defense

Results 201 - 225 of 423Sort Results By: Published Date | Title | Company Name
Published By: Plex Systems     Published Date: Feb 26, 2014
Aerospace and Defense manufacturers manage complex programs. With cyclical demands and tight time-to-market expectations, manufacturing is both an art and a science. You need an ERP system with close integration between engineering and manufacturing operations while supporting regulatory compliance.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: LogRhythm     Published Date: Aug 08, 2016
The first two installments of the Cyber-threat defense report began the process of looking beyond major breaches and the never ending evolution of cyber-threats to better understand what IT security teams are doing to defend against them.
Tags : 
security, technology, best practices, information technology, cyber threat, business technology
    
LogRhythm
Published By: Infosys     Published Date: May 22, 2018
When one of our client's most strategic web applications was hacked, it was something of a wake-up call. Application security is surprisingly often an afterthought, and serious investment is only sometimes made when security breaches are discovered. Effectively, companies try to close the stable door after the horse has bolted. However, preventive security maintenance of apps is far more cost-effective and less damaging than reactive security. Our client therefore asked us to put in place an app security testing program early in the development life cycle to reduce the chances of similar breaches in the future.
Tags : 
security, technology, data, app, device, web
    
Infosys
Published By: SafeNet     Published Date: Sep 08, 2010
Find out about the most effective defense against MitB attacks.
Tags : 
safenet financial services, secure browser authentication, man-in-the threats, mitb, man-in-the-middle, mitm, security
    
SafeNet
Published By: SafeNet     Published Date: Sep 08, 2010
This paper will provide insight into the top five threats to the online banking in the financial services industry and SafeNet's recommended solutions for a defense that not only provides a secure transaction environment for customers but also satisfies stringent government and industry compliance regulations.
Tags : 
safenet financial services, online banking threats, cyber attack, compliance, financial services providers, authentication, phising
    
SafeNet
Published By: Micro Focus     Published Date: May 03, 2011
The explosion of data and consumer mobility trends put more pressure than ever on the back office systems across telecommunications companies, defense, transportation, healthcare, financial services and more. Using selected customer scenarios this webcast describes how VisiBroker, the market leading CORBA ORB, is the most cost effective, high performance solution to bring together tens of thousands of end points across distributed applications.
Tags : 
micro focus, visibroker, corba environment, distributed application
    
Micro Focus
Published By: Dell SecureWorks     Published Date: Apr 09, 2011
Read this whitepaper to learn how Dell SecureWorks' multi-phase Penetration testing can help you obtain a true understanding of your security and risk posture so that you can strengthen your defenses and prevent a successful attack.
Tags : 
intrusion prevention, dell, secureworks, attacks, network security, cyber risk, cyberrisk, penetration, security
    
Dell SecureWorks
Published By: Cisco     Published Date: Jul 11, 2016
Transformation doesn’t happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Apr 05, 2016
With cybercrime and security breaches sharply on the rise, protecting valuable information from cyberattacks is an ongoing challenge for companies. In this increasingly insecure world, your critical information deserves the best protection, making the database and surrounding infrastructure the best line of defense. Protect your data better through evolving your approach to data security. Learn about three key steps to reinvent the security of your surrounding infrastructure to create an information fortress by protecting your valuable data at its source.
Tags : 
information management, security, best practices, information secuirty
    
Oracle
Published By: McAfee EMEA     Published Date: Nov 15, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why McAfee takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, mcafee, cyber threat, technologies, innovation, analytics
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security and risk management leaders should know that while IDPSs are being absorbed by firewall placements at the perimeter, they give the best protection. They're also responding to pressure from uptake of other threat defense solutions, and providing credible internal and cloud placement options.
Tags : 
magic quadrant, intrusion, detection, prevention, systems, cloud, internal
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
McAfee advanced threat defense, McAfee Threat Intelligence Exchange, and McAfee enterprise security manager can cut through the grey to provide a clear understanding of risk.
Tags : 
mcafee, webinar, security, product, technology
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
    
McAfee EMEA
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Find out how it works and why it's actually possible now to move the battle for web security off your web servers.
Tags : 
cloud-based web security, cybercriminals, watchguard reputation enabled defense, web-based attacks, threat management, malware, url filtering
    
WatchGuard Technologies
Published By: EMC Corporation     Published Date: Mar 20, 2014
Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field
Tags : 
emc, security threats, malware threats, malware protection, kill chain, rsa, defense, security
    
EMC Corporation
Published By: NETIQ     Published Date: Jun 20, 2014
CyberEdge provides insight on both the current state of cyberthreat defense and projections for the future.
Tags : 
netiq, cyberthreat, cyberedge, cyber security, cyberthreat, security
    
NETIQ
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Users Beware: 10 Security Tips to Share with Your Users - ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, malware, viper
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, mobile, byod
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, mcafee
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, kaspersky
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Stillwater Medical Center: Healthcare provider with 1,000 employees chooses VIPRE after its old antivirus kept crashing systems, disrupting operations and failing to protect against malware infections. Learn how this hospital cured its antivirus ills with VIPRE.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, hospital
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
AtNetPlus - As an IT services company on the front lines of network defense, AtNetPlus takes choosing antivirus software very seriously. After rigorous testing of multiple antivirus products, their IT specialist chose VIPRE for its small footprint and reliable malware detections.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, atnet
    
ThreatTrack Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com