Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

threat solution

Results 1 - 25 of 300Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
    
Akamai Technologies
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. When it takes 23 days on average to recover from a ransomware attack1, find out why I.T. security is the most important thing, period. Download our solutions guide > 1 IBM: 2017 Global CODB Report Final (
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. As the average cost of a data breach is over $4 million, discover how investing in security impacts business growth. Download infographic >
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. With 48% of breaches caused by human error2, find out how you can protect your business against employee mistakes. Download our infoguide > 2 Kaspersky: “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Note: s is missing from Kaspersky on source information on infoguide]
Tags : 
    
Lenovo UK
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider Telecom Italia sought an innovative solution to effectively and efficiently protect the network and data of its business users. In this case study, you’ll read about how Italy’s largest service provider partnered with Cisco Umbrella to increase value for customers and accelerate their revenues with cloud security.
Tags : 
    
Cisco Umbrella EMEA
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Forcepoint     Published Date: Jul 30, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint
Published By: Indegy     Published Date: Jul 29, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
    
Indegy
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Your guide to security. Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 02, 2019
Your guide to security Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 02, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: IBM APAC     Published Date: Jun 24, 2019
Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. So why don’t companies feel more prepared to identify and respond to these threats? For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats – and nearly impossible to demonstrate ROI. IBM Security commissioned Forrester Consulting to evaluate the state of security complexity and the effect it is having on security efficiency and effectiveness. In the study, many respondents reported taking steps to simplify their security environments and the results are promising. Fill out this form to read more about it.
Tags : 
    
IBM APAC
Published By: Gigamon     Published Date: Jun 21, 2019
An online threat prevention strategy should be more than a collection of security tools. It needs to be an integrated and intelligent approach. A complete threat prevention solution not only enhances the performance of prevention tools, but it also increases the efficiency of operations teams by enabling them to quickly deploy patches and implement new technology without impacting network performance or relying on maintenance windows. Read this solution brief in local language to learn how you can gain 50% in team productivity.
Tags : 
    
Gigamon
Published By: HP Inc.     Published Date: Jun 20, 2019
Today’s IT departments face a unique set of challenges. On one hand, they have evolved from helpdesk support teams to key business enablers and must maintain increasingly complex IT landscapes while combatting significantly larger cyber security threats. On the other hand, they have to manage constant change with fewer resources and static, or minimally-increasing, budgets. As a result, many are looking to reduce costs while increasing efficiency and productivity. Some, in fact, are looking to Device as a Service, or DaaS. If you're looking for more reasons to convince your CFOs that DaaS is a smart move, download the whitepaper to explore five big benefits of deploying a best-in-class DaaS solution.
Tags : 
    
HP Inc.
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more. Read the report to learn more.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.