security solution

Results 226 - 250 of 992Sort Results By: Published Date | Title | Company Name
Published By: CrowdStrike     Published Date: Feb 01, 2017
A large and growing number of security solutions are being touted as the ""next generation"" in cyber defense, and endpoint protection products are no exception. This has led to widespread confusion about which solutions have truly incorporated next-generation technologies and approaches, and which ones are making empty claims or half-hearted attempts. CrowdStrike developed this white paper to help you sift through the hype and uncover the critical elements that a true next-generation endpoint security solution must include. Download this white paper to explore: ? An explanation of the essential elements of Next-Generation Endpoint Protection ? An evaluation matrix for comparing the potential impact of different solutions ? A list of the top questions to ask potential vendors ? Tools to help you measure and compare different solutions
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Mar 15, 2017
It’s time to upgrade your organization’s legacy Antivirus (AV). Here is what you need to know before replacing your AV solution. The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Apr 10, 2017
All ML technology isn’t created equal. Learn how the CrowdStrike® ML-based Engine Defends Against Unknown Malware. While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware.
Tags : 
    
CrowdStrike
Published By: Intel     Published Date: May 15, 2017
The intent of this document is to help customers who are interested in implementing security protection mechanisms in Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) domains.
Tags : 
software-defined wan, security, network functions virtualization, nfv, wide area network, intel
    
Intel
Published By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain – or kill-chain – of steps in the process leading to these breaches.
Tags : 
    
Exabeam
Published By: Exabeam     Published Date: Sep 25, 2017
The Exabeam Security Intelligence Platform addresses every key weakness of existing SIEM solutions: Cost, Intelligence, and Productivity. This paper describes the challenges of security intelligence and how Exabeam specifically overcomes them.
Tags : 
    
Exabeam
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software APAC
Published By: Turbonomic     Published Date: Jul 05, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how to iden
Tags : 
    
Turbonomic
Published By: Splunk     Published Date: Aug 21, 2018
While the modern enterprise embraces digital technology, it is also at risk of cyberattacks. In this guide, “The Essential Guide to Security”, we map out how organizations can use machine data for specific use cases and get started addressing threats and security challenges. Download your complimentary copy to learn: *How to assess your organization’s security maturity *What specific threats you should be looking for and how to fight them *What data sources are needed for specific use cases *What software solution you need to get ahead of different threats
Tags : 
    
Splunk
Published By: Splunk     Published Date: Aug 21, 2018
Alice Bluebird, a quirky security analyst for hire, is hunting down a nation state of hackers thirsty for the recipes of Frothly, a cutting-edge craft brewery. Follow Alice as she works to solve the mystery of the breach. Did she catch the incident before the hackers managed to steal Frothly’s super secret formulas? Did the hackers act alone or — scarier yet In this light hearted graphic novel “Through the Looking Glass Table”, discover how machine data, as well as an analytics-driven platform, log management, SIEM, UEBA and SOAR solutions, can help anyone — IT managers and sophisticated SOC analysts — better understand and respond to incidents, breaches, phishing attempts, insider threats and more.— did they have help from the inside?
Tags : 
    
Splunk
Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA
Published By: Gigamon     Published Date: Dec 13, 2018
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Download the Gigamon white paper, "Addressing the Threat Within: Rethinking Network Security Deployment," to learn how evolving cybersecurity threat conditions are changing the trust model for security. See how a structured and architectural approach to network security gives security solutions better access to network traffic while enabling them to scale cost effectively. Learn how a security delivery platform can be the foundational building block for deploying adaptable security solutions. Read now.
Tags : 
    
Gigamon
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Cloud Access Security Brokers are one of the fastest growing security technologies today because they provide cloud service visibility, data security, threat protection, and compliance. CASBs are an effective and easy way to mitigate the top cloud security threats and security practitioners look to trusted CASB providers as strategic partners to help advise on key cloud security decisions.
Tags : 
    
Oracle Security Solutions
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Whether you are leveraging the cloud for software as a service (SaaS), infrastructure as a service (IaaS), or platform as a service (PaaS), cloud security is a mandatory cost of doing business. In June 2016, Gartner issued a press release identifying the top information security technologies and included cloud access security brokers (CASBs) at the top of that list. Protecting your data and IP in the cloud is not an option. Knowing that an ROI for a CASB could be longer term, how do you quickly quantify the additional value a CASB provides so that it gets a high priority in your already stretched information security budget? This white paper helps you to build a business case by walking you through the cost considerations and payback of a CASB. It demonstrates that a CASB provides stronger cloud protection at a lower cost than traditional security processes and tools.
Tags : 
    
Oracle Security Solutions
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
The shared responsibility model is spelled out in the terms of services document of every CSP from Microsoft to Amazon. However, it is arguably the least understood and most misconceived concept. Simply put, the shared responsibility model outlines the CSP’s responsibility to maintain a secure and continuously available service and enterprises’ responsibility to ensure secure use of the service. Why is such a concept so difficult to comprehend and open to varying interpretations? Is the difference between security of the service and secure use of the service so significant? Aren’t enterprises moving to the cloud so they don’t have to deal with these types of responsibilities? This white paper examines the root cause behind the confusion, some unfortunate scenarios that resulted from the confusion, and how some enterprises are successfully addressing and embracing the shared responsibility model.
Tags : 
    
Oracle Security Solutions
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Organizations face onboarding risks of BYOS (Bring Your Own Service) as they hire new employees that bring their own cloud services into the work environment. Risks facing IT and security teams include protecting corporate data and defending against modern threats. While IT and Security teams want to adopt modern cloud applications and increase business agility, they also want to implement visibility and monitoring to protect corporate data and comply to security policies. This session will highlight how new methodologies available today enable organizations to discover sanctioned and un-sanctioned cloud services that are being used within their organization, and how they can apply consistent security policies across the public and private cloud to protect corporate data and conform to compliance policies.
Tags : 
    
Oracle Security Solutions
Published By: Acronis EMEA     Published Date: May 19, 2015
This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.
Tags : 
security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance, share corporate content, sync, enterprise security, acronis access advanced solution
    
Acronis EMEA
Published By: Acronis EMEA     Published Date: May 19, 2015
This case study explores how Acronis Access changed the way Parrish Construction Group communicates.
Tags : 
build a mobile workforce, control access, share documents, security, acronis access solution, acronis, access to documents, mobility
    
Acronis EMEA
Published By: Oracle     Published Date: Oct 27, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle, virtualization, infrastructure
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle, virtualization, infrastructure, infrastructure management
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle, virtualization, infrastructure
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle, virtualization, infrastructure
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle, virtualization, infrastructure
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle, virtualization, infrastructure
    
Oracle
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept