Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web threat

Results 101 - 125 of 273Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 02, 2015
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, global threat intelligence, automated protection, web fraud, threat protection, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat, global threat intelligence, protection, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud, security, enterprise applications, network security
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
best practices, business intelligence, ibm, finance, automated protection
    
IBM
Published By: IBM     Published Date: Feb 01, 2017
View this webinar to learn what the experts are saying about the current state of digital analytics and hear why not upgrading is a threat to your business. James McCormack of Forrester will detail what steps you need to take now.
Tags : 
ibm, commerce, customer experience, digital intelligence, customer analytics, customer insights, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocent—but sometimes devastating—errors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : 
malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM
Published By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending
    
Imperva
Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula
Published By: Integrated Business Services, Inc.     Published Date: Jun 06, 2011
An article exploring the new Web 2.0 threats to organizations.
Tags : 
it security, data loss prevention, intrusion protection, breach, bots, mobiliti
    
Integrated Business Services, Inc.
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™ (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats.
Tags : 
cyber security, security intelligence, best practices, technology, security
    
LogRhythm
Published By: Lookout     Published Date: Mar 29, 2017
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
webinar, mobile security, ciso, lookout
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: M86 Security     Published Date: Feb 08, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm, web hosting
    
M86 Security
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm, web hosting
    
M86 Security
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Published By: McAfee     Published Date: Nov 12, 2014
AV-TEST did a review of McAfee Web Protection in the Cloud vs. Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine performance against the latest web threats.
Tags : 
av-test, mcafee web gateway, web protection, cloud gateway, websense cloud security, cloud computing
    
McAfee
Published By: McAfee     Published Date: Nov 12, 2014
Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Secure Web Gateways.
Tags : 
gartner magic quadrant, secure web gateways, mcafee web gateway, advanced threat defense, security
    
McAfee
Published By: McAfee     Published Date: Nov 12, 2014
This white paper describes a wide range of Internet-based attack methods and explains how Web Protection technology protects against them.
Tags : 
secure web gateway, web protection, gateway anti-malware engine, advanced threat defense, application control, security, it management
    
McAfee
Published By: McAfee     Published Date: Nov 12, 2014
This paper characterizes web threats and explains why most security solutions in place today are ineffective.
Tags : 
web security, web protection, mcafee web gateway, mcafee saas web protection, mcafee data loss prevention, security, it management
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.