security visibility

Results 176 - 200 of 206Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 09, 2014
Most organizations are managing data sets that are larger than ever before, where many security offenses can be hidden and undetected, posing severe risks to business operations and the protection of sensitive, private information. Watch this video and learn how these exposures can be addressed with IBM's integrated Security Intelligence and Big Data solution.
Tags : 
ibm, security, cyber security, security intelligence, big data, visibility, threat detection
    
IBM
Published By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
viavi solutions, hybrid clouds
    
Viavi Solutions
Published By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway
    
Cisco
Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security, visibility, management, support, migration, services, applications, improve, proactive, protection
    
Cisco
Published By: Cisco     Published Date: Jan 06, 2015
Discover how a comprehensive, network-enabled approach to information security can help protect you against today's increasingly pervasive cyberthreats by giving you unprecedented visibility across your entire network.
Tags : 
engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications
    
Cisco
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM. So, you can go from installation to insight in days, not months. Download the 2014 Gartner MQ for SIEM.
Tags : 
mitigate, threats, detect, affordability, solution, deliver, security, visibility, siem, quadrant
    
AlienVault
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : 
citrix, security, netscaler, web
    
Citrix Systems, Inc.
Published By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
    
AlienVault
Published By: SAS     Published Date: Aug 03, 2016
A paradigm shift is underway in the cybersecurity industry. Cybersecurity professionals are moving from a focus on attacker prevention to attacker detection. Preventing the “bad guys” from getting in is still important, but cyber adversaries are increasingly able to bypass even the most sophisticated network defenses. Once inside, it is more important than ever to find these attackers fast, before their activities get buried in the daily volume and pulse of network communications. This is where security analytics holds promise. Security analytics provides the necessary and timely visibility into normal and abnormal network behavior. This visibility enables devices and entities acting suspiciously to be quickly identified and investigated.
Tags : 
cyber security, security, best practices, attacker prevention, paradigm shift, security analytics, technology
    
SAS
Published By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks
    
IBM
Published By: Cisco     Published Date: Feb 13, 2015
Get CIO perspectives on the changing roles and relevance of IT teams in this report.
Tags : 
cloud computing, security, compliance vulnerabilities, visibility, service level agreements, cloud technologies
    
Cisco
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft
    
Globalscape
Published By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
aberddeen, data center, datacenter, cloud, server security
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center, virtual datacenter
    
Intel Security
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
Published By: IBM     Published Date: Jul 15, 2016
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
technology, security, information technology, best practices, ips, zero trust model
    
IBM
Published By: AWS     Published Date: Oct 07, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production
Tags : 
    
AWS
Published By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.