enterprise

Results 251 - 275 of 6831Sort Results By: Published Date | Title | Company Name
Published By: Arbor     Published Date: Feb 07, 2013
In today’s environment, any enterprise operating online—which means just about any type and size of organization—can become a target because of who they are, what they sell, who they partner with or for any other real or perceived affiliations.
Tags : 
arbor, anti-ddos, ddos attacks, threat, business technology
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance, ddos mitigation, database security
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection, business technology
    
Arbor
Published By: Arbor     Published Date: Mar 13, 2014
In this white paper, we’ll examine how the Pravail® portfolio from Arbor Networks can empower your network operations and security teams to more efficiently help protect the integrity and availability of your enterprise network against advanced attacks.
Tags : 
arbor, arbor networks, enterprise network, global attack, connecting workforces, internal operations, growing revenue, retaining customers, increase competitive edge, cyber attackers, pravail portfolio, pravail solutions, attack intelligence, enterprise defense, security
    
Arbor
Published By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : 
arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud, cloud migration, high-bandwidth attacks, volumetric attacks, deployment, multi-vector threat, ips solutions, deployment models, security
    
Arbor
Published By: Arbor Networks     Published Date: Mar 13, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention
    
Arbor Networks
Published By: Arbor Networks     Published Date: Sep 29, 2012
This newsletter is intended to educate and inform enterprise network and data center operators about the problem of distributed denial of service (DDoS).
Tags : 
ddos, distributed denial of service, data center, malware, security threats, database servers, dns, database security, infrastructure
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report, data management, business technology, data center
    
Arbor Networks
Published By: ArborNetworks     Published Date: Sep 16, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
security, it management, data management, business technology
    
ArborNetworks
Published By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : 
arbor, ddos, protection, enterprise, data security, security, business technology
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. This report covers actuals for 4Q14 and 1Q15.
Tags : 
arbor network, ddos, service provider, biannual report, security
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data, security, business technology
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
The modern enterprise is dependent upon connectivity at every level. Every business initiative, whether driven by sales, marketing, manufacturing, finance, R&D or HR, is dependent upon reliable network availability and continuity. Disrupting that continuity is what Distributed Denial of Service (DDoS) attacks are all about.
Tags : 
arbor network, ddos, enterprise, attack, network, business technology
    
ArborNetworks
Published By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : 
data protection appliances, appliance adoption, arcserve, security, it management, knowledge management, data management
    
Arcserve
Published By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : 
idm, identity management, user monitoring, identityview, enterpriseview, logs, siem, event logs, security, compliance, regulatory audits, forensics, investigations, log analysis
    
ArcSight
Published By: ArcSight     Published Date: Mar 04, 2009
This whitepaper will outline the drivers for log management as well as their underlying challenges and drive towards a common set of requirements for evaluation of log management tools.
Tags : 
log management, logs, siem, arcsight logger, event logs, security, compliance, regulatory audits, forensics, investigations, log analysis
    
ArcSight
Published By: Aria Systems     Published Date: Sep 23, 2015
Learn to: Monetize and grow revenues by increasing customer acquisition, retention, and lifetime value Rething your business and billing service to take advantage of every revenue moment Better manage revenue operations across the enterprise
Tags : 
    
Aria Systems
Published By: Aria Systems     Published Date: Nov 02, 2015
With millions of dollars hanging in the balance, selecting the right billing vendor is critical. Download Aria’s “7 Reasons to Evaluate Cloud Billing” to help you identify why cloud billing could be your best option. For example, cloud-billing vendors are often found to be more nimble than their on-premise billing counterparts, particularly for enterprises with multiple product lines and business in multiple geographies and currencies. Discover key advantages: • Accelerated go-to-market for products and services • An enhanced customer experience • The elimination of patches and upgrades • The ability to monetize your assets and services in new ways
Tags : 
aria systems, cloud billing, billing vendors, networking, data management, human resource technology, business technology
    
Aria Systems
Published By: Aria Systems     Published Date: May 03, 2016
Learn how to: - Monetize and grow revenues by increasing customer acquisition, retention - Rethink your business and billing service to take advantage of every revenue moment. - Better manage revenue operations across the enterprise.
Tags : 
    
Aria Systems
Published By: Ariba     Published Date: Mar 30, 2011
Read Forrester's 70-criteria evaluation of eProcurement solutions, we found that Ariba and Basware led the pack because of their superior user experience and wider supplier enablement capability.
Tags : 
ariba, eprocurement, basware, key performance indicators, kpis, supplier relationship management, srm, erp, enterprise resource planning
    
Ariba
Published By: Arkadin     Published Date: Sep 11, 2013
Cost effective, simple to deploy, next generation HD video conferencing solutions are no longer limited to C-level boardrooms, today enabling face-to-face meetings at the knowledge worker level delivering high levels of engagement and increased productivity.
Tags : 
: video conferencing, video collaboration, cloud-based video conferencing, hd-video conferencing, mobile video conferencing, mobile video communications, enterprise video conferencing, saas video conferencing, remote video conferencing, video conferencing software, boyd video conferencing, video conferencing applications, software development
    
Arkadin
Published By: Arkadin     Published Date: Sep 11, 2013
Unified Communications (UC) transforms the workplace, making it more productive, efficient and effective. Hosted UC service providers remotely deliver and manage various communications services using shared resources enabling customers to consolidate and outsource much, or possibly all, of their communications and collaborations needs for a fixed monthly cost. This whitepaper details the top reasons to consider a hosted unified communication solution for your enterprise.
Tags : 
unified communication, unified collaboration, enterprise unified communication, hosted unified communication, hosted uc, hosted ucaas, uc total cost of ownership, uc tco, uc deployment, deploying uc, byod, arkadin, microsoft lync, collaboration solutions, conferencing solution, collaboration services, conferencing services, unified communication as a service, software development, it management
    
Arkadin
Published By: Arkadin     Published Date: Sep 11, 2013
Unified Communications (UC) is a set of communications and collaboration products that provide end users with a single interface and experience across multiple device and media types. UC allows employees to collaborate more efficiently while lowering the overall cost of communications. This whitepaper reveals market trends, how to evaluate one solution vs. another, and the range of deployment options all critical to selecting the right UC solution for your organization
Tags : 
unified communication, unified collaboration, enterprise unified communication, deploying uc, byod, arkadin, microsoft lync, collaboration solutions, conferencing solution, collaboration services, conferencing services, unified communication as a service, efficiency with uc, productivity with uc, uc business value, software development, it management
    
Arkadin
Published By: Aruba Networks     Published Date: May 21, 2013
The increase in enterprise WLANs is being driven largely by the rapid growth of mobile devices in the enterprise — what many are calling the "consumerization of IT" — and the resultant increase in enterprise mobility applications.
Tags : 
aruba, aruba networks, consumerization of it, wireless lans, mobile enterprise, enterprise mobility, wireless
    
Aruba Networks
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept