Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

security report

Results 1 - 25 of 487Sort Results By: Published Date | Title | Company Name
Published By: LogMeIn     Published Date: Apr 16, 2019
Organisations need a password security benchmark
Tags : 
    
LogMeIn
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
    
MalwareBytes EMEA
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon EMEA
Published By: Rackspace     Published Date: May 09, 2019
Closing the communication gap around security and digital transformation: According to a recent report, 95% of CIOs expect cyber-threats to increase over the next three years. But, despite cybersecurity being front of mind for board members and IT decision-makers, many admit they do not have an appropriate security strategy in place. In this eBook we will: • Discuss why organisations do not have a strategy in place for cybersecurity, despite the board and ITDMs recognising it as a key priority • Explore the challenges ITDMs face communicating with the board about organisational priorities and skills disconnect • Reveal what ITDMs can do to help close the looming 'security strategy gap' that is widening day by day, and could be detrimental to the organisation's cloud security Download our eBook now to learn how to close the security gap in your organisation.
Tags : 
    
Rackspace
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: Zscaler     Published Date: May 15, 2019
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.”
Tags : 
    
Zscaler
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: SailPoint Technologies     Published Date: May 08, 2019
In our 26-criterion evaluation of identity management and governance (IMG) providers, we identified the nine most significant ones — CA Technologies, IBM, Ivanti, Micro Focus, Omada, One Identity, RSA Security, SailPoint Technologies, Saviynt — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
    
SailPoint Technologies
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
    
Forcepoint
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
With a hybrid IT approach, small and midsized businesses can leverage the greater control, faster access, and increased security that comes with on-premise, while taking advantage of the increased agility, reduced costs, and better flexibility that the cloud offers. In this report we’ll look at some of the challenges that smaller organizations face in building and managing IT, along with how some businesses are leveraging a hybrid cloud and on premise approach, gaining some significant benefits through this approach.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Mar 14, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: Gigamon     Published Date: Oct 19, 2017
Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a platform-based approach to visibility in which data, analytics and reports from multiple tools are aggregated and consumed in one control panel. Download to learn more.
Tags : 
    
Gigamon
Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.