Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

zero

Results 176 - 200 of 245Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
This ebook helps you determine whether your company has an access issue and outlines ways to lower your risk of getting breached by increasing your identity and access (IAM) maturity through adopting a Zero Trust approach with the right IDaaS solution. You’ll learn the best practices to establish identity assurance, limit lateral movement, enforce least privilege and audit everything. Discover how to avoid a Password Crisis.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
With compromised credentials as today’s #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This eBook looks at what’s behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach — one that better addresses the needs of the hybrid enterprise. It explores ways to strengthen your company’s identity maturity with a Zero Trust approach and proven best practices that reduce your risk of a security breach.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: May 03, 2018
"Watch the On-Demand webinar to hear Centrify's Chief Product Officer, Bill Mann and Forrester Principal Analyst, Chase Cunningham in a lively discussion how Zero Trust concepts can be applied to Identity and Access Management. "
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: May 03, 2018
Watch this webinar On-Demand: Cybersecurity is broken. Trust is the enemy. An entirely new approach is required — one based on Zero Trust. Championed by industry leaders including Google, Forrester, Gartner and Centrify, Zero Trust Security verifies every user, their device, and gives just enough access and privilege.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
A Zero Trust approach to security requires a combination of Identity Services to deliver identity assurance, trusted endpoints, conditional policy and least privilege. This guide identifies the specific capabilities you need within four key areas of identity and helps you compare capabilities across major vendors with respect to Application Services, Endpoint Services, Infrastructure Services and Analytics Services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
    
Centrify Corporation
Published By: Aerohive     Published Date: Jan 04, 2012
In today's virtual enterprise, access to corporate resources must be secure, reliable, and manageable, with consistently enforced policy while simultaneously allowing access from anywhere at any time. This is why access network strategies are critical to business growth.
Tags : 
aerohive, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services, business continuity, teleworker, remote office, call center, virtual office, disaster recovery, zero touch wireless, retail pci, convergence, infrastructure, interoperability, local area networking
    
Aerohive
Published By: Aerohive     Published Date: Apr 11, 2012
Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase.
Tags : 
aerohive, wlan, lan, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services, business continuity, teleworker, remote office, call center, virtual office, disaster recovery, zero touch wireless, retail pci, networking
    
Aerohive
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
Most companies have only put limited effort toward the system architecture that surrounds the flash memory modules. In this white paper, Storage Switzerland focuses on the importance of architecture design in solid state storage systems.
Tags : 
ssd, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage, ramsan, texas memory systems, high availability, performance, solid state, enterprise
    
Texas Memory Systems
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
It is common knowledge that PCIe SSD is faster, right? Maybe not, says George Crump from Storage Switzerland. Read on to find out why.
Tags : 
pcie, pcie ssd, ssd, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage, ramsan, texas memory systems, high availability, performance
    
Texas Memory Systems
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
In this part II of Enhancing Server And Desktop Virtualization With SSD, Storage Switzerland focuses on the next challenge of integrating SSD into a virtual server or desktop infrastructure and effectively using the technology in this environment.
Tags : 
integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage
    
Texas Memory Systems
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
For data centers looking to get the maximum performance from Flash-based storage supporting their virtual infrastructure, the RamSan-720 should be given strong consideration.
Tags : 
ramsan-720, integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity
    
Texas Memory Systems
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
In this final piece on server virtualization and SSD, Storage Switzerland discusses the power of performance, specifically, the dramatic impact that latent-free storage can make on the virtual environment. Read on to find out more!
Tags : 
desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage, ramsan, texas memory systems, high availability, performance, solid state, enterprise
    
Texas Memory Systems
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : 
antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware, software development
    
Webroot
Published By: McAfee     Published Date: Nov 12, 2014
AV-TEST did a review of McAfee Web Protection in the Cloud vs. Websense Cloud Security 2014 and tested each against a set of malicious URLs with zero-day malware to determine performance against the latest web threats.
Tags : 
av-test, mcafee web gateway, web protection, cloud gateway, websense cloud security, cloud computing
    
McAfee
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development, enterprise applications
    
BubblewrApp
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media
    
SnowFlake
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: Iovation     Published Date: Sep 25, 2009
One of the leading and fastest growing suppliers of systems for online betting, casino, poker and bingo uses iovation to combat online fraud and abuse.
Tags : 
online betting, casino, poker and bingo, combat online fraud and abuse, fraud solution, false positives, iovation reputationmanager, device reputation, tool evaluation, integration testing, integration testing, bonus fraud, risk assessment
    
Iovation
Published By: Qualys     Published Date: Nov 16, 2012
This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past.
Tags : 
vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats, security risks, security
    
Qualys
Published By: Qualys     Published Date: Nov 16, 2012
This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats, security
    
Qualys
Published By: Vocus     Published Date: Mar 13, 2013
Content marketing attracts customers, builds trust and makes you visible - and the cost starts at zero.
Tags : 
vocus, content marketing, creating effective content, joe chernov, scott stratten, ann handley, adam singer
    
Vocus
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.