, 2016
Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).
Tags : 
managed services, cyber security, logicnow, cyberdefense
    
LogicNow
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Protect your network the right way the first time around. View this webinar to avoid doing any wrong to your business in terms of security.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension
Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
    
IBM
Published By: Webroot     Published Date: Nov 07, 2012
This case study describes how a technical services firm benefited from deploying Webroot for layered Web and endpoint security.
Tags : 
endpoint security, web security, it security, security solutions, case study, mobile security, mobility
    
Webroot
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.
Tags : 
app management, app security, privacy, data passing, mobile app
    
IBM MaaS360
Published By: VMware AirWatch     Published Date: Sep 16, 2015
In this whitepaper, we discuss common enterprise use cases and define the advantages of MDM, containerization and the layered approach to security that both can provide.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware AirWatch
Published By: Citrix     Published Date: Oct 15, 2013
Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.
Tags : 
citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
    
Citrix
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the PSTN. As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons.
Tags : 
voip, voice over ip, ip telephony, voip security, secure voip, pstn, network security, internet security
    
Internet Security Systems
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management
    
Secure Computing
Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
    
Perimeter
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips
    
Perimeter E-Security
Published By: MobileIron     Published Date: Feb 26, 2018
Enterprises are increasingly expected to support Macs as corporateapproved devices. In order to be in compliance, it is imperative that all devices accessing sensitive corporate and customer data be fully secured and managed. MobileIron delivers a new model for authentication and identity to Macs and enables enterprises to unify Apple mobile and desktop operations using a common security and management platform. MobileIron’s layered security can be extended to not only corporate-owned Macs, but to employee-owned devices as well. And, IT organizations can bring Macs under management across the organization with unparalleled speed and at scale thanks to seamless integration with Apple’s Device Enrollment Program (DEP) and Volume Purchase Program (VPP).
Tags : 
    
MobileIron
Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
    
FICO
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.