security attacks

Results 151 - 175 of 499Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 26, 2017
It is generally accepted that a hybrid approach to IT operations gives enterprises both financial and operational flexibility— allowing them to apply new technologies with little or no capital investment and tap expertise without hiring new personnel. But it is still an imperfect solution, and with sophisticated new attacks propagating at an accelerated rate, security has become a top concern. This is evidenced by the growing number of C-level security executives and by the intensive efforts of IT organizations to identify and address the gaps in their enterprise defenses and improve their ability to respond to those attacks. It is clear that security for hybrid IT environments is due for an advanced upgrade.
Tags : 
information technology, optimization, it security, data protection
    
IBM
Published By: Symantec     Published Date: Dec 13, 2017
Security teams face sophisticated attacks that ‘hide in plain sight’ and often dwell in customer environments as long as 190 days1. And attackers increasingly employ stealthy techniques to move freely within a customer environment like using stolen credentials to masquerade as legitimate users. There has been a marginal decline in zero-day discoveries and an increase in ‘living off the land’ tactics that don’t rely on the traditional combination of vulnerabilities followed by malware. These tactics are more difficult to detect since they make use of legitimate tools.
Tags : 
security, software, detection, network
    
Symantec
Published By: Darktrace     Published Date: Jun 17, 2019
This leading Canadian local distribution company was concerned about fast-moving and automated threats like ransomware that have the potential to compromise its network within minutes. By arming itself with Darktrace’s innovative self-learning technology, Energy+ has renewed confidence in its security stack’s ability to mitigate evolving and increasingly automated attacks.
Tags : 
    
Darktrace
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
enterprise, mobile security, basics, ebook, lookout, emm, mdm
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Damballa     Published Date: Oct 03, 2014
The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence
Tags : 
damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
    
Damballa
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
This paper talks about the strengths and weaknesses of on-premise and could deployments and which organizations need hybrid solution.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : 
mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed
    
CA Technologies
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Whether you're focused on public-facing websites or your company's assets and users, as someone who cares about digital security, your life is dominated by these trends that characterize the state of all things security in 2019: Attacks are growing, evolving, and becoming more sophisticated. And the types of attacks we see are proliferating. How do you protect your crown jewels when the castle has no walls? The answer is at the edge. When you deploy security at the edge, you are protecting your changing assets closer to the attack itself and moving digital experiences closer to users. In essence, you're deploying a single pane of glass, an extension of your infrastructure, that sits between you - your users, your digital experiences - and the always-changing nature of today's digital environment.
Tags : 
    
Akamai Technologies
Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : 
access manager, security, cloud service, microsoft office 365, it strategies
    
IBM
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks, cyber defense, vpn, dlp, privileged access, authentication systems
    
Venafi
Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks
    
Venafi
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express
    
Globalscape
Published By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, firewall, optimize
    
Cisco
Published By: Blue Coat Systems     Published Date: Apr 05, 2012
This Webcast , discusses how hybrid web security can tackle these tough challenges. Hear pros and cons of various deployment options and key considerations for even the most cloud-hesitant security professionals.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security
    
IBM
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
    
Fortinet, Inc.
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.