Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

security data

Results 1 - 25 of 1796Sort Results By: Published Date | Title | Company Name
Published By: Citrix     Published Date: Jul 14, 2016
This White Paper goes some way to finding a solution to your Data Center security problems. Citrix Netscaler, is the latest application delivery controller for building enterprise cloud networks. Today's enterprises can leverage their infrastructure to establishand extend a robust cost-effective for Nex Gen security. Download FREE today.
Tags : 
citrix_uk/eu, security, data center, cost effective, networking, it management, telecom
    
Citrix
Published By: Citrix     Published Date: Oct 07, 2016
For the digital enterprise, the advantages of a high-performing network are clear. A powerful network supports mobility and a remote workforce with digital media. It manages high volume and traffic peaks. It maintains up-time and security. We explore how Citrix have delivered clients business objectves
Tags : 
networking, security, data center, citrix_case_studie
    
Citrix
Published By: Citrix     Published Date: Aug 17, 2017
This white paper discusses the requirements of GDPR and how they can be addressed with integrated Citrix technologies for contextual access, network security, application security, data security, and analytics and insights.
Tags : 
data center, gdpr, network security, data, application security, citrix_gdpr
    
Citrix
Published By: Juniper Networks     Published Date: Mar 14, 2017
This IDC White Paper sets out a business value assessment of Juniper Network’s portfolio in IP Networking and security in the context of IDC research into the priorities and challenges faced by network managers in data center environments.
Tags : 
bandwidth management, convergence, ethernet networking, fibre channel, infrastructure, internetworking hardware, ip networks, juniper_dcd
    
Juniper Networks
Published By: Anixter     Published Date: May 22, 2015
Whether it’s for business or education, entertainment or shopping, nearly every financial transaction, phone call or text, movie download or Internet search either now takes place or is recorded in a data center. With nearly everyone’s professional and personal lives dependent upon a healthy ecosystem of data centers, it is only natural that data centers are now targeted by thieves, spies and others maliciously seeking to cause damage or to steal the information contained within a data center.
Tags : 
security strategy, asset management, physical security, data center, data centre, security, risk, risk management
    
Anixter
Published By: Trend Micro     Published Date: May 11, 2015
Read here to find out more about the decision makers in cloud security.
Tags : 
cloud, security, data center, networking
    
Trend Micro
Published By: Trend Micro     Published Date: May 11, 2015
Read more to find out how Trend Micro’s modern data center security is optimized to help you safely reap the full benefits of your virtualized environment.
Tags : 
security, data center, networking
    
Trend Micro
Published By: Trend Micro     Published Date: May 11, 2015
VMware and Trend Micro have partnered to deliver the first security and operations management solution designed for virtualized environments.
Tags : 
visibility, security, data center, networking
    
Trend Micro
Published By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
It’s time to acknowledge that the tech industry has failed our customers when it comes to cybersecurity and data protection.
Tags : 
    
VMware
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Gigamon     Published Date: Sep 03, 2019
This white paper will examine the security issues introduced by more data over faster networks, how an architectural approach can solve those challenges and introduces the GigaSECURE® Security Delivery Platform, the leading next-generation network packet broker purpose-built for security tools to work more efficiently across physical, virtual and cloud environments. In fact, IHS Markit1 has named Gigamon the market leader and the best-known vendor in the space with #1 market share in multiple industries – 36% overall and 59% in the government sector.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Check out our infographic to see six common security pitfalls that put your users, their devices, and your data at risk. By avoiding these common security mistakes, you’ll be protecting your network against today’s threats and beyond. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Data is the DNA of modern healthcare. As healthcare technology continues to evolve at a rapid pace, and patient data management and security evolve, emerging approaches for disease treatment and prevention—like precision medicine and healthcare content management—are becoming more necessary. Precision medicine is about moving from generic to more precise, population-focused diagnostics and treatment by factoring in data from patients’ genes, environment, lifestyle factors and family history, into clinical decision-making for earlier, more accurate diagnoses, and more effective treatment and prevention. Data is at the heart of enabling doctors and scientists to execute on this mission. Additionally, rapidly changing regulations throughout the world are affecting the management of all healthcare data. Infinidat removes data management barriers from this level of data interaction by removing isolated islands of storage and allowing much more data to reside on a single, high-performance, h
Tags : 
    
Infinidat EMEA
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.