Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

eva

Results 251 - 275 of 2661Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Oct 28, 2013
Welcome to Advanced Evasion Techniques For Dummies, your guide to the security evasion techniques that have become a serious preoccupation of the IT industry.
Tags : 
hacking, malware, advanced evasion, aet, stonesoft, network security, next generation firewall, ngfw, evasion technique for dummies, mcafee, firewall, software development, it management
    
McAfee
Published By: McAfee     Published Date: Apr 14, 2014
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, networking
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
Published By: McAfee     Published Date: Jun 03, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
advanced evasion techniques, hacking methods, protection, firewalls, network security
    
McAfee
Published By: McAfee     Published Date: Nov 11, 2013
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques
    
McAfee
Published By: McAfee     Published Date: Apr 14, 2014
Understand the essential design principles to detect and stop advanced evasion techniques. Learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks..
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, ngips, next generation ips, next gen firewall, next gen ips, security, it management
    
McAfee
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Logicalis     Published Date: Sep 23, 2013
Why You Should Reevaluate Your DR Strategy Today
Tags : 
logicalis, disaster recovery, dcaas, data center-as-a-service, dr strategy, it management
    
Logicalis
Published By: Logicalis     Published Date: Sep 23, 2013
Why You Should Reevaluate Your DR Strategy Today
Tags : 
logicalis, disaster recovery, dcaas, data center-as-a-servic
    
Logicalis
Published By: HP and Intel ®     Published Date: May 06, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtual technologies, the expected and realized benefits, ensuing infrastructure decisions,future outlook of the data center, and best practices for deployment.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure, desktop virtualization, cloud computing
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 02, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtualization technologies, the expected and realized benefits, ensuing infrastructure decisions, future outlook of the data center, and best practices for deployment.
Tags : 
    
HP and Intel ®
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Aerohive     Published Date: Oct 23, 2014
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : 
wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity
    
Aerohive
Published By: McAfee     Published Date: Nov 07, 2014
Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).
Tags : 
siem, big security data, segurança do big data, informações de segurança, ameaças avançadas, ameaças persistentes avançadas, apt, inteligência de segurança, segurança, security
    
McAfee
Published By: HireVue     Published Date: Mar 05, 2019
The AI-in-recruiting space has exploded, leaving many recruiting leaders feeling overwhelmed and poorly qualified to evaluate vendors. Our AI Buying Guide is designed to help TA leaders cut through the hype and misinformation that surrounds artificial intelligence, and make highly qualified, informed buying decisions. YOU’LL LEARN: • What AI is, and what makes it different from previous technological innovations • Why different types of organizations see different levels of success with AI - and how to prep yours to maximize the impact • How to evaluate vendors across the 3 steps of the buying process • How to build a rock-solid business case for AI-driven recruiting technology Download the guide now.
Tags : 
    
HireVue
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Global corporate enterprise AI practitioners are clearly still dealing with infrastructure issues related to talent and technology. End-to-end processes remain stubbornly carbon-based. Rule-based automation is truly not yet globally scaled across the majority of organizations. Double the AI And yet, the AI & Intelligent Automation Network members went from 21%, having deployed Intelligent Enterprise solutions to over 44% in just one year’s time. Over 4/5 expect to deploy AI in under two years The stated goal for deployment is just under 83% by the end of 2020. Considering the fact that they’ve essentially got two years, and those ranks have doubled in one year – doubling again in two years is achievable. Incidentally, that same number was only 67% a year ago. 50% expect to be established, globally scaling or refining AI in under two years Global corporate enterprise is in fact slowly but surely transforming into the intelligent enterprise of tomorrow. Having said that, it will be
Tags : 
analyst, artificial intelligence, intelligent automation, rpa
    
Automation Anywhere APAC
Published By: Alert Logic     Published Date: Jun 12, 2014
The numbers show a clear trend: there is a growing consensus among CISOs that outsourcing security services is a viable option. In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market.
Tags : 
mssp, security services, cloud security, managed security, secure cloud, it management, enterprise applications
    
Alert Logic
Published By: Resonate     Published Date: May 30, 2018
A great product is no longer sufficient to guarantee strong sales and loyal customers. Today's empowered consumers not only reject corporate irresponsibility but also seek brands that proactively promote beliefs and values aligned with their own. Marketing leaders should read this report to learn how to identify and prioritize relevant values that resonate with their consumers, authentically integrate those values across the organization, and help build the evidence-based case to earn consumers' and stakeholders' trust.
Tags : 
    
Resonate
Published By: NetApp APAC     Published Date: Jul 04, 2019
With the introduction of enterprise-grade all-flash arrays, conventional thinking about storage has been turned on its head. For example, a recent Gartner study found that all-flash storage pays for itself in just five to six months on average, the result of dramatic improvements in total cost of ownership (TCO).
Tags : 
    
NetApp APAC
Published By: Hewlett Packard Enterprise     Published Date: Nov 01, 2018
3rd party guide to evaluating all-flash storage arrays. DCIG researched the features of more than 80 all-flash arrays for its Storage Array Body of Research. Recognizing that there are multiple market segments for these products, DCIG grouped the products into midmarket, small and midsize enterprise, and enterprise classifications.This guide includes the products that ranked Recommended, Excellent or Good among the enterprise grouping of arrays.
Tags : 
    
Hewlett Packard Enterprise
Published By: SAP Concur     Published Date: Aug 07, 2019
"In the ever-evolving business landscape, managing company spend has become progressively more challenging for financial decision makers. Increasing mobile work forces, and an expanding number of vendors and invoices mean more transactions to track and manage. Automating expense, travel and invoicing is a sure way to gain a precise picture of how money is flowing through an organization. Firms of all sizes, geographies, and industries have found that automation is a simple and effective method for improving efficiencies, reducing operating expenditures, and boosting employee satisfaction. Download the report today to learn more about the benefits of automated solutions."
Tags : 
    
SAP Concur
Published By: Jallen     Published Date: Nov 20, 2014
How can you help your hotel achieve its potential? Search engines are built for one reason - to show the people who use them the content they want to see. They are not there for businesses to show off their websites. They look for pages which aren’t just relevant, but which engage with people and are active with their users. This is where you come in.
Tags : 
    
Jallen
Published By: IBM     Published Date: Jun 17, 2008
Portals are becoming integral enablers of business and IT innovation for many organizations. From first-generation content aggregation portals to more sophisticated enterprise process portals, organizations have used portal solutions to improve productivity, streamline business processes, enable new Web-based product and service delivery models, and provide IT with a powerful platform for new and composite application development.
Tags : 
ibm, corporate portal, portal, portals, idc, business process automation, tco, productivity, ep campaign
    
IBM
Published By: Marketo     Published Date: Mar 22, 2018
As an IT professional evaluating marketing platforms, it’s important to think about whether you can trust the platform to scale to accommodate your organization’s ongoing marketing and channel needs. Given the fast pace of channel proliferation and changing digital strategy priorities, you play a critical role in helping marketing build a technology stack that can easily scale to support its future needs. Download this whitepaper to learn about the essential criteria IT should evaluate to identify the solution that will support your marketing team’s short- and long-term needs and equip them to succeed.
Tags : 
    
Marketo
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.